• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.043 seconds

MapReduce-Based Partitioner Big Data Analysis Scheme for Processing Rate of Log Analysis (로그 분석 처리율 향상을 위한 맵리듀스 기반 분할 빅데이터 분석 기법)

  • Lee, Hyeopgeon;Kim, Young-Woon;Park, Jiyong;Lee, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.593-600
    • /
    • 2018
  • Owing to the advancement of Internet and smart devices, access to various media such as social media became easy; thus, a large amount of big data is being produced. Particularly, the companies that provide various Internet services are analyzing the big data by using the MapReduce-based big data analysis techniques to investigate the customer preferences and patterns and strengthen the security. However, with MapReduce, when the big data is analyzed by defining the number of reducer objects generated in the reduce stage as one, the processing rate of big data analysis decreases. Therefore, in this paper, a MapReduce-based split big data analysis method is proposed to improve the log analysis processing rate. The proposed method separates the reducer partitioning stage and the analysis result combining stage and improves the big data processing rate by decreasing the bottleneck phenomenon by generating the number of reducer objects dynamically.

An Active Functionality Component to Support Timely Collaboration among Businesses in B2B EC Environment (B2B 전자 상거래 환경에서 기업 사이의 적기 협력 지원을 위한 능동 기능 컴포넌트)

  • Lee Dong Woo;Lee Seong Hoon;Hwang Chong Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.165-179
    • /
    • 2005
  • Close collaboration among businesses is required in B2B EC environment. Furthermore, emergency requests or critical information among businesses should be processed in an immediate mode. Most current systems, however, due to firewalls for the systems' security and autonomy, can not handle these requirements appropriately, but handle them in an ad hoc manner In this paper a method of timely collaboration among businesses and an active functionality component to support it in B2B EC environment are proposed. Since the active functionality component supports high level ECA rule patterns and event-based immediate processing, system administrators and programmers can easily program and maintain the timely collaboration independently to the application logic. The proposed active functionality component uses HTTP protocol to be applied through firewalls and is designed using a commercial DBMS for practical purpose.

A Study on Secure Remote User Authentication Scheme using Smart Card (스마트카드를 이용한 안전한 원격 사용자 인증기법에 관한 연구)

  • Go, Sung Jong;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.503-510
    • /
    • 2013
  • Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.

Effects of Trust and Cognitive Absorption on Smart Phone Use and User Satisfaction (신뢰와 인지적 몰입 매개변수가 스마트폰의 사용과 만족도에 미치는 영향 분석)

  • Lee, Bong-Gyou;Yeo, Yoon-Ki;Kim, Ki-Youn;Lee, Jong-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.471-480
    • /
    • 2010
  • The purpose of this study is to explore determinants which affect the significant increase in the user acceptance of smart phone. This study also analyzes the effect of each variable on the actual acceptance by empirical methods. In this study, first, the system quality and the service quality are defined as independent variables based on developed IS success model of DeLone & McLean(2003). Second, we proposed the research model by providing trust and perceptual immersion as intermediate variables, and user satisfaction and actual use as dependent variables by the proceeding research for accepting information technology and new service. Third, the statistical analysis is conducted by surveying to 200 smart phone users for verifying a validity of research models and hypotheses. As a result, almost hypotheses are accepted in confidence interval except for the hypothesis between security and trust variable.

Strategic Analysis of the Multilateral Bargaining for the Distribution Channels with Different Transaction Costs (거래비용이 상이한 복수의 유통채널에 대한 다자간 협상전략에 관한 연구)

