• Title/Summary/Keyword: Type Security

Search Result 1,222, Processing Time 0.029 seconds

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Strategy and Basic Planning for Creating an Urban Agricultural Park -Focusing on Gosangol Village in Daegu City- (도시농업공원 조성을 위한 전략 및 기본계획 연구 - 대구광역시 고산골마을을 대상으로 -)

  • Lee, Jong-Il;Kwon, Jin-Wook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.4
    • /
    • pp.23-34
    • /
    • 2017
  • This study focused on a planned site located in Gosangol Village in Daegu Metropolitan City that aims to build an urban agricultural park combining urban agriculture and urban park for the sustainable realization of urban agriculture. Accordingly, this study has significance in two perspectives: firstly, suggesting development strategies to be considered when building an urban agricultural park as a theme park, and secondly, presenting guidelines for spatial programs and facilities to be introduced for actual applications. The results are as follows. Firstly, building an urban agricultural park fills a role as a local community space prompted by the demand-oriented evolution of urban parks, and agricultural behaviors to be incorporated in the theme. In this context, 'building an urban agricultural space focusing on sustainability', 'constructing green space systems focusing on agricultural landscape', and 'structuring leisure spaces for communications in the community' are presented as development strategies. Secondly, key functions that an urban agricultural park should have include production and trade of agricultural products on the production side, soil preservation, resource cycling and green space provision on the environmental side, leisure and experience, community vitalization, education, and social security on the social and cultural side, and entertainment functions, ecological functions, and protective functions as urban park functionality. Thirdly, key facilities needed when building an urban agricultural park include urban agricultural facilities other than park management facilities, landscape facilities, recreational facilities, sports facilities, educational facilities, and convenient facilities, and family gardens as the key facility of the urban agricultural park should be scaled in consideration of various purposes and behaviors of their use. This study has a limitation that the subject site was limited to a specific area but has significance in that it presented a planning model for the spatial structuring of park-type urban agriculture.

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer (Rijndael 알고리즘을 이용한 물리 계층 ATM 셀 보안 기법)

  • Im Sung-Yeal;Chung Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.83-94
    • /
    • 2006
  • This paper describes ATM cell encipherment method using Rijndael Algorithm adopted as an AES(Advanced Encryption Standard) by NIST in 2001. ISO 9160 describes the requirement of physical layer data processing in encryption/decryption. For the description of ATM cell encipherment method, we implemented ATM data encipherment equipment which satisfies the requirements of ISO 9160, and verified the encipherment/decipherment processing at ATM STM-1 rate(155.52Mbps). The DES algorithm can process data in the block size of 64 bits and its key length is 64 bits, but the Rijndael algorithm can process data in the block size of 128 bits and the key length of 128, 192, or 256 bits selectively. So it is more flexible in high bit rate data processing and stronger in encription strength than DES. For tile real time encryption of high bit rate data stream. Rijndael algorithm was implemented in FPGA in this experiment. The boundary of serial UNI cell was detected by the CRC method, and in the case of user data cell the payload of 48 octets (384 bits) is converted in parallel and transferred to 3 Rijndael encipherment module in the block size of 128 bits individually. After completion of encryption, the header stored in buffer is attached to the enciphered payload and retransmitted in the format of cell. At the receiving end, the boundary of ceil is detected by the CRC method and the payload type is decided. n the payload type is the user data cell, the payload of the cell is transferred to the 3-Rijndael decryption module in the block sire of 128 bits for decryption of data. And in the case of maintenance cell, the payload is extracted without decryption processing.

