• Title/Summary/Keyword: human networking

Search Result 170, Processing Time 0.031 seconds

Design and Implementation of Alert Analysis System using Correlation (연관성을 이용한 침입탐지 정보 분석 시스템의 설계 및 구현)

  • 이수진;정병천;김희열;이윤호;윤현수;김도환;이은영;박응기
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.438-449
    • /
    • 2004
  • With the growing deployment of network and internet, the importance of security is also increased. But, recent intrusion detection systems which have an important position in security countermeasure can't provide proper analysis and effective defence mechanism. Instead, they have overwhelmed human operator by large volume of intrusion detection alerts. In this paper, we propose an efficient alert analysis system that can produce high level information by analyzing and processing the large volume of alerts and can detect large-scale attacks such as DDoS in early stage. And we have measured processing rate of each elementary module and carried out a scenario-based test in order to analyzing efficiency of our proposed system.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

Long-Term Biodiversity Research Programme for Mindanao, Philippines

  • Amoroso, Victor B.
    • The Korean Journal of Ecology
    • /
    • v.23 no.2
    • /
    • pp.141-147
    • /
    • 2000
  • The Long-Term Biodiversity Research Programme (LTBRP) for Mindanao is envisioned to be a collaborative programme of the Philippines. It will be a programmatic research on biodiversity - its status, threats. and conservation and management. The chosen research site is Mt. Malindang in Misamis Occidental of Mindanao. The BRP will support a set of research projects that will generate knowledge on biological and ecological, socio-economic. cultural and policy aspects of biodiversity conservation. It will also enable researchers to develop and try new methods for research on these aspects, separately or crossing boundaries of academic disciplines. Moreover. the BRP will implement support programmes which will provide the linkages of research activities to development issues and needs in the research site. The support programmes will also draw from the research projects, the knowledge that can be lent or immediately available to policy and programme formulation. The support programmes will comprise: human resource development or capability-building; information, education and communication; database; networking; community organizing: and development action. The BRP will be undertaken by a group of academie and research institutions from the Philippines, in partnership with their respective government entities and local government units in Mindanao. The Biodiversity Research Programme (BRP) will comprise a set of research projects to be undertaken by small research teams in the site. Researchable areas have been identified initially through the National Biodiversity Research Agenda. and later enriched in the Participatory Rural Appraisal (PRA) Analysis workshops by the Mindanao researchers and Philippine resource persons. Results of the PRA are presented in the paper.

  • PDF

Management plan for UNESCO Shinan Dadohae Biosphere Reserve (SDBR), Republic of Korea: integrative perspective on ecosystem and human resources

  • Lee, Heon-Jong;Cho, Kyoung-Man;Hong, Sun-Kee;Kim, Jae-Eun;Kim, Kyoung-Wan;Lee, Kyoung-Ah;Moon, Kyong-O
    • Journal of Ecology and Environment
    • /
    • v.33 no.2
    • /
    • pp.95-103
    • /
    • 2010
  • The archipelago in the southwest sea, Korea, was registered as Shinan Dadohae Biosphere Reserve by United Nations Educational, Scientific and Cultural Organization Man and the Biosphere (UNESCO MAB) on May 26, 2009. This study was conducted to determine a method of reconciling natural and anthropogenic processes and to enable sustainable development in the vicinity of the Shinan Dadohae Biosphere Reserve (SDBR). To accomplish this, the characteristics of SDBR with respect to biodiversity and cultural diversity were evaluated. In addition, a management plan regarding the wise use of the SDBR was developed while focusing on four parts: cultural support to induce motivation for native conservation and development; development and specification of fisheries and cultivation based on local community systems; restructuring of marine food products and resource transporting systems; activation and discovery of indigenous knowledge to enable networking between local residents, academia and the UNESCO-international society.

Design and Verification using Energy Consumption Model of Low Power Sensor Network for Monitoring System for Elderly Living Alone (독거노인 모니터링 시스템을 위한 저전력 센서 네트워크 설계 및 에너지 소모 모델을 이용 검증)

  • Kim, Yong-Joong;Jung, Kyung-Kwon
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.39-46
    • /
    • 2009
  • Wireless sensor networks consist of small, autonomous devices with wireless networking capabilities. In order to further increase the applicability in real world applications, minimizing energy consumption is one of the most critical issues. Therefore, accurate energy model is required for the evaluation of wireless sensor networks. In this paper we analyze the power consumption for wireless sensor networks. To develop the power consumption model, we have measured the power characteristics of commercial Kmote node based on TelosB platforms running TinyOS. Based on our model, the estimated lifetime of a battery powered sensor node can use about 6.9 months for application of human detection using PIR sensors. This result indicates that sensor nodes can be used in a monitoring system for elderly living alone.

