• Title/Summary/Keyword: Security Design

Search Result 3,395, Processing Time 0.027 seconds

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

Implementation of a Service Oriented Architecture based on JXTA - an SOA framework involving users - (개인사용자를 포함하는 JXTA 기반의 Service Oriented Architecture 구현)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Kim, Jun-Ryong;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.21-31
    • /
    • 2007
  • This Paper presents an SOA framework that enables smooth provision of service to ordinary users while also replacing the current B2B environment-oriented SOA framework. To that end, the proposed SOA will be reviewed for its concept, characteristics, and components. Key to its design is that it will be implemented using the prospective next-generation P2P platform known as JXTA. The proposed framework includes all the basic functions of other SOA frameworks, and will make Provision and use of services more easy compared with other frameworks. Under this service, data and applications controlling these data are provided in an enabling format, thereby addressing security problems. Another advantage of this proposed framework is that each peer is able to play all roles of a service provider, service client, and service registry.

  • PDF

An Analysis of Residents' Supplementation Demand and Expected Effect by Types of Mountain Village Development Project (산촌생태마을 유형별 주민 보완 요구 및 기대 효과 분석)

  • Kim, Seong Hak;Seo, Jeong Weon;Park, Young Sun;Kim, Jong Ho
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.1
    • /
    • pp.71-80
    • /
    • 2013
  • This study aimed to categorize mountain villages according to business expense investments and investigate residents' supplementation demands and differences between expected effects by the categories. For the study, 35 villages where are completely developed on and after 2007 were selected to consider fairness among local governments. Each village leader(the head of the village or the chairperson of the management committee) was conducted a survey from 2012 May to August and one copy of survey was eliminated from the study. The study is summarized into four results. First, the types of mountain villages were categorized as a type of mountain village practice(18), a type of life environment improvement(8) and a type of forestry income(8) according by the itemized reports of the business expense investments. Second, the result of F-test(One Way ANOVA) for the average analysis by types showed that 3 out of 6 demands for the operation were significant differences and a supplementation necessity of the program was identified significant differences in p<0.01 level. The necessity of forestry resources use and sprawling development prevention are also showed significant differences among types in p<0.05 level. Third, F-test results from 7 questions of desired effects through mountain village creation project revealed that promotion and market security of forestry products and local patriotism instillation through a personal exchange are significant differences between types in p<0.05 level. Forth, the results of duplication benefits(the mountain village development projects and the village support programs with other departments) on the residents' development expectation found that when a village received a large number of projects, residents' expected effects were higher than other village residents where received relatively a small number of projects. However, the expected effects from the increasing quantities of projects were decreased.

Analysis on Characteristic of Construction Cost for Steel Box Bridge (강박스교량 공사비 특성 분석)

  • Sun, Chang Won;Kyung, Kab Soo;Kang, Shin Hwa;Kwon, Soon Cheol
    • Journal of Korean Society of Steel Construction
    • /
    • v.21 no.1
    • /
    • pp.1-14
    • /
    • 2009
  • Estimating appropriate construction cost at the design phase is judged with one important issue to the efficient security and the execution of budget. Therefore, in this paper, to build fundamental data of appropriate construction cost for steel box bridges, the existing calculated document such as the quantity, unit price document and detail items etc.. was analyzed and the basic specification of the bridges was investigated. Also, by estimating the relationship between predetermined cost and construction items on the bridges, the paper is intended to produce basic data for the calculation of appropriate construction cost in planning phase. From the result, it was calculated ratio of construction item in the total construction cost and unit cost. And then it was deduced effect factor of construction cost in steel box bridge.

Implications of Five Laws of Library Science on Dr. S. R. Ranganathan's Colon Classification: An Explorative Study

  • Kumar, S.K. Asok;Babu, B. Ramesh;Rao, P. Nageswara
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.309-326
    • /
    • 2011
  • There have been several milestones in the history of library classification but most of the schemes failed to meet the new challenges in the organisation of information. Dr. S. R. Ranganathan tried to revolutionise the whole thinking on classificatory approach, when he devised the Colon Classification (CC) in 1933. He developed the Colon Classification scheme with a sound theoretical background based on normative principles, Five laws of Library science, canons, etc. One important feature of CC is that, its use is not confined to information storage and retrieval alone. This paper presents an over view of different editions of the CC highlighting the salient features of the editions. Further the implication of Five Laws of Library Science has been described. The authors stressed that the features of such as greater hospitality, specificity and mixed notation has paved the way to design and develop the depth schedules on various micro level subjects and so far about 130 micro schedules have been published. The impressions by the leading LIS professionals during and after Ranganathan's time have been highlighted. The authors expressed the fear that when the library world would see the complete version of the seventh edition of CC? It may be due to lack of institutional support engaging in the research or financial constraints. The authors are of the opinion that any scheme to flourish needs a sound research body to bring out the revised editions as done in the case of Dewey Decimal Classification. The relevance of the CC in the contemporary world of Librarianship is discussed. Finally concludes that CC needs to be resuscitated as it is a precious national heritage; and still a force for the management of libraries.