The Effects of Performance of Public Health Services and Personal Characteristics on Community Image of Public Hospitals (공공보건의료사업 수행과 주민특성이 공공병원 이미지에 미치는 영향)

  • Sim, In Ok;Hwang, Eun Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6089-6098
    • /
    • 2015
  • This study purposes to identify the effects of performance of public health services (PHS) and personal characteristics on community image to public hospitals. The subjects of this study were 33 public hospitals and 1,789 community residents. The data of '2011 Public hospital evaluation programme' were utilized in this study. The personal characteristics consisted of nine items which were gender, age, education, occupation, monthly incomes, medical security, use experience, health state, and location type. The PHS performance consisted of five items which were number of doctors, number of nurses, total number of staff, budget per 1,000 community residents, and amount of activities per 1,000 community residents. The cronbach's alpha of community image instrument was 0.916. As the results of logistic regression, the significant variables of community image, were age (OR=0.34, 95% CI=0.19-0.60), education (OR=3.03, 95% CI=1.60-5.76), use experience (OR=0.57, 95% CI=0.40-0.81), health state (OR=0.69 95% CI=0.49-0.96), location type (OR=2.10, 95% CI=1.11-3.99), and amount of activities per 1,000 community residents (OR=0.58, 95% CI=0.35-0.96). Community image is very important to public hospitals. The workforce and budget related PHS were significantly demanded to improve community image. The Central and Local government should support to public hospitals to perform PHS effectively.

A case study of blockchain-based public performance video platform establishment: Focusing on Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do (블록체인 기반 공연영상 공공 플랫폼 구축 사례 연구: 경기도 뉴미디어 예술방송국 경기아트온을 중심으로)

  • Lee, Seung Hyun
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.108-126
    • /
    • 2023
  • This study explored the sustainability of a blockchain-based cultural art performance video platform through the construction of Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do. In addition, the technical limitations of video content transaction using block chain, legal and institutional issues, and the protection of personal information and intellectual property rights were reviewed. As for the research method, participatory observation methods such as in-depth interviews with developers and operators and participation in meetings were conducted. The researcher participated in and observed the entire development process, including designing and developing blockchain nodes, smart contracts, APIs, UI/UX, and testing interworking between blockchain and content distribution services. Research Question 1: The results of the study on 'Which technology model is suitable for a blockchain-based performance video content distribution public platform?' are as follows. 1) The blockchain type suitable for the public platform for distribution of art performance video contents based on the blockchain is the private type that can be intervened only when the blockchain manager directly invites it. 2) In public platforms such as Gyeonggi ArtOn, among the copyright management model, which is an art based on NFT issuance, and the BC token and cloud-based content distribution model, the model that provides content to external demand organizations through API and uses K-token for fee settlement is suitable. 3) For public platform initial services such as Gyeonggi ArtOn, a closed blockchain that provides services only to users who have been granted the right to use content is suitable. Research question 2: What legal and institutional problems should be reviewed when operating a blockchain-based performance video distribution public platform? The results of the study are as follows. 1) Blockchain-based smart contracts have a party eligibility problem due to the nature of blockchain technology in which the identities of transaction parties may not be revealed. 2) When a security incident occurs in the block chain, it is difficult to recover the loss because it is unclear how to compensate or remedy the user's loss. 3) The concept of default cannot be applied to smart contracts, and even if the obligations under the smart contract have already been fulfilled, the possibility of incomplete performance must be reviewed.

Comparision of Medical Care Utilization Patterns between Beneficiaries of Medical Aid and Medical Insurance (의료보호대상자의 의료이용양상)

