• Title/Summary/Keyword: public security environment

Search Result 414, Processing Time 0.036 seconds

Classification of Network Traffic using Machine Learning for Software Defined Networks

  • Muhammad Shahzad Haroon;Husnain Mansoor
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.91-100
    • /
    • 2023
  • As SDN devices and systems hit the market, security in SDN must be raised on the agenda. SDN has become an interesting area in both academics and industry. SDN promises many benefits which attract many IT managers and Leading IT companies which motivates them to switch to SDN. Over the last three decades, network attacks becoming more sophisticated and complex to detect. The goal is to study how traffic information can be extracted from an SDN controller and open virtual switches (OVS) using SDN mechanisms. The testbed environment is created using the RYU controller and Mininet. The extracted information is further used to detect these attacks efficiently using a machine learning approach. To use the Machine learning approach, a dataset is required. Currently, a public SDN based dataset is not available. In this paper, SDN based dataset is created which include legitimate and non-legitimate traffic. Classification is divided into two categories: binary and multiclass classification. Traffic has been classified with or without dimension reduction techniques like PCA and LDA. Our approach provides 98.58% of accuracy using a random forest algorithm.

Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment (통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발)

  • Jung, Hae-Yong;Kim, Sang-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing

  • Li, Haoxing;Li, Fenghua;Song, Chenggen;Yan, Yalong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2719-2735
    • /
    • 2015
  • In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposed many mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few of them can resist from the smart card lost problem and provide both of the forward security and the backward security. In this paper, we propose a novel authentication scheme for cloud computing which can address these problems and also provide the anonymity for the user. The trick we use is using the password, the smart card and the public key technique to protect the processes of the user's authentication and key exchange. Under the Elliptic Curve Diffie-Hellman (ECDH) assumption, it is provably secure in the random oracle model. Compared with the existing smart card based authentication schemes in the cloud computing, the proposed scheme can provide better security degree.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

Normative-Legal and Information Security of Socio-Political Processes in Ukraine: a Comparative Aspect

  • Goshovska, Valentyna;Danylenko, Lydiia;Chukhrai, Ihor;Chukhrai, Nataliia;Kononenko, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.57-66
    • /
    • 2022
  • The aim of the article is to investigate socio-political processes in Ukraine on the basis of institutional and behavioral approaches, in particular their regulatory and informational support. Methodology. To determine the nature and content of sociopolitical processes, the following approaches have been used: 1. Institutional approach in order to analyze the development of Ukraine's political institutions. 2. The behavioral approach has been used for the analysis of socio-political processes in Ukraine in the context of political behavior of citizens, their political activity which forms the political culture of the country. Results. The general features of the socio-political situation in Ukraine are as follows: the formed model of government, which can be conditionally described as "presidential"; public demand for new leaders remains at a high level; the society has no common vision of further development; significant tendency of reduction of real incomes of a significant part of the society and strengthening of fiscal pressure on businessmen will get a public response after some time. Increasing levels of voice, accountability, efficiency of governance and the quality of the regulatory environment indicate a slow change in the political system, which will have a positive impact on public sentiment in the future. At the same time, there has been little change in the quality of Ukraine's institutions to ensure political stability, the rule of law and control of corruption. There are no cardinal changes in the development of the institution of property rights, protection of intellectual rights, changes in the sphere of ethics and control of corruption. Thus, Ukraine's political institutions have not been able to bring about any change in the social-political processes. Accordingly, an average level of trust and confidence of citizens in political institutions and negative public sentiment regarding their perception and future change can be traced in Ukraine.

The Activation Strategy and Diagnostic Issues through Business Environment (SWOT) Analysis for Private Security Industry (민간경비 산업의 경영환경(SWOT)분석과 활성화 전략)

  • Ahn, Hwang-Kwon;Park, Young-Man
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.229-248
    • /
    • 2009
  • This research is looking for the private security industry and diagnostic issues and enable our strategy will be presented through SWOT analysis for the management environment of private security industry to ultimately contribute to the private security industry. Along, the purpose of this research is to want to reach key factors which affect the competitiveness of the private security industry. This study was to conduct literature research and surveys. And analyzing literature and data was collected. And determined the status of private security industry by conducted a comprehensive survey with 13 experts is causal. The question investigation hemisphere the question which harmonizes became accomplished in the center. Like this question analyzed the opinion of the identical research participant and 3 times was executed repetitively, and 2 to verify the data through multiple data as a basis for the SWOT analysis of the environment. Accordingly, the following conclusion emerges. First, the private security industry-related legislation will complement the systematic. This is the task of the public security authority and the relationship will be in the direction for improvement. Second, to develop strategies for diversification of products and services through the use of IT. This business what development security services and products based on IT advanced technology can provide a solution to maximize profits to large security companies and to all of the small companies. Third, it should seek ways to make exports that social safety net project based on security technology and capital of Kore for other Asian countries or developing countries in the world.

  • PDF

Efficient and Dynamic Authenticated Dictionary Design Using RSA One-way Accumulator (RSA 일방향 어큐뮬레이터를 이용한 효율적이고 동적인 인증 딕셔너리 설계)

  • Kim, Soon-Seok;Lee, Yong-Hee;Lee, Kang-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.651-660
    • /
    • 2008
  • The widespread use of public networks, such as the Internet, for the exchange of sensitive data that need a severe security, like legally valid documents and business transactions. At the same time public-key certificates used for sensitive data interchange form the viewpoint of data integrity and authentication. But there are some weakness of data transfer capacity and security in public key infrastructure(PKI) environment. This paper use the RSA one-way accumulator to realize an efficient and dynamic authenticated dictionary, where untrusted directories provide cryptographically verifiable answers to membership queries on a set maintained by a trusted source.

Decision Tree Analysis for Prediction Model of Poverty of The Older Population in South Korea

  • Lee, Soochang;Kim, Daechan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.28-33
    • /
    • 2022
  • This study aims to investigate factors that affect elderly poverty based on a comprehensive and universal perspective, suggesting some alternatives for improving the poverty rate of the elderly. The comprehensive and universal approach to the poverty of the aged that this study attempts can give a better understanding of the elderly poverty beyond the contribution of the existing literature, with the research model including individual, family, labor, and income factors as the causes of old-age poverty from the comprehensive and universal perspective on the causes of poverty of the elderly. In addition, the study attempts to input variants of variables into the equation for the causes of elderly poverty by using panel data from the 8th Korean Retirement and Income Study. This study employs decision tree analysis to determine the cause of the poverty of the elderly using CHAID. The decision tree analysis shows that the most vital variable affecting elderly poverty is making income. For the poor elderly without earned income, public pensions, educational careers, and residential areas influence elderly poverty, but for the poor elderly with earned income, wage earners and gender are variables that affect poverty. This study suggests some alternatives to improve the poverty rate of the aged. The government should create a better working environment such as senior re-employment for old people to be able to participate in economic activities, improve public pension or social security for workers with unfavorable conditions for public security of old age, and give companies that create employment of the aged diverse incentives.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

A Study on Memory Hacking Prevention System in Windows Environment (윈도우 환경에서의 메모리 해킹 방지 시스템 연구)

  • Kim, Yo-Sik;Yun, Young-Tae;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.75-86
    • /
    • 2005
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing due to the advances in reverse engineering techniques. Furthermore someone who has concerns about these area can crack the software by using the open-to-public simple tools on the internet. The software companies are struggling to defend their own softwares against threats, while the crackers are continuing to crack the softwares. In this paper, we first establish the generic software threat model and, analyze and experiment on the software cracks, before suggest a memory hacking prevention system in Microsoft Windows environment.

  • PDF