• Title/Summary/Keyword: falsification

Search Result 87, Processing Time 0.042 seconds

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

Face Recognition Method Based on Local Binary Pattern using Depth Images (깊이 영상을 이용한 지역 이진 패턴 기반의 얼굴인식 방법)

  • Kwon, Soon Kak;Kim, Heung Jun;Lee, Dong Seok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.39-45
    • /
    • 2017
  • Conventional Color-Based Face Recognition Methods are Sensitive to Illumination Changes, and there are the Possibilities of Forgery and Falsification so that it is Difficult to Apply to Various Industrial Fields. In This Paper, we propose a Face Recognition Method Based on LBP(Local Binary Pattern) using the Depth Images to Solve This Problem. Face Detection Method Using Depth Information and Feature Extraction and Matching Methods for Face Recognition are implemented, the Simulation Results show the Recognition Performance of the Proposed Method.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

A Study on the Framework of Block Chain-Based Website Falsification Verification (블록체인 기반 홈페이지 위·변조 검증 프레임워크에 관한 연구)

  • Lee, Heang-Gon;Choi, Jang-Won;Gil, Joon-Min;Jung, Yong-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.228-231
    • /
    • 2017
  • 최근 랜섬웨어 같은 치명적 신 변종 사이버공격에 의한 경제적 피해가 심각해지고 있는 실정이며, 취약 홈페이지에 대한 위 변조 공격은 사용자 PC의 악성코드 감염 경로로 활용되고 있다. 본 연구에서는 소스코드, 이미지 및 키워드 등 3가지 방식의 홈페이지 위 변조 검증을 수행하고 해당 결과를 블록체인 기반으로 관리하여 데이터의 투명성 보안성 안정성을 확보할 수 있는 프레임워크를 제시하고자 한다.

Patch Integrity Verification Method Using Dual Electronic Signatures

  • Kim, JunHee;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1516-1526
    • /
    • 2017
  • Many organizations today use patch management systems to uniformly manage software vulnerabilities. However, the patch management system does not guarantee the integrity of the patch in the process of providing the patch to the client. In this paper, we propose a method to guarantee patch integrity through dual electronic signatures. The dual electronic signatures are performed by the primary distribution server with the first digital signature and the secondary distribution server with the second digital signature. The dual electronic signature ensures ensure that there is no forgery or falsification in the patch transmission process, so that the client can verify that the patch provided is a normal patch. The dual electronic signatures can enhance the security of the patch management system, providing a secure environment for clients.

Applied Practice on Fresh Food Cold Chain System with Blockchain Solution

  • Jang, Eun Choul;Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.207-213
    • /
    • 2021
  • Informatization and digital transformation across industries are big trends in the world. However, although a few food groups are investing in informatization on a pilot basis, informatization is still delayed in related industries, such as distribution, logistics, etc. Therefore, consumers often are not able to have easy access to detailed information about products. In this paper, to improve these problems, we propose a fresh food logistics solution that adopts Proof of Nonce (PoN) consensus algorithm with Internet of Thing (IoT) technology. The recently developed PoN algorithm dramatically reduces a time for generating a block and is suitable for a platform that collects and services real-time information. We expect to improve their trust in the platform by preventing forgery/falsification of information recorded in real time through this paper.

Implementation of Blockchain-based Play-To-Donate Platform (블록체인 기반 실시간 기부 플랫폼 개발)

  • Sung, Juhyun;Lee, Minuk;Hwang, Seongtaek;Lee, Juyeol;Lee, Jihoon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.98-100
    • /
    • 2022
  • This paper presents a new blockchain based donation platform combined with a type of gaming application. The proposed donation platform is similar to existing play-to-earn (P2E), but it has different characteristics such as non-liquidated token and direct transfer to a celebrity donation organization. Moreover, it has advantages like a robustness for counterfeiting and falsification as well as enhanced donating experience.

Auditor's Report and the Impact of Non-Audit Services, Audit Institutions

  • Mohammadi, Shaban;Dashtbayaz, Mahmoud Lari
    • The Journal of Economics, Marketing and Management
    • /
    • v.3 no.2
    • /
    • pp.1-8
    • /
    • 2015
  • In this paper, the effects of auditor change on audit quality in companies accepted in Tehran stock exchange placed review and we assessed the presence or absence of a significant correlation between them. to assess the quality of data auditing and tax distortions, falsification of accounting estimates, distortion of rules, distortion caused by mistakes in applying accounting policies and other distortions are used as the dependent variable Is. the sample group consisted of 56 companies as experimental group and a control group of 56 other companies a 4-year period, during the years 2011 to 2014 were studied. data needed for research discovery success ratio distortion before and after the change of auditor. To test the research hypotheses paired comparison method is used.

Comparing Bayesian model selection with a frequentist approach using iterative method of smoothing residuals

  • Koo, Hanwool;Shafieloo, Arman;Keeley, Ryan E.;L'Huillier, Benjamin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.1
    • /
    • pp.48.2-48.2
    • /
    • 2021
  • We have developed a frequentist approach for model selection which determines consistency of a cosmological model and the data using the distribution of likelihoods from the iterative smoothing method. Using this approach, we have shown how confidently we can distinguish different models without comparison with one another. In this current work, we compare our approach with conventional Bayesian approach based on estimation of Bayesian evidence using nested sampling for the purpose of model selection. We use simulated future Roman (formerly WFIRST)-like type Ia supernovae data in our analysis. We discuss limits of the Bayesian approach for model selection and display how our proposed frequentist approach, if implemented appropriately, can perform better in falsification of individual models.

  • PDF