  • Kim, Bok-Youn;Kim, Seok-Beom;Kim, Chang-Yoon;Kang, Pock-Soo;Chung, Jong-Hak
    • Journal of Yeungnam Medical Science
    • /
    • v.8 no.2
    • /
    • pp.185-201
    • /
    • 1991
  • A household survey was conducted to compare the patterns of morbidity and medical care utilization between medical aid beneficiaries and medical insurance beneficiaries. The study population included 285 medical aid beneficiaries that were completely surveyed and 386 medical insurance benficiaries selected by simple random sampling from a Dong(Township) in Taegu. Well-trained surveyers mainly interviewed housewives with a structured questionnaire. The morbidity rates of acute illness during the 15-day period, were 63 per 1,000 medical aid beneficiaries and 62 per 1,000 medical insurance beneficiaries. The rates for chronic illness were 123 per 1,000 medical aid beneficiaries and 73 per 1,000 medical insurance beneficiaries. The most common type of acute illness in medical aid and medical insurance beneficiaries was respiratory disease. In medical aid beneficiaries, musculoskeletal disease was most common, but in medical insurance beneficiaries, gastrointestinal disease was most common. The mean duration of acute illness of medical aid beneficiaries was 3.8 days and that of medical insurance beneficiaries was 6.8 days. During the one year period, mean duration of medical aid beneficiaries chronic illnesses was 11.5 months which was almost twice as long compared to medical insurance beneficiaries. Pharmacy was most preferrable facility among the acute illness patient in medical aid beneficiaries, but acute cases of medical insurance beneficiaries visited the clinic most commonly. Chronic cases of both groups visited the clinic most frequently. There were some findings suggesting that much unmet need existed among the medical aid beneficiaries. In acute cases, the average number of days of medical aid users utilized medical facilities was less than medical insurance users. On the other hand, the length of medical care utilization of chronic cases was reversed. Geographical accessibility was the most important factors in utilization of medical facilities. Almost half of the study population answered the questions about source of funds on medical security correctly. Most respondents considered that the objective of medical security was afford ability. The chief complaint on hospital utilization was the complicated administrative procedures. These findings suggest that there were some problems in the medical aid system, especially in the referral system.

  • PDF

Determination of Types and Element on Parking Ramp (주차장 램프 형식 결정 및 제원 산정에 관한 연구)

  • Kwon, Sung-Dae;Kim, Yoon-Mi;Nam, Chang-Kyu;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2021-2031
    • /
    • 2013
  • Due to the rapid economic growth within the nation, the quality of life of individuals have improved dramatically. The scope of living activities of individuals have also extended, resulting in a rapidly increasing demand for automobiles. The number of vehicles registered in Korea is rapidly increasing and will reach 188.71 million as of December 2012. Compared to the registered residents of 50.94 million provided by the Ministry of Public Administration and Security, the registered population reflects about 4 people per every automobile. Due to the high demands for vehicles, the demands for parking lots in collective housing and businesses are also increasing. In reality, the current state of expansion of parking lots are underground, due to the limited available space on ground level. Specifically, the slope of a parking lot cannot exceed 17% linear slope and 14% curved slope according to the 'parking lot laws', however studies show that the driver feels at risk for safety when stopped on the parking ramp while driving in the parking lot. This study seeks to examine the suitability of parking lot ramps, concerning the safety aspects of the driver. First, the ramp type was categorized as linear or curved, then test drives were performed based on variations of slopes, slant distances, directions and points. A survey was administered to the driver after the completion of the test drive, in order to element design for an ideal ramp. In the case of curved ramp, the results of the estimate suggests a counterclockwise, slope at a maximum of 12% incline. The maximum slope for a linear ramp was analyzed to be between 13~14%, suggesting that slope greater than 15% need to be eliminated. In conclusion, it is anticipated that the element design parking ramp reported in this study will help to serve as a reference for future parking lot related guidelines, and provide cost effective traffic safety mechanisms in future parking lot businesses to follow.

An Awareness of Welfare Facility for the Elderly and It's Related Factors of College Students (노인복지시설(老人福祉施設)에 대한 대학생(大學生)의 의식(意識)과 관련요인(關聯要因))

