• Title/Summary/Keyword: security rule

Search Result 286, Processing Time 0.025 seconds

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

A Implementation of Oriental Medicine U-Healthcare Service Model Using CDSS (CDSS를 이용한 한방 U-Healthcare 서비스 모델 구현)

  • Eun, Sung-Jong;Do, Jun-Hyeong;Kim, Keun-Ho;WhangBo, Taeg-Keun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.59-70
    • /
    • 2010
  • The Ubiquitous Healthcare business are growing recently by medical service development. According to this environment, many healthcare service model have been studying and suggested. At the same time, medical world market has been reorganized into a traditional medical science out of the west medical science. But in spite of this trend, domestic U-Healthcare market in traditional medical science is for lack of profit service model. So it is true that the presentation is demanded from oriental medicine U-Healthcare service model these days in oriental field. Thus, in this paper we propose the healthcare service model that can be applied to the oriental field efficiently. Our method is based on fuzzy rule method that analyze the patient data by CDSS processing. In experiment, proposed method is more profitable and efficient than west service model. For future works, we will research about the standardization and security of processed data.

Study on the mechanism for the dynamic traversing of multiple firewalls using the concept of one-time master key (일회용 마스터 키 개념을 이용한 다중 방화벽 동적 통과 메커니즘 연구)

  • Park, Hyoung-Woo;Kim, Sang-Wan;Kim, Jong-Suk Ruth.;Jang, Haeng-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2010
  • If an exterior computer wants to join the Grid/cloud computing platform for a while, all of the related firewalls' filtering rule should be immediately updated. As the platform of Internet application is gradually evolving into the Grid/Cloud environment, the R&D requirement for the dynamic traversing of the multiple firewalls by a single try is also increasing. In this paper, we introduce the new mechanism for the dynamic traversing of the multiple firewalls using the concept of the one-time master key that can dynamically unlock the tiers of firewalls simultaneously instead of the existed filtering rule based method like a lock management at each firewall. The proposed master keys are like one-time password, consisted of IP addresses, port numbers, and TCP's initial sequence numbers, and generated by end users not administrators. They're exchanged mutually in advance and used to make a hole at local-side firewalls for the other's packet incoming. Therefore, the proposed mechanism can function regardless of the number or type of firewalls.

  • PDF

Complemented Maximum-Length Cellular Automata Applied on Video Encryption (비디오 암호화를 위한 여원 최대길이 셀룰라 오토마타)

  • Li, Gao-Yong;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.13-18
    • /
    • 2017
  • With the advancement of internet technology, the importance of data protection is gaining more attention. As a possible data protection solution, we propose a novel video encryption method using complemented maximum-length cellular automata (C-MLCA). The first step for encryption is to use 90/150 CA rule to generate a transition matrix T of a C-MLCA state followed by a 2D C-MLCA basis image. Then, we divide the video into multiple frames. Once, we perform exclusive-OR operation with the split frames and the 2D basis image, the final encrypted video can be obtained. By altering values of pixel, the fundamental information in visualizing image data, the proposed method provides improved security. Moreover, we carry out some computational experiments to further evaluate our method where the results confirm its feasibility.

A Study on the Corrosion Fatigue Crack Behavior of SPV 50 for Gas Storage Tanks in Marine Environment (해양환경 중에서 가스저장탱크용 SPV 50강재의 부식피로균열(腐蝕疲勞龜裂) 거동(擧動)에 관한 연구(硏究))

  • Lim, Uh-Joh;Shin, Jong-Dae
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.9 no.2
    • /
    • pp.198-208
    • /
    • 1997
  • Recently, with rapid increase of gas demand, there occurs much interest their security of safety in the gas storage tanks and pressure vessels etc. In order to solve the problems, the occurrence of corrosion fatigue crack and the propagation behavior must be investigated. Especially the occurrence of corrosion fatigue crack and the propagation behavior in the part which has concentrated stress or defects, must be studied more carefully. In this paper, the high-tensile steel of SPV 50 which is much used for building the LPG storage tanks was tested by the use of a plane bending corrosion fatigue tester under the various marine environment and in the air. These experiments were carried out to investigate the surface crack propagation behavior, the value of experimental constant for Paris' rule(da/dN=$C(K)^m$), the crack depth propagation rate and the accelerative factor of the surface crack propagation rate. The main results obtained are as follows ; 1) As the specific resistances of marine environment decreases, the exponential value of slope m of Paris' rule(da/dN=$C(K)^m$) decreases and the value of intercept C increases. 2) The surface crack propagation rate and the crack depth propagation rate are delayed, as the specific resistances of marine environment is increased. 3) The accelerative factor of the surface crack propagation rate by corrosion fatigue is higher, according as the stress intensity factor range ${\Delta}K_A$ is small.

