• 제목/요약/키워드: security component

검색결과 406건 처리시간 0.034초

기계학습 기반 랜섬웨어 공격 탐지를 위한 효과적인 특성 추출기법 비교분석 (Comparative Analysis of Dimensionality Reduction Techniques for Advanced Ransomware Detection with Machine Learning)

  • 김한석;이수진
    • 융합보안논문지
    • /
    • 제23권1호
    • /
    • pp.117-123
    • /
    • 2023
  • 점점 더 고도화되고 있는 랜섬웨어 공격을 기계학습 기반 모델로 탐지하기 위해서는, 분류 모델이 고차원의 특성을 가지는 학습데이터를 훈련해야 한다. 그리고 이 경우 '차원의 저주' 현상이 발생하기 쉽다. 따라서 차원의 저주 현상을 회피하면서 학습모델의 정확성을 높이고 실행 속도를 향상하기 위해 특성의 차원 축소가 반드시 선행되어야 한다. 본 논문에서는 특성의 차원이 극단적으로 다른 2종의 데이터세트를 대상으로 3종의 기계학습 모델과 2종의 특성 추출기법을 적용하여 랜섬웨어 분류를 수행하였다. 실험 결과, 이진 분류에서는 특성 차원 축소기법이 성능 향상에 큰 영향을 미치지 않았으며, 다중 분류에서도 데이터세트의 특성 차원이 작을 경우에는 동일하였다. 그러나 학습데이터가 고차원의 특성을 가지는 상황에서 다중 분류를 시도했을 경우 LDA(Linear Discriminant Analysis)가 우수한 성능을 나타냈다.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

An ICI Canceling 5G System Receiver for 500km/h Linear Motor Car

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.27-34
    • /
    • 2023
  • This paper proposed an Inter-Carrier-Interference (ICI) Canceling Orthogonal Frequency Division Multiplexing (OFDM) receiver for 5G mobile system to support 500 km/h linear motor high speed terrestrial transportation service. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceler is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number 𝒏 to receiver sub-carrier number 𝒍 is generated. In case of 𝒏≠𝒍, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 2 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, for modulation schemes below 16QAM, we confirmed that the difference between BER in a 2 path reverse Doppler shift environment and stationary environment at a moving speed of 500 km/h was very small when the number of taps in the multi-tap equalizer was set to 31 taps or more. We also confirmed that the BER performance in high-speed mobile communications for multi-level modulation schemes above 64QAM is dramatically improved by the use of a multi-tap equalizer.

A Modified Delay and Doppler Profiler based ICI Canceling OFDM Receiver for Underwater Multi-path Doppler Channel

  • Catherine Akioya;Shiho Oshiro;Hiromasa Yamada;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.1-8
    • /
    • 2023
  • An Orthogonal Frequency Division Multiplexing (OFDM) based wireless communication system has drawn wide attention for its high transmission rate and high spectrum efficiency in not only radio but also Underwater Acoustic (UWA) applications. Because of the narrow sub-carrier spacing of OFDM, orthogonality between sub-carriers is easily affected by Doppler effect caused by the movement of transmitter or receiver. Previously, Doppler compensation signal processing algorithm for Desired propagation path was proposed. However, other Doppler shifts caused by delayed Undesired signal arriving from different directions cannot be perfectly compensated. Then Receiver Bit Error Rate (BER) is degraded by Inter-Carrier-Interference (ICI) caused in the case of Multi-path Doppler channel. To mitigate the ICI effect, a modified Delay and Doppler Profiler (mDDP), which estimates not only attenuation, relative delay and Doppler shift but also sampling clock shift of each multi-path component, is proposed. Based on the outputs of mDDP, an ICI canceling multi-tap equalizer is also proposed. Computer simulated performances of one-tap equalizer with the conventional Time domain linear interpolated Channel Transfer Function (CTF) estimator, multi-tap equalizer based on mDDP are compared. According to the simulation results, BER improvement has been observed. Especially, in the condition of 16QAM modulation, transmitting vessel speed of 6m/s, two-path multipath channel with direct path and ocean surface reflection path; more than one order of magnitude BER reduction has been observed at CNR=30dB.