A Study on the Tendency on Conversion of Passenger ship (여객선 컨버젼(Conversion) 동향에 대한 연구)

  • Kim, Young-Seop
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.1
    • /
    • pp.32-39
    • /
    • 2011
  • When the laws about the security of ships are revised, or voyage conditions are changed, ship owners have converted rather than built new passenger ships including cruise ships recently. As conversion causes a lot of changes in principal dimension, structural strength, hydrodynamic performance, the number of passengers, and cargo capacity, detailed pre-review is needed. But any studies on conversion have not been carried out yet, this study investigated and analyzed the trend of consulting companies' reports (Delta Marine Report, 2005, 2008). As a result, it was found that lengthening conversion brought about the main changes in principal dimension, and performance. Also it was suggested that there be factors for consideration like hull scantling, hull form, and cutting point to minimize side effects when ship owners build ships having lengthening conversion in mind.

A Study on the Design of CBRN Response Training Program in Korea Using Activity-Action Diagram Method (Activity-Action Diagram 기법을 활용한 한국형 화생방 교육훈련 프로그램 설계에 관한 연구)

  • Ham, Eun-Gu;Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.159-169
    • /
    • 2014
  • The development of science and technology to accompany the convenience of civilization but in addition to nuclear, gas, explosion, accident and spill all over the world with the possibility of a chemical or biological terrorism response efforts collectively as a response to the urgent task of a nation. In this study major economies such as the U.S. and Canada analyzed to investigate the CBRN training programs to fit the reality in Korea CBRN training programs were developed. also the development of training programs to CBRN Korean Activity-Action Diagram technique utilized by CBRN scenarios corresponding to each event needs to be taken when the Activity is defined by its detailed definition of corrective actions for the CBRN Activity to define context-sensitive actions in particular to enable the functionality of the structure in case of CBRN emergency initial response was to establish education and training programs.

A Study on Status Survey for the Improvement of Shelter Facilities for Residents (주민대피시설의 성능개선을 위한 실태조사에 관한 연구)

  • Park, Namkwun;Kang, Shinwook
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.91-97
    • /
    • 2014
  • purpose of this study was to conduct status survey on existing shelter facilities for residents and use it as basic material to plan and design improved shelter facilities in the future. As the result, first, although existing shelter facilities are judged to have been designed in consideration only of the protection from high explosive shells, actual protection capability is significantly low against high explosive shells when exit direction and protection capabilities of main entrances were investigated. Second, all the 7 facilities did not have air purifier with filters installed for the air that flows into the inside from outside and since the height of air exhausts and intake pipes in the outside are also close to the earth, there are possibilities that heavy contaminated air can flow into the inside. Third, although some facilities have anti-explosion doors installed, it is impossible to use them as chemical, biological and radiological (CBR) shelter because of improper installation of openings and anti-explosion valves as well as poor plumbing that cannot ensure air-tightness and poor finish of piping penetration.

Orbit Design of a Korean Regional Communication & Navigation Satellite System (한국형 지역 위성 통신항법시스템의 위성 궤도설계에 관한 연구)

  • Lee, Sang-Hyun;Park, Byung-Woon;Kim, Do-Yoon;Kee, Chang-Don;Paik, Bok-Soo;Lee, Ki-Hoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.7
    • /
    • pp.51-58
    • /
    • 2005
  • In 1990, GPS which had been developed for the military purposes became available to the civilian community. Since then these satellite navigation systems have been used extensively in the industrial areas such as car navigation, airplanes, communications, science and surveying. If we are dependent on GPS, however, there are some foreseeable problems in the areas of national security and sovereignty. Current GPS satellite constellation provides limited performance for the country like Korea and Japan where mountain area and urban canyon do not allow the wide skyline. To solve these problems, many countries plan to make other alternative navigation systems.In this paper, RNSS(Regional Navigation Satellite System) is designed to provide communication service with high elevation angle. It is shown, that system does not only have good navigation performance, but also improve GPS performance in Korea and its neighboring areas.

Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability (Modified Return Routability를 이용한 Hierarchical Mobile IPv6 Handover 인증 기법)

  • Kim, Jung-Hwan;Yu, Ki-Sung;Park, Byung-Yeon;Noh, Min-Ki;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.21-28
    • /
    • 2007
  • Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.

  • PDF