• 제목/요약/키워드: falsification

검색결과 87건 처리시간 0.029초

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • 제18권1호
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰 (A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing)

  • 김화영;김은홍
    • 한국IT서비스학회지
    • /
    • 제3권1호
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

깊이 영상을 이용한 지역 이진 패턴 기반의 얼굴인식 방법 (Face Recognition Method Based on Local Binary Pattern using Depth Images)

  • 권순각;김흥준;이동석
    • 한국산업정보학회논문지
    • /
    • 제22권6호
    • /
    • pp.39-45
    • /
    • 2017
  • 기존의 색상기반 얼굴인식 방법은 조명변화에 민감하며, 위변조의 가능성이 있기 때문에 다양한 산업분야에 적용되기 어려운 문제가 있었다. 본 논문에서는 이러한 문제를 해결하기 위해 깊이 영상을 이용한 지역 이진 패턴(LBP) 기반의 얼굴인식 방법을 제안한다. 깊이 정보를 이용한 얼굴 검출 방법과 얼굴 인식을 위한 특징 추출 및 매칭 방법을 구현하고, 모의실험 결과를 바탕으로 제안된 방식의 인식 성능을 나타낸다.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권12호
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

블록체인 기반 홈페이지 위·변조 검증 프레임워크에 관한 연구 (A Study on the Framework of Block Chain-Based Website Falsification Verification)

  • 이행곤;최장원;길준민;정용환
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 추계학술발표대회
    • /
    • pp.228-231
    • /
    • 2017
  • 최근 랜섬웨어 같은 치명적 신 변종 사이버공격에 의한 경제적 피해가 심각해지고 있는 실정이며, 취약 홈페이지에 대한 위 변조 공격은 사용자 PC의 악성코드 감염 경로로 활용되고 있다. 본 연구에서는 소스코드, 이미지 및 키워드 등 3가지 방식의 홈페이지 위 변조 검증을 수행하고 해당 결과를 블록체인 기반으로 관리하여 데이터의 투명성 보안성 안정성을 확보할 수 있는 프레임워크를 제시하고자 한다.

Patch Integrity Verification Method Using Dual Electronic Signatures

  • Kim, JunHee;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1516-1526
    • /
    • 2017
  • Many organizations today use patch management systems to uniformly manage software vulnerabilities. However, the patch management system does not guarantee the integrity of the patch in the process of providing the patch to the client. In this paper, we propose a method to guarantee patch integrity through dual electronic signatures. The dual electronic signatures are performed by the primary distribution server with the first digital signature and the secondary distribution server with the second digital signature. The dual electronic signature ensures ensure that there is no forgery or falsification in the patch transmission process, so that the client can verify that the patch provided is a normal patch. The dual electronic signatures can enhance the security of the patch management system, providing a secure environment for clients.

Applied Practice on Fresh Food Cold Chain System with Blockchain Solution

  • Jang, Eun Choul;Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.207-213
    • /
    • 2021
  • Informatization and digital transformation across industries are big trends in the world. However, although a few food groups are investing in informatization on a pilot basis, informatization is still delayed in related industries, such as distribution, logistics, etc. Therefore, consumers often are not able to have easy access to detailed information about products. In this paper, to improve these problems, we propose a fresh food logistics solution that adopts Proof of Nonce (PoN) consensus algorithm with Internet of Thing (IoT) technology. The recently developed PoN algorithm dramatically reduces a time for generating a block and is suitable for a platform that collects and services real-time information. We expect to improve their trust in the platform by preventing forgery/falsification of information recorded in real time through this paper.

블록체인 기반 실시간 기부 플랫폼 개발 (Implementation of Blockchain-based Play-To-Donate Platform)

  • 성주현;이민욱;황성택;이주열;이지훈
    • 반도체디스플레이기술학회지
    • /
    • 제21권3호
    • /
    • pp.98-100
    • /
    • 2022
  • This paper presents a new blockchain based donation platform combined with a type of gaming application. The proposed donation platform is similar to existing play-to-earn (P2E), but it has different characteristics such as non-liquidated token and direct transfer to a celebrity donation organization. Moreover, it has advantages like a robustness for counterfeiting and falsification as well as enhanced donating experience.

Auditor's Report and the Impact of Non-Audit Services, Audit Institutions

  • Mohammadi, Shaban;Dashtbayaz, Mahmoud Lari
    • 융합경영연구
    • /
    • 제3권2호
    • /
    • pp.1-8
    • /
    • 2015
  • In this paper, the effects of auditor change on audit quality in companies accepted in Tehran stock exchange placed review and we assessed the presence or absence of a significant correlation between them. to assess the quality of data auditing and tax distortions, falsification of accounting estimates, distortion of rules, distortion caused by mistakes in applying accounting policies and other distortions are used as the dependent variable Is. the sample group consisted of 56 companies as experimental group and a control group of 56 other companies a 4-year period, during the years 2011 to 2014 were studied. data needed for research discovery success ratio distortion before and after the change of auditor. To test the research hypotheses paired comparison method is used.

Comparing Bayesian model selection with a frequentist approach using iterative method of smoothing residuals

  • Koo, Hanwool;Shafieloo, Arman;Keeley, Ryan E.;L'Huillier, Benjamin
    • 천문학회보
    • /
    • 제46권1호
    • /
    • pp.48.2-48.2
    • /
    • 2021
  • We have developed a frequentist approach for model selection which determines consistency of a cosmological model and the data using the distribution of likelihoods from the iterative smoothing method. Using this approach, we have shown how confidently we can distinguish different models without comparison with one another. In this current work, we compare our approach with conventional Bayesian approach based on estimation of Bayesian evidence using nested sampling for the purpose of model selection. We use simulated future Roman (formerly WFIRST)-like type Ia supernovae data in our analysis. We discuss limits of the Bayesian approach for model selection and display how our proposed frequentist approach, if implemented appropriately, can perform better in falsification of individual models.

  • PDF