• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.029 seconds

Design of Indoor Location-based IoT Service Platform

  • Kim, Bong-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.231-238
    • /
    • 2022
  • In this paper, among short-range wireless communication technologies such as Beacon, Bluetooth, UWB (Ultra-wideband), ZigBee, NFC (Near Field Communication), Z-Wave, 6LoWPAN (IPv6 over Low power WPAN), D2D (Device to Device), etc., proposed an IoT service platform based on a beacon that can provide indoor positioning. And, a beacon-linked web server was designed by blocking indiscriminate beacon spam signals and applying REST web service technology with flexibility and scalability. Data accessibility between different devices was verified by testing the success rate of data transmission, the success rate of blocking beacon push, the success rate of IoT interlocking processing, the accuracy of location positioning, and the success rate of REST web service-based data processing. Through the designed IoT service platform, various proposals and research on short-distance-based business models and service platforms will be conducted in the future.

A study on the method of measuring the usefulness of De-Identified Information using Personal Information

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • Although interest in de-identification measures for the safe use of personal information is growing at home and abroad, cases where de-identified information is re-identified through insufficient de-identification measures and inferences are occurring. In order to compensate for these problems and discover new technologies for de-identification measures, competitions to compete on the safety and usefulness of de-identified information are being held in Korea and Japan. This paper analyzes the safety and usefulness indicators used in these competitions, and proposes and verifies new indicators that can measure usefulness more efficiently. Although it was not possible to verify through a large population due to a significant shortage of experts in the fields of mathematics and statistics in the field of de-identification processing, very positive results could be derived for the necessity and validity of new indicators. In order to safely utilize the vast amount of public data in Korea as de-identified information, research on these usefulness metrics should be continuously conducted, and it is expected that more active research will proceed starting with this thesis.

A Study on Liberalization of Cross-Border Data Transfer in Digital Trade Agreements (디지털 무역협정의 국경 간 데이터 이전 자유화 연구)

  • Chung, Jason
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.627-628
    • /
    • 2022
  • There is no internationally accepted codified definition of digital trade because of the wide variety and scope of related industries and transactions(product + service + data) in general. Recently, innovative changes are taking place in digital trade due to the development of technologies such as IT due to the 4th industrial revolution, and advanced countries such as the US, EU, and Japan are including digital trade issues such as data movement liberalization in the negotiation agenda of the digital trade agreement. The issue with the liberalization of cross-border data movement is that freedom of data movement is necessary to vitalize digital trade, but it also increases the risk of information security and privacy violations. Looking at the directions of advanced countries, the US favors minimization of regulations, Europe favors regional single marketization, but passively opens up to the outside world, and China promotes independent markets through regulations. Therefore, measures to strengthen restrictions on cross-border data movement are an issue that has recently been implemented by each country or an international aggrement is scheduled to be reached soon, and Korea also needs a close response.

  • PDF

The Impact of IS Policy and Sanction Perceptions on Compliance Intention through Justice: The Role of Justice Sensitivity (정보보안 정책 및 제재 인식이 공정성을 통해 준수 의도에 미치는 영향: 공정 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.337-348
    • /
    • 2023
  • As protecting organizations' information assets affects their substantiality, they are increasing their investments in policies, regulations, and technologies for systematic information asset management and protection. This study confirms the impact on information security(IS) compliance from the perspective of employees who apply IS policies to actual work. In particular, this study identifies mechanisms linked to IS policy awareness, sanction, justice, and IS compliance from the perspective of expanding deterrence theory. We applied 316 samples obtained from workers of organizations that applied IS policies and regulations to work and verified the relationship between mechanisms by using AMOS and SPSS packages. As a result of the verification, IS policy awareness had a positive effect on organization justice and compliance intention through the severity and clarity of sanctions. Individual justice sensitivity had a moderating effect on the cause and outcome of justice. The sanction-related mechanism presented in this study provides strategic implications for organizations that require active IS activities by insiders.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF

Impulse Noise Removal Filter using Nearest Effective Pixel Search (최근접 유효 화소의 탐색을 사용한 임펄스 잡음 제거 필터)

  • Chung, Young-Su;Jung, Hwae-Sung;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.139-141
    • /
    • 2022
  • As interest in digital video media and intelligent systems increases rapidly, technologies using video information are being combined and used in various fields such as security and artificial intelligence. Impulse noise generated during digital image processing degrades the image quality of the image and reduces the reliability of information, so it is necessary to remove it through a filter. There are SMF, AWMF, and MDBUTMF as well-known antecedent methods, but they all have limitations in achieving seamless filtering in environments with large loss of information on valid pixels due to problems with the algorithm itself. Therefore, this paper designs a median filter algorithm that applies weights reflecting the reliability of the information by searching for the nearest effective pixels present within the mask. For performance evaluation, this algorithm and the preceding algorithm were compared and analyzed using PSNR and enlarged images.

  • PDF

Deep Learning based User Anomaly Detection Performance Evaluation to prevent Ransomware (랜섬웨어 방지를 위한 딥러닝 기반의 사용자 비정상 행위 탐지 성능 평가)

  • Lee, Ye-Seul;Choi, Hyun-Jae;Shin, Dong-Myung;Lee, Jung-Jae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • With the development of IT technology, computer-related crimes are rapidly increasing, and in recent years, the damage to ransomware infections is increasing rapidly at home and abroad. Conventional security solutions are not sufficient to prevent ransomware infections, and to prevent threats such as malware and ransomware that are evolving, a combination of deep learning technologies is needed to detect abnormal behavior and abnormal symptoms. In this paper, a method is proposed to detect user abnormal behavior using CNN-LSTM model and various deep learning models. Among the proposed models, CNN-LSTM model detects user abnormal behavior with 99% accuracy.

Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks (제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용)

  • Seoin Park;Jiho Lee;Seunghyun Lee;Janghyeok Yoon;Changho Son
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.