• 제목/요약/키워드: Security essential information

검색결과 491건 처리시간 0.025초

사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링 (Attacker and Host Modeling for Cyber-Attack Simulation)

  • 정정례;이장세;박종서;지승도
    • 한국시뮬레이션학회논문지
    • /
    • 제12권2호
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • 제6권3호
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

Prediction of Protein-Protein Interactions from Sequences using a Correlation Matrix of the Physicochemical Properties of Amino Acids

  • Kopoin, Charlemagne N'Diffon;Atiampo, Armand Kodjo;N'Guessan, Behou Gerard;Babri, Michel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.41-47
    • /
    • 2021
  • Detection of protein-protein interactions (PPIs) remains essential for the development of therapies against diseases. Experimental studies to detect PPI are longer and more expensive. Today, with the availability of PPI data, several computer models for predicting PPIs have been proposed. One of the big challenges in this task is feature extraction. The relevance of the information extracted by some extraction techniques remains limited. In this work, we first propose an extraction method based on correlation relationships between the physicochemical properties of amino acids. The proposed method uses a correlation matrix obtained from the hydrophobicity and hydrophilicity properties that it then integrates in the calculation of the bigram. Then, we use the SVM algorithm to detect the presence of an interaction between 2 given proteins. Experimental results show that the proposed method obtains better performances compared to the approaches in the literature. It obtains performances of 94.75% in accuracy, 95.12% in precision and 96% in sensitivity on human HPRD protein data.

Health Care Optimization by Maximizing the Air-Ambulance Operation Time

  • Melhim, Loai Kayed B.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.357-361
    • /
    • 2022
  • Employing the available technologies and utilizing the advanced means to improve the level of health care provided to citizens in their various locations. Citizens have the right to get a proper health care services despite the location of their residency or the distance from the health care delivery centers, a goal that can be achieved by utilizing air ambulance systems. In such systems, aircrafts and their life spans are the essential component, the flight duration of the aircraft during its life span is determined by the maintenance schedule. This research, enhances the air ambulance systems by presenting a proposal that maximizes the aircraft flight duration during its life span. The enhancement will be reached by developing a set of algorithms that handles the aircraft maintenance problem. The objective of these algorithms is to minimize the maximum completion time of all maintenance tasks, thus increasing the aircraft operation time. Practical experiments performed to these algorithms showed the ability of these algorithms to achieve the desired goal. The developed algorithms will manage the maintenance scheduling problem to maximize the uptime of the air ambulance which can be achieved by maximizing the minimum life of spare parts. The developed algorithms showed good performance measures during experimental tests. The 3LSL algorithm showed a higher performance compared to other algorithms during all performed experiments.

Modeling Of Management Decisions Of Organization Of Production Systems

  • Arutiunian, Yevhen;Mikhailutsa, Olena;Pozhuyev, Andriy;Аzhazha, Maryna;Arutiunian, Iryna;Zrybnieva, Iryna;Slyva, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.87-92
    • /
    • 2021
  • Analysis of current state of construction industry functioning in Ukraine allows us to identify a number of problems having negative impact on sustainable development of construction industry, especially in terms of its organization. Therefore, it is absolutely essential to study existing methods of organization system supplying construction sites with necessary material resources. Companies can develop their own logistics departments, which independently solve logistics issues related to transportation organization and management, accounting and inventory management, acquisition and warehousing, intercommunication (ability to obtain both final and intermediate information during transporting materials). Using a complex of methods is substantiated: the hierarchy analysis method (Saati's method), the network method, the defect elimination algorithm DEA, the transportation problem that finds optimal problem solutions for construction sector with the purpose of rational supplying uninterrupted construction with building resources in the designed model "provider-transportation-costs".

Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment - A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.147-158
    • /
    • 2022
  • Cloud Computing offers flexible, on demand, ubiquitous resources for cloud users. Cloud users are provided computing resources in a virtualized environment. In order to meet the growing demands for computing resources, data centres contain a large number of physical machines accommodating multiple virtual machines. However, cloud data centres cannot utilize their computing resources to their total capacity. Several policies have been proposed for improving energy proficiency and computing resource utilization in cloud data centres. Virtual machine placement is an effective method involving efficient mapping of virtual machines to physical machines. However, the availability of many physical machines accommodating multiple virtual machines in a data centre has made the virtual machine placement problem a non deterministic polynomial time hard (NP hard) problem. Metaheuristic algorithms have been widely used to solve the NP hard problems of multiple and conflicting objectives, such as the virtual machine placement problem. In this context, we presented essential concepts regarding virtual machine placement and objective functions for optimizing different parameters. This paper provides a taxonomy of metaheuristic algorithms for the virtual machine placement method. It is followed by a review of prominent research of virtual machine placement methods using meta heuristic algorithms and comparing them. Finally, this paper provides a conclusion and future research directions in virtual machine placement of cloud computing.

