• 제목/요약/키워드: Security Works

검색결과 394건 처리시간 0.027초

A Study on the Intrustion Tolerance System Applied To the Security System

  • Shin Seung-jung;Kim Jung-tae;Ryu Dae-hyun;Na Jong-Whoa
    • Journal of information and communication convergence engineering
    • /
    • 제3권1호
    • /
    • pp.38-42
    • /
    • 2005
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

전력 계통 이상 상태 Guidance System 개발 (A Development of On-Line Guidance System for Power System)

  • 오승렬;백영식;김정년;한무호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.47-49
    • /
    • 2002
  • Recently, the power system has a trend of a sustaining growth in electric power demand with large-sized formation. In this situation, current states can be definitely comprehended to operate security and economic power system. Also, corrective actions must be performed for the violation of bus voltage and line overload. In the security and economy with on-line, It is desirable that the situations of violation are promptly removed to operate power system effectively. This paper deals with the development of application, Kangyang Steel Works' Power System Guidance System, for voltage and overload correction on base case using Generator-Voltage Sensitivity List(GVSL) and Generator Shifter Factor List(GSFL). Also, to show the superiority and economical efficiency of the proposed application, we simulate the Kangyang Steel Works' Power System.

  • PDF

Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution

  • Dong, Keming;Kim, Hyoung Joong;Choi, Yong Soo;Joo, Sang Hyun;Chung, Byung Ho
    • ETRI Journal
    • /
    • 제37권5호
    • /
    • pp.990-1000
    • /
    • 2015
  • This paper presents an overlapping pattern substitution (PS) method. The original overlapping PS method as a reversible data hiding scheme works well with only four pattern pairs among fifteen possible such pairs. This paper generalizes the original PS method so that it will work well with an optimal pair from among the fifteen possible pattern pairs. To implement such an overlapping PS method, changeable and embeddable patterns are first defined. A class map is virtually constructed to identify the changeable and embeddable pairs. The run-lengths between consecutive least probable patterns are recorded. Experiments show that an implementation of our overlapping PS method works well with any possible type of pairs. Comparison results show that the proposed method achieves more embedding capacity, a higher PSNR value, and less human visual distortion for a given embedding payload.

A Survey of Arabic Thematic Sentiment Analysis Based on Topic Modeling

  • Basabain, Seham
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.155-162
    • /
    • 2021
  • The expansion of the world wide web has led to a huge amount of user generated content over different forums and social media platforms, these rich data resources offer the opportunity to reflect, and track changing public sentiments and help to develop proactive reactions strategies for decision and policy makers. Analysis of public emotions and opinions towards events and sentimental trends can help to address unforeseen areas of public concerns. The need of developing systems to analyze these sentiments and the topics behind them has emerged tremendously. While most existing works reported in the literature have been carried out in English, this paper, in contrast, aims to review recent research works in Arabic language in the field of thematic sentiment analysis and which techniques they have utilized to accomplish this task. The findings show that the prevailing techniques in Arabic topic-based sentiment analysis are based on traditional approaches and machine learning methods. In addition, it has been found that considerably limited recent studies have utilized deep learning approaches to build high performance models.

Distributed Incremental Approximate Frequent Itemset Mining Using MapReduce

  • Mohsin Shaikh;Irfan Ali Tunio;Syed Muhammad Shehram Shah;Fareesa Khan Sohu;Abdul Aziz;Ahmad Ali
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.207-211
    • /
    • 2023
  • Traditional methods for datamining typically assume that the data is small, centralized, memory resident and static. But this assumption is no longer acceptable, because datasets are growing very fast hence becoming huge from time to time. There is fast growing need to manage data with efficient mining algorithms. In such a scenario it is inevitable to carry out data mining in a distributed environment and Frequent Itemset Mining (FIM) is no exception. Thus, the need of an efficient incremental mining algorithm arises. We propose the Distributed Incremental Approximate Frequent Itemset Mining (DIAFIM) which is an incremental FIM algorithm and works on the distributed parallel MapReduce environment. The key contribution of this research is devising an incremental mining algorithm that works on the distributed parallel MapReduce environment.

