• Title/Summary/Keyword: Security technologies

Search Result 1,855, Processing Time 0.029 seconds

Analysis of Global Research Trend on Information Security (정보보안에 대한 연구 트렌드 분석)

  • Kim, Won-pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1110-1116
    • /
    • 2015
  • This paper analyzes global research trend on information security. All technical fields based on information requires security so that discovering technologies (technical terms) which are developing newly or dramatically is able to guide the future direction of the field of information security. In this paper, the ultimate of this research is to figure out the technologies related to information security and to forecast the future through understanding their trends. The paper, as a beginning for the analysis on macroscopic viewpoint, contains measurement of yearly relatedness between technical terms from 2001 to 2014 by using temporal co-occurrence and interpretation of its meaning through comparing the relatedness with trends of top-related technical terms. And to conclude, we could find that Android platform, Big data, Internet of things, Mobile technologies, and Cloud computing are emerging technologies on information security.

Security Analysis on the Full-Round SCO-1 (블록 암호 SCO-1에 대한 안전성 분석)

  • Jeong, Ki-Tae;Lee, Chang-Hoon;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.27-35
    • /
    • 2008
  • In this paper we show that the full-round SCO-1[12] is vulnerable to the related-key differential attack. The attack on the full-round SCO-1 requires $2^{61}$ related-key chosen ciphertexts and $2^{120.59}$ full-round SCO-1 decryptions. This work is the first known attack on SCO-1.

A Study of Analysis and Response and Plan for National and International Security Practices using Fin-Tech Technologies (핀테크 금융 기술을 이용한 국내외 보안 사례 분석 및 대응 방안에 대한 연구)

  • Shin, Seung-Soo;Jeong, Yoon-Su;An, Yu-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2015
  • Recently, finance technology related to Fin-Tech has emerged while national and international financial incidents have increased. Security technologies that are currently operated in the financial institutions, have been reported to be vulnerable to security attacks. In this paper, we propose a method of response and plan of security incident using Fin-Tech technology in the divers authentication methods and the usage of biometrics. Proposed method provides a convenient banking services to the users by integrating IT technology, such as personal asset management, crowdfunding to finance technology. Also, the proposed method may provide the security with ease by applying the security technologies such as PCI-DSS, tokenization technique, FDS, the block chain. Proposed method analyzes a number of security cases in relation to the Fin-Tech, financial technologies, for a response.

  • PDF

A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation

  • Xing, Xiaomei;Zhu, Yuesheng;Mo, Zhiwei;Sun, Ziqiang;Liu, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5058-5072
    • /
    • 2015
  • Quaternions have been commonly employed in color image processing, but when the existing pure quaternion representation for color images is used in perceptual hashing, it would degrade the robustness performance since it is sensitive to image manipulations. To improve the robustness in color image perceptual hashing, in this paper a full quaternion representation for color images is proposed by introducing the local image luminance variances. Based on this new representation, a novel Full Quaternion Discrete Cosine Transform (FQDCT)-based hashing is proposed, in which the Quaternion Discrete Cosine Transform (QDCT) is applied to the pseudo-randomly selected regions of the novel full quaternion image to construct two feature matrices. A new hash value in binary is generated from these two matrices. Our experimental results have validated the robustness improvement brought by the proposed full quaternion representation and demonstrated that better performance can be achieved in the proposed FQDCT-based hashing than that in other notable quaternion-based hashing schemes in terms of robustness and discriminability.

Comparing Network Data of Virtual Malware and Real Malware using GAM (GAM을 이용한 가상 Malware와 실제 Malware의 네트워크 데이터 비교 및 검증)

  • Lee, Ho-Sub;Lee, Su-Young;Cho, Jae-Ik;Moon, Jong-Sub
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.158-161
    • /
    • 2007
  • Malware는 인터넷 혹은 일반 네트워크사용자의 컴퓨터에 설치되어 의도하지 않은 악의적인 행위와 정보의 유출을 목적으로 하는 프로그램이다. Malware의 성향 분석은 Malware의 행위를 분석하는 것으로서 실제 Malware의 행위를 이용하여 가상의 Malware를 생성하고 두 Malware가 가지는 전파 과정상의 트래픽을 비교함으로써, 네트워크 상의 특성을 비교 및 검증할 수 있다. 본 논문에서는 Malware를 분석하고 가상 Malware를 제작하여 두 Malware가 발생하는 행위, 즉 네트워크 트래픽 데이터를 비교하여 가상의 Malware가 실제의 Malware와 동일한 네트워크 트래픽을 발생 시키는지 확인하기 위해 통계적인 모델링 기법인 GAM 을 이용해 비교 및 검증하는 방법에 대해 제안한다.