6 라운드로 축소된 Sparkle384와 7 라운드로 축소된 Sparkle512에 대한 새로운 구별 공격 (New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds)

  • 홍득조;장동훈
    • 정보보호학회논문지
    • /
    • 제33권6호
    • /
    • pp.869-879
    • /
    • 2023
  • Sparkle은 NIST에서 최근까지 진행한 경량 암호 표준화 프로세스의 최종 후보 알고리즘 중 하나로서, 비선형 퍼뮤테이션이며, 인증 암호화 알고리즘 Schwaemm 및 해시함수 Esch의 핵심 구성 요소이다. 본 논문에서는 Sparkle의 두 버전 Sparkle384의 6 라운드와 Sparkle512의 7 라운드에 대해 특정한 형태의 입력 차분과 출력 차분을 제시하고, 그것을 만족시키는 입력쌍을 찾는 복잡도에 관한 공식을 제시한다. 또한, 같은 입출력 크기를 갖는 랜덤 퍼뮤테이션에 대한 동일 작업 보다 복잡도가 훨씬 낮을 가능성이 매우 크다는 것을 보인다. 그러므로, 이것들은 유효한 구별 공격이 된다. 공격되는 라운드 수(6과 7)는 실제 사용되는 라운드 수의 최소값(7과 8)과 매우 가깝다.

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

영역기반 주성분 분석 방법과 보조정보를 이용한 얼굴정보의 비트열 변환 방법 (A Study on A Biometric Bits Extraction Method Using Subpattern-based PCA and A Helper Data)

  • 이형구;정호기
    • 대한전자공학회논문지SP
    • /
    • 제47권5호
    • /
    • pp.183-191
    • /
    • 2010
  • 생체인식은 개인의 유일하면서 변화하지 않는 생체의 특징을 이용하여 개인의 본인 여부를 판별하는 방법으로써 널리 사용되어 왔다. 생체정보의 고유 불변한 특징을 저장하는 것은 개인정보의 노출에 따른 보안상의 문제점을 갖고 있으며 이를 해결하기 위해 제안된 방법이 가변생체인식 (cancelable biometrics)이다. 가변생체인식은 생체정보의 도난이나 도용으로부터 강인하며 재생성 가능한 생체템플릿을 제공하는 생체 인식방법이다. 본 논문에서는 변환 생체인식의 한 가지 방법으로써 얼굴 생체정보의 새로운 이진화 방법을 제안한다. 얼굴 생체정보의 이진화를 위한 특징추출은 얼굴정보의 부분적 변화에 강인한 영역기반 주성분 분석(Subpattern-based PCA)을 이용하였으며 이로부터 얻어진 특징을 보조정보에 기반한 방법으로 이진화 하였다. 획득된 이진비트열은 영역기반 주성분 분석의 사용으로 여러 얼굴 영역의 고려와 함께, 선택된 주성분 개수만큼의 계수들에 대한 이진화 값들을 포함하고 있다. 이러한 서로 다른 얼굴영역의 여러 주성분들에서 추출된 이진비트열중 구분력이 좋은 비트 값들을 선택하였으며, 선택된 비트 값들은 이진화를 위한 보조 정보가 노출된 경우에서도 원 얼굴특징벡터보다 향상된 인식성능을 보여준다.