  • PDF

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

An Active Functionality Component to Support Timely Collaboration among Businesses in B2B EC Environment (B2B 전자 상거래 환경에서 기업 사이의 적기 협력 지원을 위한 능동 기능 컴포넌트)

  • Lee Dong Woo;Lee Seong Hoon;Hwang Chong Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.165-179
    • /
    • 2005
  • Close collaboration among businesses is required in B2B EC environment. Furthermore, emergency requests or critical information among businesses should be processed in an immediate mode. Most current systems, however, due to firewalls for the systems' security and autonomy, can not handle these requirements appropriately, but handle them in an ad hoc manner In this paper a method of timely collaboration among businesses and an active functionality component to support it in B2B EC environment are proposed. Since the active functionality component supports high level ECA rule patterns and event-based immediate processing, system administrators and programmers can easily program and maintain the timely collaboration independently to the application logic. The proposed active functionality component uses HTTP protocol to be applied through firewalls and is designed using a commercial DBMS for practical purpose.

A New Study on Vibration Data Acquisition and Intelligent Fault Diagnostic System for Aero-engine

  • Ding, Yongshan;Jiang, Dongxiang
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.16-21
    • /
    • 2008
  • Aero-engine, as one kind of rotating machinery with complex structure and high rotating speed, has complicated vibration faults. Therefore, condition monitoring and fault diagnosis system is very important for airplane security. In this paper, a vibration data acquisition and intelligent fault diagnosis system is introduced. First, the vibration data acquisition part is described in detail. This part consists of hardware acquisition modules and software analysis modules which can realize real-time data acquisition and analysis, off-line data analysis, trend analysis, fault simulation and graphical result display. The acquisition vibration data are prepared for the following intelligent fault diagnosis. Secondly, two advanced artificial intelligent(AI) methods, mapping-based and rule-based, are discussed. One is artificial neural network(ANN) which is an ideal tool for aero-engine fault diagnosis and has strong ability to learn complex nonlinear functions. The other is data mining, another AI method, has advantages of discovering knowledge from massive data and automatically extracting diagnostic rules. Thirdly, lots of historical data are used for training the ANN and extracting rules by data mining. Then, real-time data are input into the trained ANN for mapping-based fault diagnosis. At the same time, extracted rules are revised by expert experience and used for rule-based fault diagnosis. From the results of the experiments, the conclusion is obvious that both the two AI methods are effective on aero-engine vibration fault diagnosis, while each of them has its individual quality. The whole system can be developed in local vibration monitoring and real-time fault diagnosis for aero-engine.

  • PDF

Study on Equivalent Consumption Minimization Strategy Application in PTI-PTO Mode of Diesel-Electric Hybrid Propulsion System for Ships

  • Lee, Dae-Hong;Kim, Jong-Su;Yoon, Kyoung-Kuk;Hur, Jae-Jung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.3
    • /
    • pp.451-458
    • /
    • 2022
  • In Korea, five major ports have been designated as sulfur oxide emission control areas to reduce air pollutant emissions, in accordance with Article 10 of the "Special Act on Port Air Quality" and Article 32 of the "Ship Pollution Prevention Regulations". As regulations against vessel-originated air pollutants (such as PM, CO2, NOx, and SOx) have been strengthened, the Ministry of Oceans and Fisheries(MOF) enacted rules that newly built public ships should adopt eco-friendly propulsion systems. However, particularly in diesel-electric hybrid propulsion systems,the demand for precise control schemes continues to grow as the fuel saving rate significantly varies depending on the control strategy applied. The conventional Power Take In-Power Take Off(PTI - PTO) mode control adopts a rule-based strategy, but this strategy is applied only in the low-load range and PTI mode; thus, an additional method is required to determine the optimal fuel consumption point. The proposed control method is designed to optimize fuel consumption by applying the equivalent consumption minimization strategy(ECMS) to the PTI - PTO mode by considering the characteristics of the specific fuel oil consumption(SFOC) of the engine in a diesel-electric hybrid propulsion system. To apply this method, a specific fishing vessel model operating on the Korean coast was selected to simulate the load operation environment of the ship. In this study, a 10.2% reduction was achieved in the MATLAB/SimDrive and SimElectric simulation by comparing the fuel consumption and CO2 emissions of the ship to which the conventional rule-based strategy was applied and that to which the ECMS was applied.