• 제목/요약/키워드: Security essential information

Search Result 491, Processing Time 0.021 seconds

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

A New Model for Codes of Ethics for Librarians of South Korea (한국의 사서직 윤리규정 방향 제안)

  • Kim, Hae-Kyoung;Nam, Tae-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.329-352
    • /
    • 2004
  • In this knowledge-based society of this age, librarianship takes a professional position and requires essential principles of ethics that has to be observed. Therefore, library associations and professional communities all over the world have released criteria and code of ethics to make their professional positions to keep. This research investigated and analyzed the codes of ethics for librarians in United States, Great Britain, Japan, and South Korea which are based on the mission of each library of each country. Based on these analysis and comparison, this research proposed more advanced codes of ethics for South Korea. The proposed model of codes of ethics consists of two parts: ethics for information and ethics for professional positions. The ethics for information contains six essential elements: equal access and services for information, denial of inspection, protection of privacy, neutralization of librarian, and security of intellectual freedom. The ethics for professional positions consists of 8 essential aspects: exclusion of personal benefit, continuous efforts for developing knowledge, keep the professional position, conflicts between professional task and organization, relationship with co-workers, ensure the conditions of rights and welfare for employees, cooperations among libraries, and contribution for creation of new culture.

Stock Forecasting Using Prophet vs. LSTM Model Applying Time-Series Prediction

  • Alshara, Mohammed Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.185-192
    • /
    • 2022
  • Forecasting and time series modelling plays a vital role in the data analysis process. Time Series is widely used in analytics & data science. Forecasting stock prices is a popular and important topic in financial and academic studies. A stock market is an unregulated place for forecasting due to the absence of essential rules for estimating or predicting a stock price in the stock market. Therefore, predicting stock prices is a time-series problem and challenging. Machine learning has many methods and applications instrumental in implementing stock price forecasting, such as technical analysis, fundamental analysis, time series analysis, statistical analysis. This paper will discuss implementing the stock price, forecasting, and research using prophet and LSTM models. This process and task are very complex and involve uncertainty. Although the stock price never is predicted due to its ambiguous field, this paper aims to apply the concept of forecasting and data analysis to predict stocks.

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.

A Quantitative Approach for Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.133-139
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a quantitative method for analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

AN EFFECTIVE SEGMENT PRE-FETCHING FOR SHORT-FORM VIDEO STREAMING

  • Nguyen Viet Hung;Truong Thu Huong
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.81-93
    • /
    • 2023
  • The popularity of short-form video platforms like TikTok has increased recently. Short-form videos are significantly shorter than traditional videos, and viewers regularly switch between different types of content to watch. Therefore, a successful prefetching strategy is essential for this novel type of video. This study provides a resource-effective prefetching technique for streaming short-form videos. The suggested solution dynamically adjusts the quantity of prefetched video data based on user viewing habits and network traffic conditions. The results of the experiments demonstrate that, in comparison to baseline approaches, our method may reduce data waste by 21% to 83%, start-up latency by 50% to 99%, and the total time of Re-buffering by 90% to 99%.

Developing a Framework for Detecting Phishing URLs Using Machine Learning

  • Nguyen Tung Lam
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.157-163
    • /
    • 2023
  • The attack technique targeting end-users through phishing URLs is very dangerous nowadays. With this technique, attackers could steal user data or take control of the system, etc. Therefore, early detecting phishing URLs is essential. In this paper, we propose a method to detect phishing URLs based on supervised learning algorithms and abnormal behaviors from URLs. Finally, based on the research results, we build a framework for detecting phishing URLs through end-users. The novelty and advantage of our proposed method are that abnormal behaviors are extracted based on URLs which are monitored and collected directly from attack campaigns instead of using inefficient old datasets.

A Bibliometric Analysis Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.162-168
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a bibliometric analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

A Parallel Algorithm for Finding Routes in Cities with Diagonal Streets

  • Hatem M. El-Boghdadi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.45-51
    • /
    • 2024
  • The subject of navigation has drawn a large interest in the last few years. The navigation within a city is to find the path between two points, source location and destination location. In many cities, solving the routing problem is very essential as to find the route between different locations (starting location (source) and an ending location (destination)) in a fast and efficient way. This paper considers streets with diagonal streets. Such streets pose a problem in determining the directions of the route to be followed. The paper presents a solution for the path planning using the reconfigurable mesh (R-Mesh). R-Mesh is a parallel platform that has very fast solutions to many problems and can be deployed in moving vehicles and moving robots. This paper presents a solution that is very fast in computing the routes.