  • PDF

A Study on the Workshop Program for the Specialists of Healthy Families (초기 건강가정사 교육 프로그램에 관한 연구)

  • Song Hye Rim;Kwon Hye Jin;Ki Eun Kwang;Kim Sun Woo;Kim So Young;Chae Hwa young
    • Journal of Family Resource Management and Policy Review
    • /
    • v.8 no.3
    • /
    • pp.65-93
    • /
    • 2004
  • This study was conducted to develop and propose the workshop program for the specialists of healthy families. The proposed workshop program suggests the 6 divisions: 1. the roles of the specialists, 2. the system and contents of Act for Healthy Families, 3. the family policies and the related administrational organizations, 4. the projects for healthy families, 5. the management strategies for healthy families centers and networking system, and 6. the qualities of specialists. This developed workshop program contributes to enhance and improve the human capital of the specialists for healthy families.

  • PDF

Link Budget Analysis of Communication System for Reliable WBAN (신뢰성있는 WBAN을 위한 통신 시스템의 링크 버짓 분석)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.584-588
    • /
    • 2019
  • Wireless body area network (WBAN) is a networking technology that enables early detection of abnormal health conditions, real-time medical monitoring, and telemedicine support systems. The internet of things (IoT) for healthcare, which has become an issue recently, is one of the most promising areas for improving the quality of human life. It must meet the high QoS requirements of the medical communication system like any other communication system. Therefore, the bit error rate (BER) threshold was chosen to accommodate the QoS requirements of the WBAN communication system. In this paper, we calculated BER performance of WBAN channel using IR-UWB PPM modulation and analyzed link budget and system margin of WBAN according to various system parameters.

A Client/Sever Authenticated Key Exchange Protocol using Shared Password (공유 패스워드를 이용한 클라이언트/서버 인증 키 교환 프로토콜)

  • 류은경;윤은준;유기영
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.252-258
    • /
    • 2004
  • In this paper, we propose a new authenticated key exchange protocol in which client and sever can mutually authenticate and establish a session key over an insecure channel using only a human memorable password. The proposed protocol is based on Diffie-Hellman scheme and has many of desirable security attributes: It resists off-line dictionary attacks mounted by either Passive or active adversaries over network, allowing low-entropy Passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions when passwords are compromised. In particular, the advantage of our scheme is that it is secure against an impersonation attack, even if a server's password file is exposed to an adversary. The proposed scheme here shows that it has better performance when compared to the previous notable password-based key exchange methods.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

Competitive intelligence in Korean Ramen Market using Text Mining and Sentiment Analysis

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.155-166
    • /
    • 2018
  • These days, online media, such as blogospheres, online communities, and social networking sites, provides the uncountable user-generated content (UGC) to discover market intelligence and business insight with. The business has been interested in consumers, and constantly requires the approach to identify consumers' opinions and competitive advantage in the competing market. Analyzing consumers' opinion about oneself and rivals can help decision makers to gain in-depth and fine-grained understanding on the human and social behavioral dynamics underlying the competition. In order to accomplish the comparison study for rival products and companies, we attempted to do competitive analysis using text mining with online UGC for two popular and competing ramens, a market leader and a market follower, in the Korean instant noodle market. Furthermore, to overcome the lack of the Korean sentiment lexicon, we developed the domain specific sentiment dictionary of Korean texts. We gathered 19,386 pieces of blogs and forum messages, developed the Korean sentiment dictionary, and defined the taxonomy for categorization. In the context of our study, we employed sentiment analysis to present consumers' opinion and statistical analysis to demonstrate the differences between the competitors. Our results show that the sentiment portrayed by the text mining clearly differentiate the two rival noodles and convincingly confirm that one is a market leader and the other is a follower. In this regard, we expect this comparison can help business decision makers to understand rich in-depth competitive intelligence hidden in the social media.