• Title/Summary/Keyword: Security Detection

Search Result 2,066, Processing Time 0.031 seconds

Development of Firewall System for Automated Policy Rule Generation based on Machine learning (머신러닝 기반의 자동 정책 생성 방화벽 시스템 개발)

  • Han, Kyung-Hyun;Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.29-37
    • /
    • 2020
  • Conventional firewalls cannot cope with attacks immediately. It is because security professionals or administrators need to analyze them and enter relevant policies to the firewalls. In addition, those policies may often block even normal accesses. Even though the packet themselves are normal, there exist many attacks that cause denial of service due to the inflow of a large amount of those packets. In this paper, we propose a method to block attacks such as Flooding, Spoofing and Scanning while allowing normal accesses based on whitelist policies which are automatedly generated by learning normal access patterns.

A New Watermarking Algorithm Using the Edge and PN Code (에지와 대역확산기술을 이용한 디지털 워터마킹 기법)

  • Song Sang-Ju;Lee Doo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.13-18
    • /
    • 2004
  • In this paper, we proposed a new digital watermarking technique. It uses frequency domain of discrete wavelet transform(DWT). watermarking technique is one of the most important tools for DRM(Digital Right Management) We proposed a new algorithm watermark insertion and detection. This technique cleats the watermark sequence using the edge image, spread spectrum technique and DWT. We tested the technique with various attacks. and found that it satisfies the watermarking evaluation criteria. Cox similarity measurement value is more than 6 on the Lena image and PSNR is more than 40dB on JPEG, Collusion. Clopping and Scatting. By the result, we proved that the new technique satisfies the requirement of Digital contents distribution, which are undeletablility tenacity, statistical undetectablility.

  • PDF

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines (안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현)

  • Choi, Joon-Hyuck;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.369-376
    • /
    • 2018
  • This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

A Study on the Performance Improvement of the HRV Detection from PPG Signals (PPG 측정신호로부터의 심박 검출 성능 향상에 관한 연구)

  • Che, Gyu-Shik;Choi, Dong-Hyuk;Chang, Yun-Seung;Yang, Gye-Tak
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.926-932
    • /
    • 2009
  • The whole-body massager among healthcare devices is under being popularized in a large scale as times goes by. It is critical to measure, analyze and judge the stress relaxsation trend from HRV signal using PPG in case of massager operation with such relaxsation device for removing stress of human being. There may be artifact in HRV measured signal because the measured object is under shaking with that massager in this case. We present the methodology to remove such artifact from those measured HRV signal, and then measure and analyze the desired HRV successfully in this paper.

  • PDF

A Design and Implementation of N-IDS Model based on Multi-Thread (멀티 쓰레드 기반 N-IDS 모델의 설계 및 구현)

  • 주수홍;엄윤섭;김상철;홍승표;이재호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.542-547
    • /
    • 2003
  • A network based intrusion detection system(N-IDS), can detect intruders coming in through packets in real time environment. The ability of capture of packet is the most important factor when we evaluate the performance of the system. The time delay between the time handling one packet capture and next one is variant become of packet handling mechanism. So for N-IDS can not settle this problem because most systems use a single processor. In this thesis, we solve the problem of irregular tine delay with a file socket and multi-thread processing. We designed and implement, the Crasto system. By an accurate observation, the performance testing shows that the Crasto reduces the capture delay time to 1/5 comparing to the existing single process N-IDS, and maintain delay time regularly.

  • PDF

A Shared Channel Design for the Power and Signal Transfers of Electric-field Coupled Power Transfer Systems

  • Su, Yu-Gang;Zhou, Wei;Hu, Aiguo Patrick;Tang, Chun-Sen;Hua, Rong
    • Journal of Power Electronics
    • /
    • v.16 no.2
    • /
    • pp.805-814
    • /
    • 2016
  • Electric-field coupled power transfer (ECPT) systems have been proposed as an alternative wireless power transfer (WPT) technology in recent years. With the use of capacitive plates as a coupling structure, ECPT systems have many advantages such as design flexibility, reduced volume of the coupling structure and metal penetration ability. In addition, wireless communications are effective solutions to improve the safety and controllability of ECPT systems. This paper proposes a power and signal shared channel for electric-field coupled power transfer systems. The shared channel includes two similar electrical circuits with a band pass filter and a signal detection resistor in each. This is designed based on the traditional current-fed push-pull topology. An analysis of the mutual interference between the power and signal transmission, the channel power and signal attenuations, and the dynamic characteristic of the signal channel are conducted to determine the values for the electrical components of the proposed shared channel. Experimental results show that the designed channel can transfer over 100W of output power and data with a data rate from 300bps to 120 kbps.

Development of an USN Based Integrated Open Server System for Disaster Prevention Management (USN 기반 개방형 방재관리 통합시스템 개발)

  • Lee, Jeong-Kyoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.929-932
    • /
    • 2007
  • The integrated prevention of disaster management system is collected prevention of disaster data from prevention of disaster relation other systems and smart sensor in USN. This system manages fire fighting facility effectively. The relation equipment which is used in existing and network using "Open Protocols" about under using the support system which is integrated effectively as the destroyer. It connects CCTV, the sensitivity environmental sensor, automatic fire detection equipment and security equipment and air flow equipment system using Internet. The System Server was collected monitoring data at the each equipment and processing by operational scenario. It will verified the effectiveness of operational scenario and integrated prevention of disaster management system

  • PDF

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.