B2B 전자무역대금결제시스템 비교.분석에 관한 연구 (A Comparison Analytical Study on the B2B Electronic Trade Settlement System)

  • 송용종
    • 경영과정보연구
    • /
    • 제14권
    • /
    • pp.151-180
    • /
    • 2004
  • Owing to the digital revolution, Internet Commerce and Electronic commerce, revolutionize the way of doing business and making payment. The entrance of the Internet has a prominent for spread of Electronic Commerce and those phenomenons will result in paperless trading and cashless trade. By virtue of Internet, an increasing share of business transactions occurs online. Electronic payment is essential for the smooth progress of the electronic commerce as electronic payment plays the important role in the electronic commerce, that is, the value transfer restyling from the electronic commerce. Traditionally international settlement systems such as letters of credits, remittance and documentary collections operated as important and poplar method of payment, Now, information technology has made it possible to pay for the sale of goods and services over the internet. In international trade, there are service providers (bolero, TradeCard, BeXcom) to settle payment electronically through the Internet. The purpose of this study is to Conduct comparative analysis with approach manner functional respect systematic respect, role. It is shown which the Electronic payment system is better. In this study, the author attempts to find the problems is (bolero, TradeCard, BeXcom) and solutions in switching from the documentary payment system to the electronic one. This conclusion of this study can be summarized as followings. In resoect of the law, bolero should seek to prevert the users from being treated unfairly due to multilateral agreement on Rulebook. TradeCard, BeXcom do not have the proper law that users are governed. so far as the practice problems concerned, stability of computer's operation and security of message interchange should be warranted and improved continuously. Through the standardization of the electronic document and the development of software, the examination of the shipping occuments must be done automatically. Bolero should induce more banks to take part in Bolero, and make the carrier the cost and time in managing the traditional document which will be used for the time being. In respect of information technology and security, to deduce the risk in the electronic settlement system and positively uses the global authentication guideline(Identrus).

  • PDF

응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구 (A Study of Logical Network Monitoring System Architecture for Research Group)

  • 강현중;김현철
    • 융합보안논문지
    • /
    • 제12권3호
    • /
    • pp.75-83
    • /
    • 2012
  • 높은 네트워크 대역폭과 고품질을 요구하는 고에너지 물리, 기상 기후 등과 같은 특정 연구 그룹간의 논리 네트워크를 구축하여, 일종의 특정 그룹별 사설 네트워크 구축과 운용이 최근 많이 요구되고 있다. 지금까지 국내에서는 KREONET과 같은 국가연구망이 중심이 되어 이러한 대용량 사설 네트워크 서비스를 제공하고 있으나 이러한 사설 네트워크에 대한 체계적이고 표준화된 구축 및 관리 방법이 없어 이에 대한 체계적인 연구가 시급한 실정이다. 이를 위해 본 논문은 L2 기반에서 다양한 그룹별 논리 네트워크를 구성하는 핵심 서비스 요소와 표준 프로토콜을 제시하고, 구성된 논리 네트워크 정보를 관리 모니터링 할 수 있는 시스템 구조를 제시하였다. 또한 본 논문은 네트워크 인프라 자원과 관련된 망의 운영정보, 구성정보, 성능정보, 장애정보 등에 대한 정보를 통합적으로 관리할 수 있는 표준화된 명세시스템 구조를 제시하였다.

차분 프라이버시를 만족하는 안전한 GAN 기반 재현 데이터 생성 기술 연구 (A Study on Synthetic Data Generation Based Safe Differentially Private GAN)

  • 강준영;정수용;홍도원;서창호
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.945-956
    • /
    • 2020
  • 많은 응용프로그램들로부터 양질의 서비스를 제공받기 위해서 데이터 공개는 필수적이다. 하지만 원본 데이터를 그대로 공개할 경우 개인의 민감한 정보(정치적 성향, 질병 등)가 드러날 위험이 있기 때문에 원본 데이터가 아닌 재현 데이터를 생성하여 공개함으로써 프라이버시를 보존하는 많은 연구들이 제안되어왔다. 그러나 단순히 재현 데이터를 생성하여 공개하는 것은 여러 공격들(연결공격, 추론공격 등)에 의해 여전히 프라이버시 유출 위험이 존재한다. 본 논문에서는 이러한 민감한 정보의 유출을 방지하기 위해, 재현 데이터 생성 모델로 주목받고 있는 GAN에 최신 프라이버시 보호 기술인 차분 프라이버시를 적용하여 프라이버시가 보존되는 재현 데이터 생성 알고리즘을 제안한다. 생성 모델은 레이블이 있는 데이터의 효율적인 학습을 위해 CGAN을 사용하였고, 데이터의 유용성 측면을 고려하여 기존 차분 프라이버시보다 프라이버시가 완화된 Rényi 차분 프라이버시를 적용하였다. 그리고 생성된 데이터의 유용성에 대한 검증을 다양한 분류기를 통해 실시하고 비교분석하였다.

중국 모바일 보험 플랫폼 개미 보험청구에 관한 사용자 경험 연구 -알리페이 중심으로- (A Study on User Experience on Ant Insurance Claims China's Mobile Insurance Platform -Focused on Alipay-)

  • 손영호;김승인
    • 디지털융복합연구
    • /
    • 제19권9호
    • /
    • pp.317-322
    • /
    • 2021
  • 본 연구는 중국의 알리페이 개미 보험 플랫폼 청구 현황을 파악하여 사용자 중심으로 분석하고 개선 방향을 제시하는 데 목적이 있다. 보험 절차 중 청구는 가장 이의가 발생하기 쉬운 부분으로 사용자 측면의 연구가 필요하다. 본 연구에서는 모바일 보험 플랫폼을 주로 서용하는 중국 20-40대 사용자에 대한 정보시스템 성공모형(Information systems success model) 측정 항목에 대한 설문 조사와 심층 인터뷰를 진행했다. 연구 결과 건강보험은 가입자 보험청구 중 가장 어려운 보험으로, 보험청구 중 보안과 정보가 주된 영향을 미치는 것으로 나타났다. 개선 방향으로 플랫폼 보안 측면에서는 사용자에게 선택권을 더 주고 플랫폼 정보 측면에서는 이의제기 정보를 상세하고 투명하게 처리해야 한다. 본 연구는 모바일 보험 플랫폼 및 보험청구 사용자 경험에 관한 연구 자료로써 활용되기를 기대한다.