효과적인 위협관리를 위한 보안 위험도 평가기법 (Security Risk Evaluation Scheme for Effective Threat Management)

  • 강필용
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제36권5호
    • /
    • pp.380-386
    • /
    • 2009
  • 중요 IT 자산에 대한 보안성 강화를 위해서는 관련 위협(또는 취약점)의 식별 및 이에 대한 보안 대비책의 적정성 분석이 선행되어야 한다. 이를 위해 본 논문에서는 자산 및 위협에 기반한 보안 위험도 평가기법을 제안한다. 제안한 기법은 식별된 자산 및 위협 관련 공격시도 탐지와 취약점 점검 등의 대응 범위 및 수준의 사전 점검과 정량적인 위험도 평가를 제공함으로써 기존 연구에 비해 효과적으로 위협관리 업무에 활용될 것으로 기대된다.

IOMMU Para-Virtualization for Efficient and Secure DMA in Virtual Machines

  • Tang, Hongwei;Li, Qiang;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5375-5400
    • /
    • 2016
  • IOMMU is a hardware unit that is indispensable for DMA. Besides address translation and remapping, it also provides I/O virtual address space isolation among devices and memory access control on DMA transactions. However, currently commodity virtualization platforms lack of IOMMU virtualization, so that the virtual machines are vulnerable to DMA security threats. Previous works focus only on DMA security problem of directly assigned devices. Moreover, these solutions either introduce significant overhead or require modifications on the guest OS to optimize performance, and none can achieve high I/O efficiency and good compatibility with the guest OS simultaneously, which are both necessary for production environments. However, for simulated virtual devices the DMA security problem also exists, and previous works cannot solve this problem. The reason behind that is IOMMU circuits on the host do not work for this kind of devices as DMA operations of which are simulated by memory copy of CPU. Motivated by the above observations, we propose an IOMMU para-virtualization solution called PVIOMMU, which provides general functionalities especially DMA security guarantees for both directly assigned devices and simulated devices. The prototype of PVIOMMU is implemented in Qemu/KVM based on the virtio framework and can be dynamically loaded into guest kernel as a module, As a result, modifying and rebuilding guest kernel are not required. In addition, the device model of Qemu is revised to implement DMA access control by separating the device simulator from the address space of the guest virtual machine. Experimental evaluations on three kinds of network devices including Intel I210 (1Gbps), simulated E1000 (1Gbps) and IB ConnectX-3 (40Gbps) show that, PVIOMMU introduces little overhead on DMA transactions, and in general the network I/O performance is close to that in the native KVM implementation without IOMMU virtualization.

민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구 (A Study on the Procedure Model to Carry on Works of the Private Security Company)

  • 이상철;김태민
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

다중 가중치를 적용한 웹 기반 정보보호수준 측정 도구 설계 및 구현 ((Design and Implementation of a Web-Based Tool for Information Security Levelling with Multiple Weights))

  • 성경;최상용;소우영;김성옥
    • 한국컴퓨터산업학회논문지
    • /
    • 제3권9호
    • /
    • pp.1315-1328
    • /
    • 2002
  • 최근 보안 사고가 증가됨에 따라 조직의 효율적인 정보보호 관리를 위한 보안수준 측정 방법 및 도구의 개발에 대한 요구가 높아 가고 있다. 그러나 대부분 외국의 연구로서 수준 측정을 위한 항목 구성이 우리 조직의 실정에 맞지 않고 또한 도구 역시 사용의 편이성이나 경제성을 제공하지 못하고 있으며, 국내의 연구 또한 조직의 특성을 적절히 감안하지 못하고 있다. 따라서 본 논문에서는 최근 개발된 국내의 표준을 기초로 조직이 정보보호 관리체계를 구축하기 이전에 조직의 정보보호수준을 보다 정확하게 측정하기 위한 도구를 설계 구현하였다. 수준 측정 시 4가지의 다중 가중치를 조직의 특성에 따라 가변적으로 적용하여 측정결과의 정확성을 높였다.

  • PDF