• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.026 seconds

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

A Study on implementation model for security log analysis system using Big Data platform (빅데이터 플랫폼을 이용한 보안로그 분석 시스템 구현 모델 연구)

  • Han, Ki-Hyoung;Jeong, Hyung-Jong;Lee, Doog-Sik;Chae, Myung-Hui;Yoon, Cheol-Hee;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.351-359
    • /
    • 2014
  • The log data generated by security equipment have been synthetically analyzed on the ESM(Enterprise Security Management) base so far, but due to its limitations of the capacity and processing performance, it is not suited for big data processing. Therefore the another way of technology on the big data platform is necessary. Big Data platform can achieve a large amount of data collection, storage, processing, retrieval, analysis, and visualization by using Hadoop Ecosystem. Currently ESM technology has developed in the way of SIEM (Security Information & Event Management) technology, and to implement security technology in SIEM way, Big Data platform technology is essential that can handle large log data which occurs in the current security devices. In this paper, we have a big data platform Hadoop Ecosystem technology for analyzing the security log for sure how to implement the system model is studied.

A Tor Security Policy using Exit Relay Methodology (출구 릴레이 방법론을 이용한 Tor 보안 정책)

  • Jang, Duk-Sung;Park, So-Yeon;Choi, Du-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

A study on Korean welfare policy examined through Mokminsimseo (목민심서를 통해 한국적 복지정책에 대한 연구)

  • kim Bong wha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.669-674
    • /
    • 2023
  • This study examined the specific contents of social welfare policies of the Joseon Dynasty through the analysis of Mokminsimseo, Aemin Sixjo and Jinhwang Yukjo, and identified the connection between them and today's social welfare policies. As a result, In the Care of the People, it contained the basic contents of the Elderly Welfare Act and welfare services for the elderly, and in the Freedom, it included welfare policy services related to infants and children, and the value system of welfare for the disabled through government affairs. The policy direction was confirmed, and it was found that disaster relief calls for social integration in response to social crises and disasters. This also confirmed that major areas of social welfare policy such as family safety, income security, health policy, and social integration have been emphasized through social welfare policy indicators. In addition, through the analysis of Qinhwangyukjo, it was found that it contains not only the basic ideology and values of the social security system and social insurance system in terms of visa, scale, and power, but also the details of specific policy implementation. Today's social welfare policies and social service policies, which are equipped with social welfare facilities and are implementing systematic social welfare services for each target, were able to confirm their foundation through the Qinhwangyukjo. This confirms that the emphasis on social integration and income security is prominent in the Qinhwangyukjo through the social welfare policy indicators of the current policy system.

The Verification in Security Protocol for Security Continuity Management (정보보호의 연속성관리를 위한 보안프로토콜 검증)

  • Shin, Seung-Jung;Song, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.445-448
    • /
    • 2001
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using security continuity management Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Sensitivity studies on a novel nuclear forensics methodology for source reactor-type discrimination of separated weapons grade plutonium

  • Kitcher, Evans D.;Osborn, Jeremy M.;Chirayath, Sunil S.
    • Nuclear Engineering and Technology
    • /
    • v.51 no.5
    • /
    • pp.1355-1364
    • /
    • 2019
  • A recently published nuclear forensics methodology for source discrimination of separated weapons-grade plutonium utilizes intra-element isotope ratios and a maximum likelihood formulation to identify the most likely source reactor-type, fuel burnup and time since irradiation of unknown material. Sensitivity studies performed here on the effects of random measurement error and the uncertainty in intra-element isotope ratio values show that different intra-element isotope ratios have disproportionate contributions to the determination of the reactor parameters. The methodology is robust to individual errors in measured intra-element isotope ratio values and even more so for uniform systematic errors due to competing effects on the predictions from the selected intra-element isotope ratios suite. For a unique sample-model pair, simulation uncertainties of up to 28% are acceptable without impeding successful source-reactor discrimination. However, for a generic sample with multiple plausible sources within the reactor library, uncertainties of 7% or less may be required. The results confirm the critical role of accurate reactor core physics, fuel burnup simulations and experimental measurements in the proposed methodology where increased simulation uncertainty is found to significantly affect the capability to discriminate between the reactors in the library.

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Chandrasekaran, Balaji;Balakrishnan, Ramadoss;Nogami, Yasuyuki
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.465-472
    • /
    • 2019
  • The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

A Study on Public Data Quality Factors Affecting the Confidence of the Public Data Open Policy (공공데이터 품질 요인이 공공데이터 개방정책의 신뢰에 미치는 영향에 관한 연구)

  • Kim, Hyun Cheol;Gim, Gwang Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.53-68
    • /
    • 2015
  • This article aims to identify the quality factors of public data which have increased as a public issue; analyze the impact of users satisfaction in the perspective of Technology Acceptance Model (TAM), and investigate the effect of service satisfaction on the government's open policy of public data. This study is consistent with Total Data Quality Management (TDQM) of MIT, it focuses on three main qualities except Contextual Data Quality (CDQ) and includes seven independent variables : accuracy, reliability, fairness for Intrinsic Data Quality (IDQ), accessibility, security for Accessibility Data Quality (ADQ), Consistent representation and understandability for Representational Data Quality (RDQ). Basing on TAM, the research model was conducted to examine which factors affect to perceived usefulness, perceived ease of use, service satisfaction and how service satisfaction affects to the government's open policy of public data. The results showed that accuracy, fairness, understandability affect both perceived ease of use and perceived usefulness; while reliability, consistent representation, security, and accessibility affect only perceived ease of use. This article found that the influence of perceived ease of use on perceived usefulness and the influence of these two causes on service satisfaction in the perspective of TAM were significant and it was consistent with prior studies. The service satisfaction when using public data leads to the reliability of public data open policy. As an initial study on unstructured public data open policy, this article offered quality factors that pubic data providers should consider and also present the operation plan of public data open policy in the future.