• 제목/요약/키워드: security component

검색결과 406건 처리시간 0.026초

안티드론 시스템의 국방아키텍쳐 프레임워크 적용 연구 (MND-AF application study for anti-drone system)

  • 이동준;권형안;김지태;정길현;양상운
    • 시스템엔지니어링학술지
    • /
    • 제17권2호
    • /
    • pp.23-36
    • /
    • 2021
  • Recently, the rapid development of drones is increasing as a variety of threats to important facilities of the country. In order to build an anti-drone system that responds to drones with high technical characteristics, standardization is required in terms of operation, system, and technology. By applying the defense architecture framework, it contributes to the establishment of the optimal system by proposing a standardization plan for the operational and system perspectives of the anti-drone system by creating outputs equivalent to the stage of prior research on weapons systems. It is a prerequisite for building a drone system the operational concept of the anti-drone system, the definition of the drone threat, the function of each component, the interface, the definition of data flow, the system performance and effect scale, etc. Management, security officers, and equipment manufacturers of important national and public facilities on site expect that it will be used as an objective standard at the government level for the component technology of the equipment to respond to the drone threat and the performance required in the environment.

웹 컴포넌트 및 소프트웨어 보안 설계에 대한 분석 (Analyses of Design for Software Security and Web Component)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.591-594
    • /
    • 2008
  • This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framework provides an explicit opportunity for software composers as well as software components to test a priori security properties of software components in a system composition. The proposed framework uses logic programming as a tool to represent security properties of atomic components and reason about their compositional matching with other components.

  • PDF

카노 모형을 이용한 모바일 쇼핑몰 앱의 서비스 품질 요인 분석에 관한 연구 (The Study on the e-Service Quality Factors in m-Shopping Mall App based on the Kano Model)

  • 김상오;윤선희;이명진
    • 산경연구논집
    • /
    • 제9권12호
    • /
    • pp.63-72
    • /
    • 2018
  • Purpose - In this study, it is classified the service quality dimension of mobile shopping app using Kano model. In addition, it is evaluated quality factors suitable for strategic management from the viewpoint of service provider through mobile application through binary dimension analysis. Research design, data, and methodology - In this study, seven quality dimensions such as information quality, reliability, immediacy, convenience, design, security and customer service were derived through related studies to make binary shopping quality app quality measurement. 37 sub-variables were set by each quality dimensions. Each questionnaire was composed of positive and negative items like Kano's proposed method, and the satisfaction coefficient suggested by Timko(1993) was examined to understand the influence of each factors on customer satisfaction. Results - As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. And, in information quality, the information overload was classified as an apathetic quality component, while the related information provision belonged to an attractive quality component. In reliability quality, customized service provision was classified as an attractive quality component. In instant connectivity, the quality of the connection during transport was classified as an attractive quality component. In convenience quality, access to product information was classified as a one-way quality component. All components of designs quality were classified as attractive quality components, and in security quality, all of their components were all classified as one quality component. Lastly, in customer service, they components were all classified as a single quality component. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. Conclusion - In the online service environment, which is difficult to differentiate in terms of upward upgrading only by technological implementation and function, the results of this study can be suggested as a differentiating factor for major channels with customers rather than improve the brand image.

커널 기반 데이터를 이용한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구 (An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data)

  • 정만현;조재익;채수영;문종섭
    • 정보보호학회논문지
    • /
    • 제19권1호
    • /
    • pp.71-79
    • /
    • 2009
  • 현재 커널 기반 데이터인 시스템 호출을 이용하는 호스트 기반 침입 탐지 연구가 많이 진행되고 있다. 시스템 호출을 이용한 침입 탐지 연구는 시퀀스 기반과 빈도 기반으로 시스템 호출을 전 처리 하는 방법이 많이 사용되고 있다. 실시간 침입 탐지 시스템에 적용할 때 시스템에서 수집 되는 시스템 호출 데이터의 종류와 수집 데이터가 많아 전처리에 어려움이 많다. 그러나 비교적 시퀀스 기반 방법보다 전처리 시간이 작은 빈도 기반의 주로 방법이 사용 되고 있다. 본 논문에서는 현재에도 시스템 공격 중 비중을 많이 차지하고 있는 서비스 거부 공격을 탐지 하기위해 빈도 기반의 방법에 사용하는 전체 시스템 호출을 주성분 분석(principal component analysis)을 이용하여 주성분이 되는 시스템 호출들을 추출하여 베이지안 네트워크를 구성하고 베이지안 분류기를 통하여 탐지하는 효율적인 방법을 제안한다.