  • PDF

Framework for Design and Implementation of SmartPhone Forensic Based on Web Service (웹 서비스 기반의 스마트폰 포렌식 프레임 워크 설계 및 구현)

  • Kim, Hyoung-Hwan;Jeon, SangJun;Kim, DoHyun;Lee, Sangjin;Un, Sungkyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.842-845
    • /
    • 2011
  • 현재의 스마트폰 기반의 모바일 애플리케이션은 기본적인 전화, 문자와 같은 기능들 외 네비게이션과 같은 유용하고 편리한 기능들이 사용되고 있다. 이러한 애플리케이션에는 사용자와 관련된 많은 개인 정보들이 포함되어있고, 저장된 개인 정보는 사건 발생 시 사건의 직접적인 증거 혹은 간접적은 증거로 활용될 수 있다. 스마트폰에 저장된 증거를 수집하고 분석할 때 조사관들이 사용할 수 있는 기존의 도구는 복잡한 사용방법을 숙지해야 하고, 인증된 소프트웨어가 설치되어 있는 컴퓨터에서 국한되어 분석이 가능했다. 본 논문에서는 이와 같은 문제를 해결하기 위한 웹 서비스 개념의 스마트폰 포렌식 프레임워크를 제시한다.

A Digital Forensic Analysis for Mac OS X Main Artifacts (디지털 포렌식 관점에서의 Mac OS X 사용 흔적 분석)

  • Choi, Ji-Sung;Jeon, Sang-Jun;Park, Jung-Heum;Lee, Sang-jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.846-849
    • /
    • 2011
  • 최근 iPhone, iPad의 높은 사용율과 더불어 Apple 의 Mac 계열 제품에 대한 관심도 높아지고 있다. 이는 Apple의 운영체제인 Mac OS X의 사용율 증가와 함께 디지털 포렌식 수사 환경에서의 Mac OS X의 중요성이 높아짐을 의미한다. 디지털 포렌식 관점에서 Mac OS X에는 사용자의 사용 정보를 남기는 주요 Artifacts들이 있다. 외부 저장 장치 연결 정보, 어플리케이션 설치 정보, 사용자 인증 정보, 어플리케이션 설정 정보 등이 대표적인 Artifacts들이며, 이러한 정보들은 특정 위치의 로그 파일에 남게 된다. 본 논문은 Mac OS X의 대표적 Artifacts 들을 대상으로 사용 흔적 정보가 남는 파일을 분석하여 디지털 포렌식 수사 시 활용할 수 있도록 한다.

Theoretical Principles Of Using Innovative Modern Technologies In Higher Education Institutions

  • Komar, Olha;Bazhenkov, Ievgen;Vnukova, Оlga;Kolomoiets, Halyna;Yanchyshyn, Anatolii;Polishchuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.185-190
    • /
    • 2021
  • The article is assigned to a prelude to the joke of effective pedagogical technologies in professional education in the minds of її continuity. Analyzed the definitions "innovation", "technology", "pedagogical technology", "Innovation pedagogical technology". Blocks have been added, which are stored in innovation processes in the light. The significant role of innovation in education is stated. Presented warehouses pedagogical technologies: conceptual, conceptual-processual and professional. The purpose of introducing innovative technologies into the educational process of vocational education institutions has been clarified. The reasons for finding and implementing innovative pedagogical technologies in education are analyzed.

The Research for Digital Evidence Acquisition Procedure within a Full Disk Encryption Environment (Full Disk Encryption 환경에서 디지털 증거 수집 절차에 관한 연구)

  • Jang, Sung-Min;Park, Jung-Heum;Pak, Chan-Ung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.39-48
    • /
    • 2015
  • As a growing number of people are concerned about the protection of personal information, the use of encryption solution has been increased. In addition, with the end of support for Windows XP and the improvement of operating system, the use of the Full Disk Encryption solution like Bitlocker will be increased. Therefore, it is necessary to consider countermeasures against Full Disk Encryption for the future digital forensic investigation. This paper provides the digital evidence acquisition procedure that responds to the Full Disk Encryption environment and introduces the countermeasures and detection tool against Full Disk Encryption solutions that are widely used.

A research for partition recovery method in a forensic perspective (포렌식 관점의 파티션 복구 기법에 관한 연구)

  • Namgung, Jaeung;Hong, Ilyoung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.655-666
    • /
    • 2013
  • As the capacity of storage devices becomes larger, most users divide them into several logical partitions for convenience of storing and controlling data. Therefore, recovering partitions stably which are artificially hidden or damaged is the most important issue in the perspective of digital forensic. This research suggests partition recovery algorithm that makes stable and effective analysis using characteristics of each file system. This algorithm is available when partition is not distinguishable due to concealment of partition or damage in partition area.