• Title/Summary/Keyword: Security Scoring

Search Result 34, Processing Time 0.022 seconds

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

사이버 위협 사전인지를 위한 위협 정량화 기술

  • Kim, Kiyoung;Lim, Sun-Hee;Kim, Jong-Hyun
    • Review of KIISC
    • /
    • v.22 no.8
    • /
    • pp.15-20
    • /
    • 2012
  • 최근 고도의 지능적인 대량 공격이 지속적으로 발생하고 있으며, 다형성 악성코드 공격 증가로 인하여 개인과 기업 및 국가 기반시설까지 사이버위협에 노출되고 있다. 현재, 국가차원의 대응센터에서는 이러한 위협 대응을 위해 공격 위험도를 CVSS(Common Vulnerability Scoring System) 취약점 등급시스템으로 점수화하여 단계적으로 경보를 발령한다. 하지만 현재의 경보발령 체계가 공격이 이루어진 후 사후 대책으로 제공되고 있어, 공격발생 전에 공격 징후를 포착하거나 공격량 예측과 같은 전역 네트워크 차원의 위협에 대한 대응 기술은 미비하다. 본 논문에서는 최근 봇넷 기반의 공격들이 많아지고 있는 상황에서 봇넷을 네트워크 위협 전조증상으로 정의하고, NCSC(National Cyber Security Center), KrCERT와 같은 국가기관의 경보등급 산정체계를 기반으로 전역차원의 예 경보 발령 및 공격량 예측 시스템에 대해 연구한다.

Scoring Method of Fingerprint Image Quality using Classified Block-level Characteristics (블록 레벨의 분류 특성을 이용한 지문 영상의 품질 측정 방법)

  • Moon, Ji-Hyun;Kim, Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.29-40
    • /
    • 2007
  • The purpose of this research is to propose a method for scoring the quality of a fingerprint image using the local information derived from the fingerprint image. In previous works for the quality measuring, most of the quality scores are related to the performance of a matching algorithm, and this makes the quality result more subjective. The quality score of a fingerprint image proposed in this work is sensor-independent, source-independent and matcher-independent one, and this concept of fingerprint sample quality results in effective improvement of the system performance. In this research, a new definition of fingerprint image quality and a new method for measuring the quality are proposed. For the experiments, several sub-databases from FVCs are used and the proposed method showed reasonable results for the test database. The proposed method can be used in various systems for the numerous purposes since the quality scores generated by the proposed method are based on the idea that the quality of fingerprint should be sensor-independent, source-independent and matcher-independent.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.

A Hybrid Recommendation System based on Fuzzy C-Means Clustering and Supervised Learning

  • Duan, Li;Wang, Weiping;Han, Baijing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2399-2413
    • /
    • 2021
  • A recommendation system is an information filter tool, which uses the ratings and reviews of users to generate a personalized recommendation service for users. However, the cold-start problem of users and items is still a major research hotspot on service recommendations. To address this challenge, this paper proposes a high-efficient hybrid recommendation system based on Fuzzy C-Means (FCM) clustering and supervised learning models. The proposed recommendation method includes two aspects: on the one hand, FCM clustering technique has been applied to the item-based collaborative filtering framework to solve the cold start problem; on the other hand, the content information is integrated into the collaborative filtering. The algorithm constructs the user and item membership degree feature vector, and adopts the data representation form of the scoring matrix to the supervised learning algorithm, as well as by combining the subjective membership degree feature vector and the objective membership degree feature vector in a linear combination, the prediction accuracy is significantly improved on the public datasets with different sparsity. The efficiency of the proposed system is illustrated by conducting several experiments on MovieLens dataset.

Application of peak based-Bayesian statistical method for isotope identification and categorization of depleted, natural and low enriched uranium measured by LaBr3:Ce scintillation detector

  • Haluk Yucel;Selin Saatci Tuzuner;Charles Massey
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3913-3923
    • /
    • 2023
  • Todays, medium energy resolution detectors are preferably used in radioisotope identification devices(RID) in nuclear and radioactive material categorization. However, there is still a need to develop or enhance « automated identifiers » for the useful RID algorithms. To decide whether any material is SNM or NORM, a key parameter is the better energy resolution of the detector. Although masking, shielding and gain shift/stabilization and other affecting parameters on site are also important for successful operations, the suitability of the RID algorithm is also a critical point to enhance the identification reliability while extracting the features from the spectral analysis. In this study, a RID algorithm based on Bayesian statistical method has been modified for medium energy resolution detectors and applied to the uranium gamma-ray spectra taken by a LaBr3:Ce detector. The present Bayesian RID algorithm covers up to 2000 keV energy range. It uses the peak centroids, the peak areas from the measured gamma-ray spectra. The extraction features are derived from the peak-based Bayesian classifiers to estimate a posterior probability for each isotope in the ANSI library. The program operations were tested under a MATLAB platform. The present peak based Bayesian RID algorithm was validated by using single isotopes(241Am, 57Co, 137Cs, 54Mn, 60Co), and then applied to five standard nuclear materials(0.32-4.51% at.235U), as well as natural U- and Th-ores. The ID performance of the RID algorithm was quantified in terms of F-score for each isotope. The posterior probability is calculated to be 54.5-74.4% for 238U and 4.7-10.5% for 235U in EC-NRM171 uranium materials. For the case of the more complex gamma-ray spectra from CRMs, the total scoring (ST) method was preferred for its ID performance evaluation. It was shown that the present peak based Bayesian RID algorithm can be applied to identify 235U and 238U isotopes in LEU or natural U-Th samples if a medium energy resolution detector is was in the measurements.