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • 제8권3호
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Term Frequency-Inverse Document Frequency (TF-IDF) Technique Using Principal Component Analysis (PCA) with Naive Bayes Classification

  • J.Uma;K.Prabha
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.113-118
    • /
    • 2024
  • Pursuance Sentiment Analysis on Twitter is difficult then performance it's used for great review. The present be for the reason to the tweet is extremely small with mostly contain slang, emoticon, and hash tag with other tweet words. A feature extraction stands every technique concerning structure and aspect point beginning particular tweets. The subdivision in a aspect vector is an integer that has a commitment on ascribing a supposition class to a tweet. The cycle of feature extraction is to eradicate the exact quality to get better the accurateness of the classifications models. In this manuscript we proposed Term Frequency-Inverse Document Frequency (TF-IDF) method is to secure Principal Component Analysis (PCA) with Naïve Bayes Classifiers. As the classifications process, the work proposed can produce different aspects from wildly valued feature commencing a Twitter dataset.

불완전한 얼굴 영상에서 부분적 요소를 이용한 얼굴인식 (Face recognition using the partial component in incomplete face image)

  • 김청빈;김기준;김현정;원일용
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.998-1001
    • /
    • 2014
  • 본 논문은 영상에서 불완전한 얼굴을 인식하는 방법으로 얼굴의 각 객체를 검출하여 특징을 비교하는 방법을 제안한다. 부분적 요소 즉, 얼굴의 눈, 코, 입을 각각 PCA(Principal component analysis)와 LDA(Linear discriminant analysis)를 이용해 특징을 추출한 등록된 데이터베이스와 비교하여 신원을 확인한다. 본 논문에서 제안하는 방법의 성능을 검증하기 위해 실험으로 증명하였으며, 기존에 제안된 방법들보다 현저히 높은 인식률을 보였다.

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • 제43권1호
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.

스마트 카드 보호프로파일 개발을 위하여 고려하여야 하는 물리적 위협 요소 분석 (Analysis of Physical Component Considered for The Development of Smart Card Protection Profile)

  • 김태훈;김민철;성윤기;조규민;노병규
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 D
    • /
    • pp.2747-2749
    • /
    • 2003
  • Security is concerned with the protection of assets from threats, where threats are categorised as the potential for abuse of protected assets. All categories of threats should be considered, but in the domain of security greater attention is given to those threats that are related to malicious or other human activities ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of threats about the TOE security environment or the intended usage of the TOE. This paper presents a specific physical threats should be considered in the smart card PP which developers of smart card PP must consider.

  • PDF

집합형 소규모 학교의 단위학교 평면구성 특성에 관한 연구 -외국학교 사례의 공간구성 분석을 통하여- (A Study on the Floor Plan Characteristics of Component Schools in Small Schools Complexes -by Analyzing Spatial Structures of School Facilities in Foreign Countries-)

  • 권지훈
    • 교육시설
    • /
    • 제14권4호
    • /
    • pp.86-95
    • /
    • 2007
  • This study clarifies the theoretical background and the floor plan characteristics of component schools in Small Schools Complexes. The recent researches have proved the enhancement of students' social relationship and school security in the new school environment. The findings fur the characteristics by analyzing the component schools from six school complexes follow: (1) Students can access their classrooms in component schools through main entrances, shared corridors and private corridors. (2) Teachers' area is segregated from students' area, which does not encourage the social relationship between teachers and students. (3) Some of special classrooms, which are generally considered as shared facilities in a Small Schools Complex, are planned within component schools for accommodating specialized educational programs. (4) A component school occupying multiple floors reduces Intelligibility of space and chances of users' visual contact to colleagues. Finally, this study proposed the alternative floor planning directions in order to improve users' social relationship in a component school.