• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.032 seconds

A Study on Mobile Security System using Real-Time Object Tracking (실시간 객체 추적을 이용한 모바일 보안시스템에 관한 연구)

  • Baek, Ju-Ho;Park, Yeon-Chool;Lee, Kwang-Hyoung;Oh, Hae-Seok
    • Annual Conference of KIPS
    • /
    • 2003.11a
    • /
    • pp.73-76
    • /
    • 2003
  • 모바일 보안 시스템은 웹 카메라에 실시간으로 입력되어지는 객체를 추적한 후, 영상처리를 거쳐, 추적된 객체를 휴대폰으로 전송하는 시스템을 말한다. 본 논문에서는 배경영상과 카메라로부터 입력되는 입력영상과의 차를 이용하여 객체를 추출하고, 추출된 객체를 휴대폰으로 전송한다. 휴대폰은 데이터의 전송속도에서 많은 문제점을 가지고 있기 때문에 객체가 이동했을 경우에만 휴대폰으로 영상을 전송함으로써 트래픽을 최소화하는 방법을 제안한다. 핸드폰은 사용자가 항상 소지하고 있기 때문에, 긴급 상태 발생시 현장의 상황을 실시간 영상을 전송함으로서 사용자가 긴급 상황에 따른 대책을 신속 정확히 할 수 있다.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Study of Security System Design for Wireless LAN (무선 랜을 위한 보안 시스템 설계에 관한 연구)

  • Byeon, Jin-Yeong;Kim, Dong-Hun;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.219-222
    • /
    • 2010
  • 본 논문에서는 무선 네트워크 기술인 802.11의 보안책인 802.1x의 효율성에 대해 연구한다. 무선 네트워크는 1970년대 라디오 주파수를 사용하여 컴퓨터 통신 네트워크가 구축된 이후 눈부신 발전을 거듭하여 현재 학교나 카페 등에서 쉽게 무선 랜 존을 접할 수 있다. 하지만 최근 스마트폰이나 노트북 등 많은 portable 단말기의 사용자가 급속도로 증가 하면서 무선 랜 존의 수요가 크게 늘어가고 있다. 이렇게 무선 네트워크 구축이 활발히 되면 그와 동시에 증가하는 것이 보안 문제이다. 본 논문에서는 무선 AP와 Radius(AAA) 서버를 이용한 보안 시스템 구축 시 고려해야 할 요구조건과 유지관리를 위한 효율성을 연구하여 제한된 환경에서의 효과적인 보안 시스템을 설계를 위한 방안을 제시한다.

  • PDF

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

A Robust and Efficient Anonymous Authentication Protocol in VANETs

  • Jung, Chae-Duk;Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.607-614
    • /
    • 2009
  • Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for generating anonymous certificates from roadside units (RSUs). However, ECPP does not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust and efficient anonymous authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in the proposed protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for mutual authentication between OBUs and RSUs. In order to achieve these goals, we consider a universal re-encryption scheme and identity-based key establishment scheme as our building blocks. Several simulations are conducted to verify the efficiency and effectiveness of the proposed protocol by comparing with those of the existing ECPP.

Synergy: An Overlay Internetworking Architecture and Implementation

  • Kwon, Min-Seok;Fahmy, Sonia
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.181-190
    • /
    • 2010
  • A multitude of overlay network designs for resilient routing, multicasting, quality of service, content distribution, storage, and object location have been proposed. Overlay networks offer several attractive features, including ease of deployment, flexibility, adaptivity, and an infrastructure for collaboration among hosts. In this paper, we explore cooperation among co-existing, possibly heterogeneous, overlay networks. We discuss a spectrum of cooperative forwarding and information sharing services, and investigate the associated scalability, heterogeneity, and security problems. Motivated by these services, we design Synergy, a utility-based overlay internetworking architecture that fosters overlay cooperation. Our architecture promotes fair peering relationships to achieve synergism. Results from Internet experiments with cooperative forwarding overlays indicate that our Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.

A network traffic prediction model of smart substation based on IGSA-WNN

  • Xia, Xin;Liu, Xiaofeng;Lou, Jichao
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.366-375
    • /
    • 2020
  • The network traffic prediction of a smart substation is key in strengthening its system security protection. To improve the performance of its traffic prediction, in this paper, we propose an improved gravitational search algorithm (IGSA), then introduce the IGSA into a wavelet neural network (WNN), iteratively optimize the initial connection weighting, scalability factor, and shift factor, and establish a smart substation network traffic prediction model based on the IGSA-WNN. A comparative analysis of the experimental results shows that the performance of the IGSA-WNN-based prediction model further improves the convergence velocity and prediction accuracy, and that the proposed model solves the deficiency issues of the original WNN, such as slow convergence velocity and ease of falling into a locally optimal solution; thus, it is a better smart substation network traffic prediction model.

Design of a Simulation Model for Integrated Access Control (통합 접근 제어를 위한 시뮬레이션 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.49-54
    • /
    • 2004
  • Rule-based access control can not completely be replaced by identity-based access control. Neither can role-based access control be a merger of identity-based access control and rule-based access control, but can be used complementarily for each other. In this paper, is proposed a simulation model designed for a new integrated access control method that has been created by means of integrating the existing access control methods. The integrated access control method is equipped with security, integrity and flow control and can easily accomodate the requirements for access control from role-based corporate bodies. The simulation model proposed in this paper can be applied for real working system designs.

  • PDF

A Study on Problems and Improvement of Deposit System in Civil Law (민법상 공탁제도의 문제점과 개선방안에 관한 연구)

  • Park, Jong-Ryeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.89-92
    • /
    • 2017
  • 공탁이란 채권자의 수령거절이나 수령불능 또는 채권자를 알 수 없는 등으로 변제를 할 수 없는 때에 변제자가 채권자를 위하여 변제의 목적물을 지방법원 공탁소에 임치함으로써 채무를 면하는 제도를 말한다. 또한 권리의 실현과정에서 다양한 기능을 하고 있는 법적제도이지만, 국민의 권리실현을 위한 채무자 보호입장에서 실질적으로 사적기관에 이임되는 경우가 많다. 특히 오랜 역사 속에서 발전되어 온 공탁제도는 처음에는 선의의 채무자를 보호하기 위한 제도로 출발하였으나, 현재는 권리구제적인 측면에서 제재나 보안수단으로 발전되어 온 것이 사실이다. 그러나 이 공탁제도가 시대상황을 잘 반영하여 운영하고 있지만, 공탁물의 범위에 있어서 외국화폐나 사법상의 재산권을 표창하는 증거증권은 그 범주에 들지 않는 문제점 등이 제기되고 있다. 따라서 본 연구에서는 외국의 입법례를 통하여 우리의 현행 민법 하에서 국민의 법 감정과 정서에 맞는 가장 바람직한 공탁제도의 방향을 제시하고자 한다.

  • PDF

An Empirical Analysis of Consumer Satisfaction for Internet Shopping Mall (인터넷 쇼핑몰의 소비자만족에 대한 실증적 분석)

  • 염창선;지효원
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.59
    • /
    • pp.69-77
    • /
    • 2000
  • To make internet shopping mall competitive, effective consumer service should be provided. The objective of this study is to analyse the consumer satisfaction for internet shopping mall. For this purpose, questionnaire survey has been used. For the statistical analysis, multivariate linear regression were utilized using the SAS program. According to the results in this study, the variables that positively affect toward consumer satisfaction are the quality of goods, the information of goods, the display method of goods, the convenience of ordering point of time and cancellation. On the contrary, the variables that negatively affect toward consumer satisfaction are the price of goods and the weakness of information security.

  • PDF