  • Jowa Yooun-Teak;Nam Chul-Hyun;Park Chun-Man
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.2 no.1
    • /
    • pp.87-111
    • /
    • 1998
  • For the newly approach of policy with the old aged era at hand, the result which examines the 1,200 students attending professional colleges and upward in three small-to-medium sized cities, for two months, from October 1, 1996 to November 30, in order to know the change of consciousness of the growing modern young intellectual age group is as follows. 1. The objects of survey consist of 72.1% of women, 40.4% of 20 to 21 age, 49.1% of atheists, and people from big cities and fishing and agrarian village occupy equally 40.2%. Concerning the long-termed residents, 49% of them dwell in big cities. In case of the parents' age is more than 55, 31.5% in fathers, and 10.9% in mothers. 2. The types of housing in which they desire to reside in their getting older are : 72.8% of them hope to live in individual houses, 16.6% in apartments or villas, and 3.4% in social welfare facilities. Out of respondents, compared with other groups, man rather than woman, those who are 20 to 21 age group and from fishing and agrarian villages and have over 7 family members and live with their parents have a higher preference for independent houses. 3. The districts in which they hope to live when they are old are : 41.6% of them, with the highest percent, hope to live in farming villages, the older they are, the more they hope to live in agricultural district, and women of 21 years and upward hope to live in big cities. On the other hand, the preferable degree for social welfare facilities is higher each in people who are 24 years and upward, buddhists, self-boarding students, and the more poorly they are off, the higher the percent is. 4. The types of preferable welfare facilities for the elderly are : 58.2% of them think silver towns desirable, 28.4% think the charged (or free) elderly welfare facilities. Compared with other groups, the percentage which prefer silver towns is higher in women, people from big cities, residents of main family, long-termed city residents, people with higher income, people having grandparents alive, and people who had experience of taking lectures on hygienics or social welfare. 5. 50.3% of the respondents insist that provision of living expenses against old age should be insured by social security system, and 42.8% by the elderly themselves. The percentage of the former shows higher in people of 21 years and upward, women, residents of fishing and agrarian villages, christians, people in more needy circumstances and people who have experience of using a medical institution. 6. Compared with other nations, 54.5% of the respondents have an opinion that elderly welfare and welfare work in Korea stays in insufficient level and most of them are women, people from farming village, residents of head family, people having younger parents and people being worse health condition, and they have a more positive attitude about the elderly welfare work. 7. 92.3% of the respondents answered that a national budget for the elderly welfare is scarce, and the percentage is higher in people who are older, residents of big cities, people in lower living condition and people in worse health condition. 8. 35.2% of the respondents answered that the proper cost of their old age must be over 220mi11ion. The more a family's total income is, the higher the percentage is. 9. The factors which have an effect on the preference of silver towns are sex(p<0.01, the type of the present residence(p<0.05), and a family's total income(p<0.05). 10. From the survey result of the above, we comes to the conclusion that, for the sake of welfare of the increasing elderly population, government authorities and parties concerned must exert their utmost for the elderly welfare by increasing a budget of it and establishing a number of facilities of the elderly welfare and silver towns located in fresh and comfortable villages. In addition, they have to set up a course of hygienics in all the colleges and instruct the contexts on hygienic welfare as well.

  • PDF

Prenatal Care Utilization Pattern and Its Determinants in Rural Korea (농촌지역 모성의 산전관리서비스 이용양상과 그 결정요인)

  • Kim, Jang-Rak;Park, Jung-Han;Lee, Jae-Kyong;Seo, Sang-Hong;Bang, Joon-Yong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.26 no.4 s.44
    • /
    • pp.599-613
    • /
    • 1993
  • To study the pattern of prenatal care utilization and its determinants in rural Korea, 976 mothers (65.5%) out of 1,489 living mothers in Chinyang, Sachon and Hapchon Counties in Kyongsangnam Province who had delivered a baby between July 1, 1990 and June 30, 1991 were interviewed by the Myon health workers from January 3 through February 15, 1992. The Anderson's behavioral model for health service utilization was applied to develop the frames for analysis. The dependent variable was a number of prenatal care visits. And the independent variables included In the model were the variables pertaining to the predisposing, enabling, medical need and other components. The proportion of mother who had ever received the prenatal care service for the index pregnancy was 97.3%. However, the proportion of mothers who had made more than 10 visits was only 20.6%, which indicated that majority of mothers had paid far less visits than recommended $10{\sim}12$ visits for each normal pregnancy. The low utilization of prenatal care services (none or less than 4 visits) was related to mother's low educational level, the high birth order, beneficiary of the medical aid, the absence of clinic in the community, no diagnosed disease of mother during pregnancy, and mothers engaged in farming. Inequity of access seemed to exist because social structure variables and the variables of enabling component were important predictors. And there seemed to be high mutability in equalizing the distribution of prenatal care services because the variables of enabling component such as type of medical security and whether there was a clinic or not in the community were substantially important.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.