  • Cho, Hyung-Rae;Rhee, Minho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.80-87
    • /
    • 2015
  • The proliferation of the Internet and communication technologies and applications, besides the conventional retailers, has led to a new form of distribution channel, namely home sopping through the telephone, TV, catalog or the Internet. The conventional and new distribution channels have different transaction costs perceived by the consumers in the following perspectives: the accessibility to the product information, the traffic cost and the opportunity cost for the time to visit the store, the possibility of 'touch and feel' to test the quality of the product, the delivery time and the concern for the security for the personal information. Difference in the transaction costs between the distribution channels results in the different selling prices even for the same product. Moreover, distribution channels with different selling prices necessarily result in different business surpluses. In this paper, we study the multilateral bargaining strategy of a manufacturer who sells a product through multiple distribution channels with different transaction costs. We first derive the Nash equilibrium solutions for both simultaneous and sequential bargaining games. The numerical analyses for the Nash equilibrium solutions show that the optimal bargaining strategy of the manufacturer heavily depends not only on the degree of competition between the distribution channels but on the difference of the business surpluses of the distribution channels. First, it is shown that there can be four types of locally optimal bargaining strategies if we assume the market powers of the manufacturer over the distribution channels can be different. It is also shown that, among the four local optimal bargaining strategies, simultaneous bargaining with the distribution channels is the most preferred bargaining strategy for the manufacturer.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Object classification and the number of pixels compared with children protection (화소 수 비교를 통한 성인과 유아 구분 방법)

  • Kang, ji-hun;Kim, chang-dae;Ryu, sung-pil;Kim, dong-woo;Ahn, jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.725-728
    • /
    • 2014
  • Continue to have an increasingly violent crimes against children every year, and as you know all seriousness is classified as a felony. However, efforts to reduce the underlying crime is low. Therefore, it is necessary to solve this problem, the security system. Is to protect the children and adults that exist that can pose a threat to children to identify and monitor tracking method in this paper. Was based on a Korean standard body size of a person, such as keys, arm length, leg length, head vertical length, head width proposed method. Also, separate the adults and children through the comparison of the reference value, the ratio and the ratio of the number of pixels of the detected object, the proposed method. Processing speed is fast because it detects only a specific object region in the entire image in the handling method in the proposed method the five nine minutes. The advantage is to enable comparison of the specific object, through which there is.

  • PDF

A Pre-processing Study to Solve the Problem of Rare Class Classification of Network Traffic Data (네트워크 트래픽 데이터의 희소 클래스 분류 문제 해결을 위한 전처리 연구)

  • Ryu, Kyung Joon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.411-418
    • /
    • 2020
  • In the field of information security, IDS(Intrusion Detection System) is normally classified in two different categories: signature-based IDS and anomaly-based IDS. Many studies in anomaly-based IDS have been conducted that analyze network traffic data generated in cyberspace by machine learning algorithms. In this paper, we studied pre-processing methods to overcome performance degradation problems cashed by rare classes. We experimented classification performance of a Machine Learning algorithm by reconstructing data set based on rare classes and semi rare classes. After reconstructing data into three different sets, wrapper and filter feature selection methods are applied continuously. Each data set is regularized by a quantile scaler. Depp neural network model is used for learning and validation. The evaluation results are compared by true positive values and false negative values. We acquired improved classification performances on all of three data sets.

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

Relationship among e-Service Quality, Relationship Quality, and e-Loyalty of Small Medical Clinic (소형병원의 e-서비스품질, 관계의 질, e-충성도의 영향관계)

  • Kim, JI-Young
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.3
    • /
    • pp.689-699
    • /
    • 2021
  • The spread of the COVID-19 pandemic has been increasing non-face-to-face activities; as a result, this has resulted in the number of individuals obtaining medical information from the websites and mobile contents of medical institutions increasing. The study conducted the structural equation modeling to test hypotheses; as a result, all sub-factors of e-service quality of small medical clinic websites and mobile contents, usability, security, responsiveness, design, and information, had a significant positive effect on relationship quality, and relationship quality had a significant positive effect on e-Loyalty. Moreover, the structural equation model showed a good model fit, χ2/df of 2.021, NFI of .954, TLI of .969, CFI of .976, RMSEA of .046. Future research is suggested to study relationship quality by developing a system able to quickly and accurately respond to websites and mobile contents users; furthermore, improving e-service quality and relationship quality is likely to strengthen e-loyalty.