• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.033 seconds

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

Evaluating the Suitability of Microservice Architecture in Steel Manufacturing MES: An AHP Analysis Based on Software Quality Attributes (철강 제조업 MES에서의 마이크로서비스 아키텍처 적합성 평가: 소프트웨어 품질 속성 기반 AHP 분석)

  • Hoon Jeong;Jaekyoung Ahn
    • Journal of Information Technology Services
    • /
    • v.23 no.5
    • /
    • pp.73-85
    • /
    • 2024
  • This study employs the Analytic Hierarchy Process (AHP) to evaluate the suitability of microservice architecture in Manufacturing Execution Systems (MES) for the steel manufacturing industry, based on software quality attributes. The research involved 36 experts (13 from architecture teams and 23 from business development teams) who assessed the importance of six main quality attributes (reliability, performance, usability, maintainability, flexibility, and security) along with their sub-attributes, and compared the suitability of microservice and monolithic architectures. The results indicate that microservice architecture demonstrated higher overall suitability with a composite score of 0.565, compared to monolithic architecture (0.435). Among the quality attributes, reliability was rated as the most important factor, while flexibility and maintainability were less important, as expected. Perception differences between teams were observed regarding performance attributes, while monolithic architecture was marginally favored in terms of security. This study emphasizes the importance of a contextual approach in software architecture selection, taking into account industry characteristics and system requirements. It contributes both academically and practically through methodological innovation using AHP, bridging theory and practice, and integrating diverse stakeholder perspectives. The findings provide practical guidelines for considering microservice architecture adoption in steel manufacturing MES and similar industries, while also stressing the need for a cautious approach.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

Active Object Tracking System for Intelligent Video Surveillance (지능형 비디오 감시를 위한 능동적 객체 추적 시스템)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.2
    • /
    • pp.82-85
    • /
    • 2014
  • It is helpful to use Intelligent Video Surveillance to replace and supplement the demerit which can possibly occur due to the mistake that can be made by human management. To accomplish this, it is essential that the system should digitalize image information from surveillance camera so that the system, itself, can be able to locate a object and to analyze the pattern of the object. Also, it is imperative that the system should have ability to operate a alarm and a entrance blocking system and to notify a situation to a security manager. Zooming a small object form a screen, however, requires a exact zooming ratio of the object and a shift of centric coordinate. In this paper, It is able to locate and observe closely a object from flexible background, regardless of the distance, by calculating a zooming ratio according to object moment, pan coordinate, and tilt coordinate.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2581-2585
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security. instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

Implementation of User Connection Prevention System through LAN Monitoring from Internet Harmful Site (LAN 모니터링을 통한 인터넷 유해 사이트의 사용자 접속 방지 시스템 개발)

  • Park, Hyoung-Bae;Chung, Joong-Soo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.1-7
    • /
    • 1999
  • The Internet is emerging as a powerful tool in the area of information and communication technology. The WWW has been especially contributed to increase the internet demand because of its browser which has "Graphic User Interface". Nowadays number of hosts that supply harmful information such as pornographic materials, and the infringement of human rights is rapidly increased. Access to such materials is very easy. Therefore security system which will protect young users from access to harmful host is needed. This paper presents implementation of user system has database about harmful hosts at the Internet and monitors that the user traffic over LAM get touch with the hosts. The system can not make the user access the harmful host because it can over LAN. The performance analysis on the developed system monitoring the traffic over LAN of Andong university is carried out. The performance analysis of monitoring results satisfies with preventing users from the connection to the internet harmful sites.

  • PDF

The impact of system factors in mobile payment systems on cognitive trust and emotional responses (모바일 간편 결제의 시스템 특성이 인지적 신뢰 및 감성 반응에 미치는 영향)

  • Choi, Yoo-jung;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.881-887
    • /
    • 2018
  • Various services using smart phones are being provided, and a variety of services are also provided in payment fields. Since the mobile payment services is closely related to the monetary part, various characteristics of the mobile system have a close relation with use trust. In this study, accessibility, compatibility, and security were selected as important factors in the mobile payment systems. We will examine how these system factors affect users' cognitive trust, emotional responses such as positive emotions and satisfaction. We surveyed users of mobile payment systems to achieve our research purposes. SPSS 23 and SmartPLS 2.0 were used for the analysis. The results showed that all system factors influenced cognitive trust and emotional response. However, positive emotions did not affect satisfaction. However, when we examine the relationship between emotional responses, positive emotions do not affect satisfaction.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Connector for Dynamic Composition of Aspects Based on AOSD (AOSD기반에서 Aspect의 동적결합을 위한 Connector)

  • Kim Tae-Woong;Kim Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.251-258
    • /
    • 2006
  • Aspect-Oriented Software Development is new software development method. It has many advantages related to software performance, maintenance and repair. Also it offers modularization method to a existing programming language for secondary function such as security and fault tolerance. But the present problem is that we have to use new aspect-oriented programming language. Further more when we apply Aspect to legacy system, we have to recompile the source code in order to build software system based on AOSD. In this paper, we propose and design Connector that can be composed with Aspect in legacy system dynamically. To elaborate this work, we use the information of operations about Core and Aspect, and the information of pointcut described with XML. We validate that the proposed Connector has features such as no need of new compiler, no recompilation and no modification of legacy system through case study.

Analysis of Return Current Effect for Track Circuit on Ho-Nam high Speed Line (고속열차 운행에 따른 호남고속철도 궤도회로 귀선전류 영향 분석)

  • Baek, Jong-hyen
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1110-1116
    • /
    • 2017
  • Depending on the operating characteristics, track circuit is installed for the purpose of direct or indirect control of the signal device, point switch machine and other security device. These are mainly used for train detection, transmission of information, broken rail detection and transmission of return current. Especially, the return current is related to signal system, power system and catenary line, and track circuit systems. It is one of the most important component shall be dealt for the safety of track side staff and for the protection of railway-related electrical system according to electrification. Therefore, an accurate analysis of the return current is needed to prevent the return current unbalance and the system induced disorder and failure due to an over current condition. Also, if the malfunction occurred by the return current harmonics, it can cause problems including train operation interruption. In this paper, we presented measurement and analysis method at return current and it's harmonics by high speed train operation on the honam high speed line.