하이패스플러스카드 시스템을 위한 PSAM 시험 모듈 개발 (Developing the Test Module of PSAM for $Hipass^{PLUS}$ Card System)

  • 이기한;서현교;유창희;이승환
    • 한국ITS학회 논문지
    • /
    • 제2권2호
    • /
    • pp.73-84
    • /
    • 2003
  • 한국도로공사는 기존 선불형 플라스틱하드에 문제가 많아서 이를 해결하기 위해서 하이패스플러스 카드인 스마트카드를 이용한 선불형 전자지불카드 시스템을 구현했다. 이 시스템에는 선불형 전자지불카드인 하이패스플러스카드로부터 가치를 지불 받을 수 있는 스마트카드인 PSAM이 필요하다. 그리고, PSAM은 PSAM에 저장된 거래내역을 정산하기 위해서 CSAM에 전달하여야 한다. 따라서, PSAM의 기능 및 보안이 완벽해야 한국도로공사의 전자지불시스템이 안전하다. 본 논문은 일반 가맹점, 하이패스, 또는 표준 SAM 기능에 의해서 하이패스플러스카드의 가치가 PSAM으로 지불되거나 PSAM에 저장된 거래내역을 CSAM에 전달하는 기능 및 보안성을 시험하기 위해서 시험 방법, 시험 표준항목, 그리고 시험 절차 등을 포함한 시험 모듈을 개발했다. 시험 모듈은 시험 검사표에 의한 시험 표준항목을 시험할 수 있는 방법 및 절차를 따라서 개발했다. PSAM의 시험 표준항목 및 시험 검사표는 한국도로공사 규격서에 준하여 ISO 표준에 적합한 시험 항목으로 선정했다 시험은 한국도로공사에서 사용되는 PSAM을 이용하여 실행하였다. 본 시험 모듈은 PShM의 기능뿐 아니라 보안성 및 적합성을 시험하였다. 시험 결과에 의하면, 한국도로공사에서 사용하는 PSAM은 기능 및 보안성이 시험인증 기준을 통과하였다.

  • PDF

ITX 차량 운행에 의한 AF 무절연 궤도회로의 귀선전류 영향 분석 (Analysis of Return Current Effect for AF Non-insulated Track Circuit in ITX Vehicle Operation)

  • 백종현;김용규;윤용기;장동욱;신동호
    • 전기학회논문지
    • /
    • 제62권4호
    • /
    • pp.584-590
    • /
    • 2013
  • Depending on the operating characteristics, track circuit is installed for the purpose of control directly or indirectly of the signal device, point switch machine and other security device. These are mainly used for train detection, transmission of information, broken train detection and transmission of return current. Especially, the return current is related to signal system, power system and catenary line, and track circuit systems. It is one of the most important component shall be dealt for the safety of track side staff and for the protection of railway-related electrical system according to electrification. Therefore, an accurate analysis of the return current is needed to prevent the return current unbalance and the system induced disorder and failure due to an over current condition. Also, if the malfunction occurred by the return current harmonics, it can cause problems including train operation interruption. In this paper, we presented measurement and analysis method at return current and it's harmonics by train operation. By the test criteria, we evaluated for safety. Hereafter, it is expected to contribute to the field associated with it.

Visible Light Communication Method for Personalized and Localized Building Energy Management

  • Jeong, Jin-Doo;Lim, Sang-Kyu;Han, Jinsoo;Park, Wan-Ki;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • 제38권4호
    • /
    • pp.735-745
    • /
    • 2016
  • The Paris agreement at the 21st Conference of the Parties (COP21) emphasizes the reduction of greenhouse gas emissions and increase in energy consumption in all areas. Thus, an important aspect is energy saving in buildings where the lighting is a major component of the electrical energy consumption. This paper proposes a building energy management system employing visible light communication (VLC) based on LED lighting. The proposed management system has key characteristics including personalization and localization by utilizing such VLC advantages as secure communication through light and location-information transmission. Considering the efficient implementation of an energy-consumption adjustment using LED luminaires, this paper adopts variable pulse position modulation (VPPM) as a VLC modulation scheme with simple controllability of the dimming level that is capable of providing a full dimming range. This paper analyzes the VPPM performances according to variable dimming for several schemes, and proposes a VPPM demodulation architecture based on dimming-factor acquisition, which can obtain an improved performance compared to a 2PPM-based scheme. In addition, the effect of a dimming-factor acquisition error is analyzed, and a frame format for minimizing this error effect is proposed.