A Study on Unconstitutionality of Insurance Premium Rating System in Accordance with National Health Insurance Act. - Focused on Age and Gender in Premium Rating Standards Activity Rate and Living Standards of the Local Insured - (국민건강보험법상 보험료부과체계에 관한 법적 고찰 -지역가입자 생활수준 및 경제활동 참가율 부과기준 중 성과 연령을 중심으로 -)

  • Song, Kimin;Jeong, Jeong-Ile
    • The Korean Society of Law and Medicine
    • /
    • v.15 no.1
    • /
    • pp.185-209
    • /
    • 2014
  • While the local health insurance and the employment-based insurance were integrated in July 2000, the insured is divided into employment-based insured and the local insured and the relevant premium has been applied to both groups. The health insurance premium having the feature of social solidarity has to be determined depending on income, that is, the ability to pay in accordance with the principles of social insurance. While employment-based insurance premium has been determined depending on the earned income, the local insurance premium for the local insured has been determined by scoring gross income(evaluated income), property and possession of automobiles. A variety of improvement approaches has been implemented including introduction of the employment-based insurance premium ceiling system (2002) and the change of property scoring system for the local insured (2006). However, the health insurance system which was merged in 2000 has been implemented up to now without significant change even though there were lots of socio-demographic change including increase of income level and the population structure such as low birth and aging. In other words, it is required to implement the premium rating system securing the income-based equity. Nevertheless, it was inevitable to apply the diverse rating standards in the early stage because it was very difficult to verify the income of the self-employed. Although the income verification rate was significantly increased from 23% in 1989 to 44% in 2010, the irrational standards including property, automobiles, living standard and activity rate have been still applied to the local insured because it is difficult to secure the validity of insurance premium rating system and it severely lacks of security. This paper investigated whether the current insurance premium rating system for the local insured imposing the premium on the basis of 'gender' and 'age' complies with the basic human rights secured by the current Constitution of the Republic of Korea with respect to the practical and theoretic irrationality of insurance premium rating system and standards for he local insured. In accordance with the analysis results, this paper proposed the approach to improve the system.

  • PDF

Structures and Competitiveness of Softwood Products in Korean Import Market (우리나라 수입(輸入) 침엽수재(針葉樹材) 시장구조(市場構造) 및 수종별(樹種別) 경쟁력(競爭力))

  • Kim, Wae-Jung
    • Journal of the Korean Wood Science and Technology
    • /
    • v.19 no.4
    • /
    • pp.34-42
    • /
    • 1991
  • Protection of tropical forest affects on significant reduce of tropical hardwood supply, and softwood resources will be increasingly important for the timber security in Korea. U.S. softwood log was most favorite species for Korean softwood log importers in overall import conditions except price stablization and consistency of export policy. Reduced export volume from Pacific Northwest to Korean market has been immediately replenished by rediata pine from New Zealand and Chilean plantation. Siberian timber will hardly play major roles in Korean timber market unless budding structure. softwood plywood and softwood furniture uses are enhanced. Recent rapid rise of labor cost and reducing tariff rrate in Korea provided better opportunities for import lumber in building materials market. Dry dimension lumber was relatively profitable when processed from import U.S. soft-wood log while green lumber was favorable products processed from radiata pine log in Korean lumber market. This means U.S. softwood lumber would have better opportunity to market for '2${\times}$'4 studs when wood frame housing is introduced. On the other hand while radiata pine is competitive on temporary construction lumber such as supporter and concrete forming frame in Korea. Shortage of raw material for the new capacity of board plants in Korea will be it bottle neck. Major log export countries to Korea as U.S. New Zealand and Chile showed high trade intensity indices of composite hoard produces for Korean market. As Korea efforts to diversify import sources, and tariffs are reduced to 8% as scheduled by 1994. countries of scoring higher comparative advantages as Portugal. Brazil, Austria as well as New Zealand will have better opportunity to penetrate into promised Korean composites hoard market.

  • PDF