• Title/Summary/Keyword: attackers

Search Result 360, Processing Time 0.034 seconds

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

Representation of Child Sexual Abuse in TV Documentary -Focused on KBS 'Current Topics Ssam'- (TV다큐멘터리의 아동성폭력 재현 방식 -'KBS시사기획 쌈'을 중심으로-)

  • Hong, Sook-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.102-112
    • /
    • 2011
  • The purpose of the study was to analyze narrative structure and spoken contents of two TV documentaries televised in KBS 1TV 'Current Topics Ssam' to examine how child sexual abuse was represented on TV. As a result, the study could see that child sexual abuse attackers were stressed by a system to monitor and punish them and TV documentary took a neutral attitude between their human rights and pain of the victims. And it emphasizes 'abnormal' sides such as attackers' drinking or history of mental illness, and men's social authority individualizes a woman's damage into private pain by imposing a light punishment on child sexual abuse attackers and letting them not punished. Child sexual abuse victims treated to be a sexual object as a 'small, easy and weak' woman are represented as a lethargic human who is afraid of revenge and lives in pain. The representation of child sexual abuse through 'Current Topics Ssam' has its limit in the fact that it neglected understanding social context of child sexual abuse by forming an event-centered immediate and fragmentary narration and didn't play a right role in making an efficient and long-term plan considering actual conditions of Korean society and leading the people's participation.

Design and Implementation of Trusted Chatting Room Using Software TPM (소프트웨어 TPM 을 사용한 신뢰형 채팅룸 설계 및 구현)

  • Kennedy, Chinyere Grace;Cho, Dong-Sub
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.259-261
    • /
    • 2012
  • Chatting room has become widely using technology and it is vulnerable to the internet attackers. We proposed a chatting system using a Purebasic programming language to communicate across networks system. Chatting room text is a form of instant messaging between two or group of people. A Communication experiment was designed and implemented to confirm the validity of the developed chatting system on a trusted platform.

  • PDF

Animal Behaviours Related to Pine Seeds on the Forest Floor

  • Park, Jae-Keun
    • 한국생태학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.79-82
    • /
    • 2002
  • Main attackers on pine seeds on the forest floor were investigated in Korea. Damage on pine cones begins in early stage of cone formation, especially by squirrel and Korean squirrel. The above animals left Kayak-like hulls of seed on rocks and fallen tree trunk. Field mice also left the same shape of Kayak-like hulls. But birds including doves and peasants left large shreds with longitudinal cracks or seed cup trace. Most of seeds on the leaf litters as well as under the fallen leaf were consumed by fold mice and birds. Especially fold mice found the seeds under fallen leaves and consumed all of them.

  • PDF

Routing Protocol using One-Way Hash Functions for Mobile Ad Hoc Networks

  • Park, Young-Ho
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.26-31
    • /
    • 2007
  • An ad hoc network is a collection of mobile nodes without any Infrastructure. However, ad hoc networks are vulnerable to attacks such as routing disruption and resource consumption; thus, routing protocol security is needed This paper proposes a secure and efficient routing protocol for mobile ad hoc networks, where only one-way hash function are used to authenticate nodes in the ROUTE REQUEST, while additional public-key cryptography is used to guard against active attackers disguising a node in the ROUTE REPLY.

  • PDF

Animal Behaviours Related to Pine Seeds on the Forest Floor

  • Park, Jae-Keun
    • The Korean Journal of Ecology
    • /
    • v.25 no.4
    • /
    • pp.213-216
    • /
    • 2002
  • Main attackers on pine seeds on the forest floor were investigated in Korea. Damage on pine cones begins in early stage of cone formation, especially by squirrel and Korean squirrel. The above animals left Kayak-like hulls of seed on rocks and fallen tree trunk. Field mice also left the same shape of Kayak-like hulls. But birds including doves and peasants left large shreds with longitudinal cracks or seed cup trace. Most of seeds on the leaf litters as well as under the fallen leaf were consumed by field mice and birds. Especially field mice found the seeds under fallen leaves and consumed all of them.

Practical Issues of Cryptography for RFID Privacy with Lightweight Mechanism (경량화 기법을 가진 RFID 보안을 위한 암호학적 구현의 문제)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.629-631
    • /
    • 2010
  • Using carefully assembled sets of IDs based on the cryptographic principle of secret shares, we can create RFID tags that yield virtually no information to casual "hit-and-run" attackers, but only reveal their true ID after continuous and undisturbed reading from up-close something that can hardly go unnoticed by an item's owner. In this paper, we analyses the practical issues of cryptography for RFID privacy with lightweight method.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

Mining Regular Expression Rules based on q-grams

  • Lee, Inbok
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.17-22
    • /
    • 2019
  • Signature-based intrusion systems use intrusion detection rules for detecting intrusion. However, writing intrusion detection rules is difficult and requires considerable knowledge of various fields. Attackers may modify previous attempts to escape intrusion detection rules. In this paper, we deal with the problem of detecting modified attacks based on previous intrusion detection rules. We show a simple method of reporting approximate occurrences of at least one of the network intrusion detection rules, based on q-grams and the longest increasing subsequences. Experimental results showed that our approach could detect modified attacks, modeled with edit operations.

Analyses of Intrusion Detection Model in Wireless Sensor Networks (무선 센서 네트워크에서의 침입탐지 모델의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.857-860
    • /
    • 2009
  • Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to characterize the WSN parameters such as node density and sensing range in terms of a desirable detection probability. In this paper, we consider this issue according to two WSN models: homogeneous and heterogeneous WSN.

  • PDF