2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
Study on Intrusion Detection Policy for Wireless Sensor Networks
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.1-6
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent years, wireless sensor networks applications are increasing very fast such as battle field, disaster recovery, environmental monitoring and healthcare etc. To secure these networks, a secure and efficient system is required to avoid such networks from attacks. In this paper, an intrusion detection policy is proposed for wireless sensor networks. It monitors the communication between neighboring nodes and finds those nodes that are not working normally. Some general rules are defined to detect such nodes called compromised nodes. Simulation results are provided to analyze the performance of the proposed policy which validate that our policy performs better in terms of higher intrusion detection rate and receives lower false positive rate.
Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.7-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An endless number of methods or ways exists to access illegally a web server or a website. The task of defending a system (e.g. network, server, website, etc.) is complex and challenging. SNORT is one of the popular open source tools that can be used to detect and possibly prevent illegal access and attacks for networks and websites. However, this largely depends on the way SNORT rules are designed and implemented. In this paper, we investigated in details several examples of SNORT rules and how they can be tuned to improve websites protection. We demonstrated practical methods to design and implement those methods in such ways that can show to security personnel how effectively can SNORT rules be used. Continuous experiments are conducted to evaluate and optimized the proposed rules. Results showed their ability to prevent tested network attacks. Each network should try to find the best set of rules that can detect and prevent most network attacks while at the same time cause minimal impact on network performance.
Face Tampering Detection from Single Face Image using Gradient Method
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.17-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An effective novel approach of detection and classification of real face image from tampered face image based on second order gradient is proposed in this paper. The intended purpose of proposed approach is to endorse the biometric authentication, by joining the vitality awareness with Facial Recognition Technology (FRT). The proposed method requires only one face image without requirement of additional equipment and easier to implement into existing face recognition technique. For this purpose, real (from own database and some publically available standard database) and tampered (own prepared databases of dummy, color imposed and masked faces) face image database are used here for verification and validation of our assertion. The technique is novel technique and obtained results are initial results which are obtained after applying gradient method and demonstrate that the methodology is very well suited for the discrimination of image of tampered face from the image of real face with accuracy ranges 82.7% 91.7%. This reliable way to detect the mala-fide attack is needed to robustness of the system and it will be able to solve very big real problems of the society when induced in automatic authentication system.
Secure Model for Educational Resources
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.31-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Identity federation is a technology which enables the identity information to be trustily transferred across autonomous security domains. Shibboleth Federation is considered to trust logging process between different web educational resources, Fully Global log-out is not addressed by Shibboleth. In this Paper, we address Fully Global Log-out with a cached version of content as an off-line content, and enforce user to re-login for the new request after global logout. The paper modifies and utilizes the Shibboleth IdP source code to achieve securing model for web educational resources.
Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.51-58
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Everyday there are millions of domains registered and some of them are related to malicious activities. Recently, domain names have been used to operate malicious networks such as botnet and other types of malicious software (malware). Studies have revealed that it was challenging to keep track of malicious domains by Web content analysis or human observation because of the large number of domains. Legitimate domain names usually consist of English words or other meaningful sequences and can be easy to understand by humans, while malicious domains are generated randomly and do not include meaningful words or are not otherwise readable. Recently, a classification method has been proposed to classify malicious domain names. They used many features from DNS queries, including some textual features. However, it seems difficult to collect and maintain those data. Our contribution is that, by using only domain names we could achieve better classification results, thus showing that domain names themselves contain enough information for classification.
A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.59-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting can be adopted in the real world with higher feasibility. Recently, Chang and Lee presented an electronic voting (e-voting) scheme based on the blind signature and the Diffie-Hellman key exchange methods for ensuring voter anonymity and performance efficiency. They claimed that numerous essential requirements of general electronic voting can be ensured in their e-voting scheme. Unfortunately, we found that Chang-Lee’s e-voting scheme suffers from susceptibility to security attacks and some critical security requirements of their e-voting scheme may be compromised. To prevent security weaknesses of Chang-Lee’s e-voting scheme, in this paper, an improved version on their e-voting scheme is proposed that not only keeps the merits of Chang-Lee’s e-voting scheme but also enhances the security of their e-voting scheme.
Algorithms for Automatic Analysis of SELinux Security Policy
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.71-84
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.85-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password-based mutual authentication scheme to avoid the security weaknesses of Wu-Chieu’s scheme. In this paper, we demonstrate that Chang-Lee’s scheme is vulnerable to user impersonation attack, server masquerading attack, password guessing attack, and insider attack. Also, we propose an improved scheme to overcome the security weaknesses of Chang-Lee’s scheme, even if secret information stored in the smart card is revealed. As a result of security analysis, we prove that the proposed scheme is secure for the various attacks and provides session key agreement.
Selective Timestamp-Nonce Based Authentication Scheme
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.95-104
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we improve an efficient and complete remote user authentication scheme and propose an adaptive timestamp-nonce based authentication scheme using portable storage devices. Compared with other smart card-based, timestamp-based and nonce-based schemes, our scheme achieves more functionality. The new importance merits are: An adaptive timestamp-nonce structure is proposed; portable device stores authentication data not only smart card; all transactions through non-secure channel, especially in the registration phase, and batch of portable storage devices is issued. Besides, the basic merits include a dictionary of verification tables is not required to authenticate users, users can choose their password freely, mutual authentication is provided between a user and the re- mote system, the communication cost and the computational cost are very low, a user can update their password after the registration phase, a session key agreed by a user and the remote system is generated in every session and the serious time synchronization problem are solved.
Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.105-118
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A biometric system provides automatic identification of an individual based on unique features or characteristics possessed by that person. Iris recognition is regarded as one of the most reliable and accurate biometric systems available. This paper, proposes an efficient iris recognition system that employs circular Hough transform technique to localize the iris region in the eye image and cumulative sum based gray change analysis method to extract features from the normalized iris template and also fuzzy ARTMAP neural network to classify the iris codes. The results of simulations on a set of 756 eye images illustrate that an accurate and noise resistant personal identification system has been successfully designed. The proposed system achieved 0 false acceptance rate using 1800-bit binary iris codes and recognized all authorized users with 100% accuracy.
Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.119-128
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this study, we proposed design of internal traffic checkpoint in security checkpoint model for preventing security threats. Our architected security checkpoint model is a system that performs firstly check process on all incoming traffic from outside network. And it identifies almost threats and prevents them for protecting a cloud computing resources. The security checkpoint model consists of three components such as incoming traffic checkpoint, internal traffic checkpoint, and host-based threat checkpoint. The proposed model checks the safety of incoming traffic and binary file, and tracks traffic including threat factors. And it also judges threat traffics on system and storage. In this paper, we focused on structure, inspection procedures and functions of internal traffic checkpoint. Internal traffic checkpoint is important because it blocks threat traffic into internal network and ensures stable and reliable traffics.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.129-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Because a sensor node has limited resources, such as battery capacity, data aggregation techniques have been proposed for wireless sensor networks (WSNs). On the other hand, the provision of efficient data aggregation for preserving data privacy is challenging issue in WSNs. Existing data aggregation methods for preserving data privacy are CPDA, SMART, Twin-Key based method, and GP2S. However, they have a main limitation that communication cost for network construction is considerably high. To resolve the problem, we propose a privacy preserving data aggregation scheme based on Hilbert curve for WSNs. For data aggregation, we utilize a tree-based network structure which minimizes communication among sibling sensor nodes for network construction. Moreover, we adapt a Hilbert curve technique to preserve data privacy. Because the sending data is encrypted by using a unique Hilbert value, it is very difficult to trace a real value even though attackers overhear the sending data. Through our performance analysis, we show that our data aggregation scheme outperforms the existing methods in terms of energy efficiency and privacy preservation
Secure Video Transmission on Smart Phones for Mobile Intelligent Network
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.143-154
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Video data delivery comes up problems of the content ownership and the privacy, and thus protecting the video data becomes important in mobile network. With the standardized protocol defined by AES-CCM, the need is to implement communication infrastructure for a next-generation mobile computing and intelligent system, i.e., Smartphone, evaluating security parameters (e.g., CP (Control Parameter), UP (Unit Parameters) and standardization it’s a challenging task. The details provided in this paper are used to design a CP based secure wireless video data transmission, on basis of AES-CCM for privacy issues, considering the security level with MAC overhead.
Industrial Espionage and Police Investigation
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.155-162
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Industrial espionage has been worsening. Only the tip of iceberg has been identified and moreover a small number of the cases have been prosecuted. To control industrial espionage requires new and stronger countermeasures. Among law enforcement agencies, the police are primarily responsible for preventing and controlling industrial espionage in terms of size and covering area. However, the police have many problems to be solved. The police have few experts on industrial espionage. The lack of budget and insufficient equipment contribute to hinder effective investigation. The lack of coordination among the investigation agencies and the absence of international cooperation system are also regarded as the problems to be solved. For the effective investigation for the police, therefore, it is necessary to train experts on industrial espionage. The special recruitment of outside specialists could contribute to improve the level of police investigation. Securing budget and cutting edge equipment are indispensable for effective investigation. Finally, the police should design a strategy to prove guilty and to prevent the concealment of the illegal gains from industrial espionage.
A Study on Performance Evaluation for Security Test Laboratory
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.163-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Security products play a key role in ensuring confidentiality, integrity and availability of industry-related products. However, all the companies do not have enough time, expenses and space, so that it is difficult for them to purchase and use expensive facilities and equipment for quality verification or test certification on performance and functionality of security products developed. Accordingly, every country has been carrying out policies to build and promote a joint utilization system of advanced quality verification facilities and equipment for security products with public institutions as the center. In addition, public institutions have designed and conducted relevant projects with the goal of improving safety and reliability of security products developed, reducing the cost of production and so on. To enhance the value of these projects more and more, therefore, there is a need to objectively measure and analyze direct/indirect performance of projects carried out at an appropriate time. For projects carried out with public institutions as the center, however, it is difficult to analyze performance of the projects due to public purposes. Therefore, this paper studied performance analysis on the security test support project. In detail, the business flow of security product development activities was analyzed to measure performance of the facility and equipment project for quality verification of security products. In addition, multidimensional performance analysis was carried out empirically by applying it to a theoretical measurement model. It is expected that this performance analysis study could be utilized as a basic methodology for performance analysis of other public projects.
Security Requirements for the Medical Information Used by U-Healthcare Medical Equipment
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.169-180
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Home healthcare based on ubiquitous technology (u-technology) is emerging as a solution to increasing chronic disease patients with the advent of aging of society. While u-technology has the advantage that improves accessibility to medical services, it also increases the probability of the infringement of privacy of personal medical information, the leakage of which can do greater damage than any other information. At the juncture that social requirement for privacy protection is getting important, the development of standard and specification to evaluate the minimum security level of u-health medical devices is inevitable as a prerequisite for the vitalization of u-health. This study aimed at the development of security test methodology for u-health medical devices and proposed the standard and specification to secure medical information security. For the purpose, first, we defined the scope of u-health medical devices and categorized its physical and operational types. Second, security core technologies were selected that can be applied to u-health medical device in three aspects such as administrative safeguard dealing with operator, policy, document, system and user education, physical safeguard dealing with control of entrance and exit, screen or shared instrument, and technical safeguard dealing with computer system-related technological elements. Lastly, each security core technology was assigned to each physical and operational types of u-health medical devices and relative significance of which was determined. The guideline containing the developed security core technology and test methodology for u-health medical device would be utilized for the enhancement of security level in the design of u-health medical devices and setting the authentication standard for authorization process for security in Korean Food and Drug Administration.
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.181-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.
Next Generation Electronic Record Management System based on Digital Forensics
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.189-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Due to technological advancement, it is very easy to generate electronic records within short period of time and with little effort. However, the challenge is to preserve electronic records for long period of time without losing their integrity and authenticity. This is critical problem because most of our day to day activities are dependent on the information we get from Electronic Record Management System (ERMS). The trustworthiness of electronic record is dependent on ERMS. Therefore, ERMS has vital role in keeping electronic record for long term without losing its trustworthiness. In this paper, we proposed novel approach for next generation ERMS that alleviates these challenges.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.7 No.1 2013.01 pp.195-202
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Financial studies assume linear relationship between discretional expenses and sales amount. Also previous researches insist that industry having shorter product cycle has strong relationship between them. We investigate linear relationship between them based on financial reports during 2000-2011 of appearing companies in top 100 firms based on advertising amount. We choose food product manufacturing and electronic component manufacturing industry representing industry with short product cycle and IT industry. The result shows selling & administration expenses generally have a linear relationship with sales amount, while advertising and R&D expenses doesn’t. For advertising expenditure, we cannot find any evidence of its linear relationship with sales amount for both selected industries. However, R&D expense has linear relationship with sales amount in Food product industry. We guess it caused by food product’s short product cycle.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.