• 제목/요약/키워드: data security control

검색결과 957건 처리시간 0.034초

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권11호
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.

모바일 패션 쇼핑 특성과 지각된 상호작용성, 지각된 유용성이 구매의도에 미치는 영향 (Effects of mobile fashion shopping characteristics, perceived interactivity, and perceived usefulness on purchase intention)

  • 김민정;신수연
    • 복식문화연구
    • /
    • 제23권2호
    • /
    • pp.228-241
    • /
    • 2015
  • The purpose of this study was to verify the effect of mobile fashion shopping characteristics and perceived interactivity on perceived usefulness, and the effect of perceived usefulness on purchase attitude and purchase intention based on TAM (Technology Acceptance Model). We conducted the survey targeting smartphone users in their 20s~30s living in Seoul and metropolitan area. Among 483 data collected, we used 452 samples except 31 unreliable respondents for the analysis. To analyze the structural equation model, we did factor analysis, reliability analysis, and structural equation model analysis using SPSS 18.0 and AMOS 16.0. The results were as follows: We confirmed 5 mobile fashion shopping characteristics (enjoyment, credibility, instant connectivity, security, and personalization) and 3 perceived interactivity factors (control, responsiveness and two-way communication, and contextual offer) as results of confirmative factor analysis. Mobile fashion shopping characteristics and perceived interactivity had positive effects on perceived usefulness. Mobile fashion shopping characteristics affected perceived interactivity and also had indirect effect on perceived usefulness via perceived interactivity. In other words, mobile fashion shopping characteristics had direct and indirect effect on perceived usefulness. Perceived usefulness influenced purchase attitude and purchase attitude influenced purchase intention. Perceived usefulness had direct effect on purchase intention and the indirect effect through purchase attitude was significant.

편토압이 심한 도심지 대심도 암반굴착공사에서의 계측사례 (A Case Study on the Field Monitoring of the Deep Rock Excavation Site in Urban Area on Severe Unbalanced Pressure Condition)

  • 김태섭;김웅규;정창원;한철희
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2008년도 추계 학술발표회
    • /
    • pp.1259-1267
    • /
    • 2008
  • One of the most important item for insuring the stability of ground in urban deep excavation site near by major structure such as subway is displacement control of earth retaining wall. The field monitoring system is classified by two types as manual system and automatic system. The application case of latter type of field monitoring is increased because real time measurement is possible in automatic system and that is correspondent with the recent constructional trend. Though the automatic monitoring system is more useful and advanced than manual monitoring system, accuracy of the system is not verified sufficiently. It was examined that the reliance of automatic monitoring system in this paper through the comparison of monitoring result obtained one of deep urban excavation site in which the each type of monitoring system was executed concurrently. Result of the examination is that the two types of monitoring system is generally alike in view of monitoring result, so the engineering reliance of automatic system was confirmed in case site. This study was researched in restricted one case site, so it is expected more precise analysis from security of more data monitored and progressive study.

  • PDF

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현 (Proposal and Implementation on Non-Repudiation of Origin for DNP3)

  • 유기순;송경영;장민호
    • 한국통신학회논문지
    • /
    • 제40권5호
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3는 SCADA 시스템의 대표적인 프로토콜 중 하나이다. IEC 62351에서는 기밀성, 무결성, 가용성, 부인방지 책임추적성을 보안 요구사항으로 들고 있다. 하지만 DNP3 표준인 IEEE Std. 1815에서는 부인방지 책임추적성에 대한 메커니즘을 정의하고 있지 않다. 이에 본 논문에서는 DNP3의 발신자 부인방지 기법을 제안하고, OpenSSL과 스카다시스템 라이브러리를 이용하여 DNP3 발신 부인방지를 구현한다.

선형회귀모델을 이용한 파랑 정보 예측 및 보정 (Wave Information Estimation and Revision Using Linear Regression Model)

  • 임동희;김진수;이병길
    • 한국멀티미디어학회논문지
    • /
    • 제19권8호
    • /
    • pp.1377-1385
    • /
    • 2016
  • Conventional X-band marine radar has been used as one of the effective tools for collecting and retrieving ocean surface information parameters for three decades. Several wave information extracting algorithms have been designed in such a way that they can be utilized for efficiently estimating sea surface wave parameters such as current velocities, wave direction, significant wave heights in VTS (Vessel Traffic Service). However, their performances are still restricted. For the purpose of overcoming the performance limits, in this paper, first the conventional algorithms are analyzed and their performances are compared, and then a new control algorithm is proposed. Furthermore, we try to improve the estimation performances of typical wave parameters including wave directions and significant wave heights by introducing linear regression model in the process of computing wave information extraction. Through several simulations with the X-band radar images, it is shown that the proposed method is very effective in estimating the wave information compared to the real measured buoy data.

현재 기상 정보의 이동 평균을 사용한 태양광 발전량 예측 (Use of the Moving Average of the Current Weather Data for the Solar Power Generation Amount Prediction)

  • 이현진
    • 한국멀티미디어학회논문지
    • /
    • 제19권8호
    • /
    • pp.1530-1537
    • /
    • 2016
  • Recently, solar power generation shows the significant growth in the renewable energy field. Using the short-term prediction, it is possible to control the electric power demand and the power generation plan of the auxiliary device. However, a short-term prediction can be used when you know the weather forecast. If it is not possible to use the weather forecast information because of disconnection of network at the island and the mountains or for security reasons, the accuracy of prediction is not good. Therefore, in this paper, we proposed a system capable of short-term prediction of solar power generation amount by using only the weather information that has been collected by oneself. We used temperature, humidity and insolation as weather information. We have applied a moving average to each information because they had a characteristic of time series. It was composed of min, max and average of each information, differences of mutual information and gradient of it. An artificial neural network, SVM and RBF Network model was used for the prediction algorithm and they were combined by Ensemble method. The results of this suggest that using a moving average during pre-processing and ensemble prediction models will maximize prediction accuracy.

암호화 기법을 활용한 사물인터넷 기반의 스마트 도어락 시스템 (Smart Door Lock Systems using encryption technology)

  • 이성원;박승민;심귀보
    • 한국지능시스템학회논문지
    • /
    • 제27권1호
    • /
    • pp.65-71
    • /
    • 2017
  • 기존 사물인터넷은 보안성이 취약하기 때문에 정보유출로 인한 재산피해가 일어날 수 있다. 특히 사물인터넷을 기반으로 구축된 스마트 도어락 시스템은 그 피해가 더욱 크게 발생될 수 있다. 본 논문에서는 이러한 문제점을 해결하기 위해 센서에서 발생된 데이터를 조건에 따라 분류하여 Google Cloud Message(GCM)을 통해 사용자의 스마트폰으로 알람 메시지를 전송하였다. 스마트폰 애플리케이션을 통해 실시간으로 영상을 확인할 수 있도록 하였고, TCP/IP 프로토콜을 이용하여 도어락을 제어하였다. 또한 OTP-Based Matrix SEED 알고리즘을 도어락 시스템에 적용하여 보안성을 향상시켰다.