• 제목/요약/키워드: internet security

검색결과 3,863건 처리시간 0.031초

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

인터네트 멀티미디어 전자우편의 보안 처리를 위한 라이브러리 함수 개발 (Library Function Development for Internet MOSS(MIME Object Security Service))

  • 윤성순;윤기송
    • 한국정보처리학회논문지
    • /
    • 제3권6호
    • /
    • pp.1493-1505
    • /
    • 1996
  • 인터네트의 사용의 급격한 증가와 멀티미디어 정보의 보편화에 따라 이를 이용하 는 다양한 전자우편 프로토콜들이 나타나고 있다. 이러한 전자우편의 상용화와 전자 우편을 통한 개인정보 및 주요정보 보호를 위해서는 암호화 기법을 이용한 보안기능 이 필수적이다. 논 논문은 멀티미디어를 지원하는 인터네트 전자우편(MIME;Multi -Purpose Internet Mail Extension)에 보안 기능을 추가한 MOSS(MIME Object Security Service)의 효과적 처리에 필요한 라이브러리 함수개발에 관하여 기술하였 다. 이를 위하여 MINE구조로 나타나는 암호화와 복호화, 전자결재 및 검증등의 보안 기능 처리를 위한 MOSS의 특성 및 구조에 관하여 기술하고 이를 실질적으로 개발하기 위한 자료구조 및 필요한 함수들을 정의하였으며 개발시 고려하여야 할 사항들에 대 하여 기술하였다.

  • PDF

Key-based dynamic S-Box approach for PRESENT lightweight block cipher

  • Yogaraja CA;Sheela Shobana Rani K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권12호
    • /
    • pp.3398-3415
    • /
    • 2023
  • Internet-of-Things (IoT) is an emerging technology that interconnects millions of small devices to enable communication between the devices. It is heavily deployed across small scale to large scale industries because of its wide range of applications. These devices are very capable of transferring data over the internet including critical data in few applications. Such data is exposed to various security threats and thereby raises privacy-related concerns. Even devices can be compromised by the attacker. Modern cryptographic algorithms running on traditional machines provide authentication, confidentiality, integrity, and non-repudiation in an easy manner. IoT devices have numerous constraints related to memory, storage, processors, operating systems and power. Researchers have proposed several hardware and software implementations for addressing security attacks in lightweight encryption mechanism. Several works have made on lightweight block ciphers for improving the confidentiality by means of providing security level against cryptanalysis techniques. With the advances in the cipher breaking techniques, it is important to increase the security level to much higher. This paper, focuses on securing the critical data that is being transmitted over the internet by PRESENT using key-based dynamic S-Box. Security analysis of the proposed algorithm against other lightweight block cipher shows a significant improvement against linear and differential attacks, biclique attack and avalanche effect. A novel key-based dynamic S-Box approach for PRESENT strongly withstands cryptanalytic attacks in the IoT Network.

IoT 환경에서 보안위협을 최소화하기 위한 방안 연구 (An Investigation Study to Reduce Security Threat in the Internet of Things Environment)

  • 신승수;채규수;이태현
    • 중소기업융합학회논문지
    • /
    • 제5권4호
    • /
    • pp.31-36
    • /
    • 2015
  • 최근 기기간의 연동작업이 증가하면서 사물인터넷의 필요성이 증가하고 있다. 그러나 다양한 통신 기술을 사물인터넷에 적용하면서 보안 위협이 높아지고 있다. 본 논문에서는 사물인터넷의 효율성을 향상시키기 위해서 사물인터넷에서 사용되는 다양한 보안 기술들의 보안 피해를 최소화하기 위한 보안 대응 방안을 제안한다. 제안 방법은 일상생활에서 사용하고 있는 TV, 세탁기, 냉장고, 보일러 등 가전제품과 체지방계, 혈당계, 혈압계 등의 의료기기 들들 서로 연결하여 보안 피해를 최소화하기 위한 환경을 정의하고 있다. 또한, 사물인터넷에서 사용하고 있는 다양한 기술들(Zigbee, Wi-Fi, NFC, RFID 등)을 통합 관리 할 수 있다.

  • PDF

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

사물 인터넷망에서의 보안 위협 기술 동향 분석 (Analyses of Trend of Threat of Security in Internet of Things)

  • 신윤구;정승화;도태훈;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

u-Healthcare 서비스의 정보보호 위협 분석 (Analysis of Security Threat in u-Healthcare Service)

  • 신동훈;한병진;이환진;정현철
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2010년도 한국컴퓨터종합학술대회논문집 Vol.37 No.1(D)
    • /
    • pp.52-55
    • /
    • 2010
  • 유비쿼터스 기술의 발전으로, u-City, u-물류, u-기상관측,u-Healthcare 등 다양한 융합 서비스가 개발되어 실생활에 적용되기를 기다리고 있다. 이들 중, 기존 의료서비스에 유비쿼터스 기술을 접목하여 언제, 어디서나 보건의료서비스를 제공하고자 하는 u-Healthcare 서비스의 경우에는, 바이오정보를 포함한 개인 정보와 의료정보를 다루기 때문에 해킹으로 인한 정보유출 사고발생시 국가적인 혼란과 사회적인 불신을 야기할 수 있다. 본 논문에서는 국내외에서 추진하고 있는 u-healthcare 서비스 현황을 조사하고, 이에 대한 보안위협을 제시하여 u-Healthcare 서비스의 정보보호 대책 수립시 활용할 수 있도록 제시한다.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권2호
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

스마트 컨트랙트 개발 보안 권장사항에 대한 연구 (A Study on Smart Contract Development Security Recommendations)

  • 김현준;박소현;이강효;하태균;김경백
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.265-267
    • /
    • 2023
  • 스마트 컨트랙트는 작성된 코드에 의해 정의되어 실행조건이 충족될 시 자동으로 실행되는 전자 계약으로 다양한 분야에서 활용될 수 있다. 스마트 컨트랙트가 블록체인 네트워크에 배포되면 수정이 불가한데, 개발자들이 스마트 컨트랙트를 작성하는데 코드 패턴 재상용 하는 경우가 대다수이다. 이로 인한 스마트 컨트랙트 취약점 사고를 예방하기 위해 개발 단계에서 보안을 고려하여 스마트 컨트랙트 작성이 필요하다. 본 논문에서는 대표적인 스마트 컨트랙트에 대한 보안 취약점을 확인하고 보안 권장 사항을 정리한다.

인터넷 뱅킹 사용과 보안우려의 관계: 기술수용모형의 확장 (The Relationship between Use of Internet Banking and Security Anxiety: Extending TAM)

  • 황하진;이웅규
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2003년도 춘계학술대회
    • /
    • pp.93-105
    • /
    • 2003
  • Although, recently, studies on Internet banking users' behavior have been frequently found in some academic journals, most of them have ignored security anxiety which may be considered as important factors influencing usages of Internet banking. We propose an research model for Internet banking users which is an extended version of the Technology Acceptance Model(TAM) by adding new variable, security anxiety. For empirical support of our model, we survey for 298 samples and analyze it by structured equation model(SEM). In result, our proposed model is proved as a valid one in which all hypotheses except one are accepted and the values of model fitness are relatively high.

  • PDF