• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.026 seconds

Prospects For the Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Oksana Rohach;Tetiana Pryhalinska;Iryna Kvasnytsya;Mykhailo Pohorielov;Mykola Rudnichenko; Olena Lastochkina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.179-183
    • /
    • 2024
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

Comparison on Patterns of Conflicts in the South China Sea and the East China Sea through Analysis on Mechanism of Chinese Gray Zone Strategy (중국의 회색지대전략 메커니즘 분석을 통한 남중국해 및 동중국해 분쟁 양상 비교: 시계열 데이터에 근거한 경험적 연구를 중심으로)

  • Cho, Yongsu
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.273-310
    • /
    • 2020
  • This study aims at empirically analyzing the overall mechanism of the "Gray Zone Strategy", which has begun to be used as one of Chinese major maritime security strategies in maritime conflicts surrounding the South China Sea and East China Sea since early 2010, and comparing the resulting conflict patterns in those reg ions. To this end, I made the following two hypotheses about Chinese gray zone strategy. The hypotheses that I have argued in this study are the first, "The marine gray zone strategy used by China shows different structures of implementation in the South China Sea and the East China Sea, which are major conflict areas.", the second, "Therefore, the patterns of disputes in the South China Sea and the East China Sea also show a difference." In order to examine this, I will classify Chinese gray zone strategy mechanisms multi-dimensionally in large order, 1) conflict trends and frequency of strategy execution, 2) types and strengths of strategy, 3) actors of strategy execution, and 4) response methods of counterparts. So, I tried to collect data related to this based on quantitative modeling to test these. After that, about 10 years of data pertaining to this topic were processed, and a research model was designed with a new categorization and operational definition of gray zone strategies. Based on this, I was able to successfully test all the hypotheses by successfully comparing the comprehensive mechanisms of the gray zone strategy used by China and the conflict patterns between the South China Sea and the East China Sea. In the conclusion, the verified results were rementioned with emphasizing the need to overcome the security vulnerabilities in East Asia that could be caused by China's marine gray zone strategy. This study, which has never been attempted so far, is of great significance in that it clarified the intrinsic structure in which China's gray zone strategy was implemented using empirical case studies, and the correlation between this and maritime conflict patterns was investigated.

  • PDF

Comparative study of acute in vitro and short-term in vivo triiodothyronine treatments on the contractile activity of isolated rat thoracic aortas

  • Lopez, Ruth Mery;Lopez, Jorge Skiold;Lozano, Jair;Flores, Hector;Carranza, Rosa Angelica;Franco, Antonio;Castillo, Enrique Fernando
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.24 no.4
    • /
    • pp.339-348
    • /
    • 2020
  • We aimed to characterize the participation of rapid non-genomic and delayed non-genomic/genomic or genomic mechanisms in vasoactive effects to triiodothyronine (T3), emphasizing functional analysis of the involvement of these mechanisms in the genesis of nitric oxide (NO) of endothelial or muscular origin. Influences of in vitro and in vivo T3 treatments on contractile and relaxant responsiveness of isolated rat aortas were studied. In vivo T3-treatment was 500 ㎍·kg-1·d-1, subcutaneous injection, for 1 (T31d) and 3 (T33d) days. In experiments with endothelium-intact aortic rings contracted with phenylephrine, increasing concentrations of T3 did not alter contractility. Likewise, in vitro T3 did not modify relaxant responses induced by acetylcholine or sodium nitroprusside (SNP) nor contractile responses elicited by phenylephrine or angiotensin II in endothelium-intact aortas. Concentration-response curves (CRCs) to acetylcholine and SNP in endothelium-intact aortic rings from T31d and T33d rats were unmodified. T33d, but not T31d, treatment diminished CRCs to phenylephrine in endothelium-intact aortic rings. CRCs to phenylephrine remained significantly depressed in both endothelium-denuded and endothelium-intact, nitric oxide synthase inhibitor-treated, aortas of T33d rats. In endothelium-denuded aortas of T33d rats, CRCs to angiotensin II, and high K+ contractures, were decreased. Thus, in vitro T3 neither modified phenylephrine-induced active tonus nor CRCs to relaxant and contractile agonists in endothelium-intact aortas, discarding rapid non-genomic actions of this hormone in smooth muscle and endothelial cells. Otherwise, T33d-treatment inhibited aortic smooth muscle capacity to contract, but not to relax, in an endothelium- and NO-independent manner. This effect may be mediated by delayed non-genomic/genomic or genomic mechanisms.

JMP+RAND: Mitigating Memory Sharing-Based Side-Channel Attack by Embedding Random Values in Binaries (JMP+RAND: 바이너리 난수 삽입을 통한 메모리 공유 기반 부채널 공격 방어 기법)

  • Kim, Taehun;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.101-106
    • /
    • 2020
  • Since computer became available, much effort has been made to achieve information security. Even though memory protection defense mechanisms were studied the most among of them, the problems of existing memory protection defense mechanisms were found due to improved performance of computer and new defense mechanisms were needed due to the advent of the side-channel attacks. In this paper, we propose JMP+RAND that embedding random values of 5 to 8 bytes per page to defend against memory sharing based side-channel attacks and bridging the gap of existing memory protection defense mechanism. Unlike the defense mechanism of the existing side-channel attacks, JMP+RAND uses static binary rewriting and continuous jmp instruction and random values to defend against the side-channel attacks in advance. We numerically calculated the time it takes for a memory sharing-based side-channel attack to binary adopted JMP+RAND technique and verified that the attacks are impossible in a realistic time. Modern architectures have very low overhead for JMP+RAND because of the very fast and accurate branching of jmp instruction using branch prediction. Since random value can be embedded only in specific programs using JMP+RAND, it is expected to be highly efficient when used with memory deduplication technique, especially in a cloud computing environment.

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer

  • Hoang, Thang;Nguyen, Thuc;Luong, Chuyen;Do, Son;Choi, Deokjai
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.333-348
    • /
    • 2013
  • Mobile authentication/identification has grown into a priority issue nowadays because of its existing outdated mechanisms, such as PINs or passwords. In this paper, we introduce gait recognition by using a mobile accelerometer as not only effective but also as an implicit identification model. Unlike previous works, the gait recognition only performs well with a particular mobile specification (e.g., a fixed sampling rate). Our work focuses on constructing a unique adaptive mechanism that could be independently deployed with the specification of mobile devices. To do this, the impact of the sampling rate on the preprocessing steps, such as noise elimination, data segmentation, and feature extraction, is examined in depth. Moreover, the degrees of agreement between the gait features that were extracted from two different mobiles, including both the Average Error Rate (AER) and Intra-class Correlation Coefficients (ICC), are assessed to evaluate the possibility of constructing a device-independent mechanism. We achieved the classification accuracy approximately $91.33{\pm}0.67%$ for both devices, which showed that it is feasible and reliable to construct adaptive cross-device gait recognition on a mobile phone.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.

Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN (순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법)

  • Lim, Jeong-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1323-1332
    • /
    • 2009
  • In this paper, we analyze security weakness of 4-Way Handshake in IEEE 802.11i and propose fast and secure 2-Way Handshake mechanism. Compute PTK(Pairwise Transient Key) using sequence number instead of random numbers in order to protect Replay attack and DoS attack. Also, proposed 2-Way Handshake mechanism can mutual authenticate between mobile station and access point and derive PTK using modified Re-association Request and Re-association Response frames. And, compare with others which are fast and secure Handoff mechanisms.

  • PDF

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF