Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.10 No.5 (33건)
No
1

A Novel Information Fusion Model for Assessment of Malware Threat

Chao Dai, Jianmin Pang, Xiaochuan Zhang, Guanghui Liang, Hong Bai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware “what to do” and “what’s the impact it posed on our information system”. In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute level information fusion and the behavior level information fusion. These three levels portray special characteristics of malware threat distributed in the assessment model. Combined with the static analysis technology and real-time monitor technology, we implemented a framework of malware threat assessment. The experiment demonstrates that our information fusion model for malware threat assessment is effective to quantitate the threat of malware in accuracy and differentiation degree. In the end, we discussed several issues that could improve the performance of the model.

2

Achieving Secure Deduplication by Using Private Cloud and Public Cloud

Guljar P. Shaikh, S. D. Chaudhary, Priyanka Paygude, Debnath Bhattacharyya

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.17-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

At the present time, cloud computing furnish large volume of area for storage of data as well as huge equivalent computing at affordable rate. Due to advantages of cloud computing it turn out to be widespread; extreme quantity of data can be stored on cloud. But, rise in size of data has raised numerous new obstacles. Deduplication is one of significant compression method of data for reducing carbon copy of replicating data that being used in cloud to reduce the volume of storage area and it utilizes less network bandwidth. Data Deduplication is the convergent encryption technique that has been projected to encrypt the data before it’s been sent out that preserve the confidentiality of responsive data. For better data security, it makes the initial effort that officially point out the dilemma of authorized data Deduplication. There are numerous new Deduplication structures that provides authorized duplicate check in hybrid cloud structural design that acquire negligible overhead over standard operation.

3

Improving Unconstrained Iris Recognition Performance via Domain Adaptation Metric Learning Method

Yan Fei, Zhou Changjiu, Tian Yantao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.27-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To improve unconstrained iris recognition system performance in different environments, a performance improvement method of unconstrained iris recognition based on domain adaptation metric learning is proposed. A kernel matrix is calculated as the solution of domain adaptation metric learning. The known Hamming distance computing by intra-class and inter-class is used as the optimization learning constraints in the process of iris recognition. An optimal Mahalanobis matrix is computed for certain cross-environment system, then distance between two iris samples is redefined. The experimental results indicate that the proposed method can increase the accuracy of the unconstrained iris recognition in different circumstances, improving the classification ability of iris recognition system.

4

On Privacy and Anonymity in Freenet System

Tianbo Lu, Zhimin Lin, Lingling Zhao, Yang Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.41-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As a typical representative of anonymous network applications, Freenet system has so many advantages in sharing, privacy, anonymity as well as uploading and downloading convenience that it adequately realizes expression freedom. So it’s widely used in different fields. For Freenet system, academia and system designers have been conducting research and improvement which mainly on following points: structure, topology, routing algorithm and the Darknet mechanism which proposed by new version. The purpose of these efforts is to increase the system network utilization, enhance the reliability of transmission and improve the safety and robustness of the system. This paper reviews and summarizes the research progress of Freenet system by collating and analyzing relevant articles. We also analyze and compare the main ideas, the algorithm application as well as pros and cons of different articles surrounding different topics. In addition, we also tease out the development and the evolution trends of Freenet system in time order, and combined with current network situation, we made reasonable proposals and prospects and draw scientific conclusions.

5

Use of Silence as an Altered Approach for Speaker Recognition

Rupali Pawar, R. M. Jalnekar, J. S.Chitode

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.57-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Speaker recognition is an important application of Speech Signal Processing and has been used in public safety, authenticating users for important financial transactions, access control systems and many more. The conventional approach in speaker identification and speaker verification has been to remove the silence from the recorded speech signal and further extract the significant features from the residual signal for recognition. This paper presents an alternative approach and puts forth the experimental results of obtaining silence as a parameter to check if the pattern of pauses/silence for train and test files recorded for individual speaker match. The paper emphasizes the approach in which a paragraph is recorded for 8 speakers and used as train files. The duration of silence/pauses of the speaker in a paragraph are obtained. This silence obtained is compared with the silence obtained from test file the matching of pattern of the silences decides the identity of the speaker.

6

An Analysis of Internet Censorship Circumvention Techniques

Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, WanJiang Han

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.63-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since Internet was born, it has deeply influenced almost every aspects of people’s life. However, at the mean time when people enjoy the convenience brought by the Internet, there is censorship existed every corner of the internet world. Censorship circumvention technique to protect people’s communication against censors. During the past decades, anti-censorship techniques have a broad and extensive development, however not all of the censorship circumvention techniques have effect in circumvent the censors and there is still not a very useful and convenient technique to ensure the anonymity of internet communication. In this paper, we tried to analyze the current situation of censorship and anti-censorship techniques and give a comprehensive view on the censorship circumvention techniques and systems.

7

Improving the Handoff Latency of the Wireless Mesh Networks Standard

Reham Abdellatif Abouhogail

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.73-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Improving the Quality of Service (QOS) for the next generation of mobile broadband wireless networks standards; IEEE802.16x becomes the main target for many new researches. This is due to the long time to complete the handover process from the old connection to the new connection in the proposed standard design. In this paper, an improvement to the IEEE 802.11- based wireless mesh networks in terms of authentication latency is proposed. The current paper, proposes a new, easy, fast, and secure handover design. In addition to, a new security metric is presented, which is the ability of the authentication protocols to determine the identity of the users who make bad behaviors with a complete preservation to the privacy of the rest users. We can say that it's a very a difficult problem, due to the trade-off between the privacy and the non_ repudiation property. A formal authentication verification method is presented, using BAN logic analysis.

8

An External Parameter Optimize Method for 3D Optical Measurement System

Heyao Ma, Wantao He, Xianglin Meng, Dan Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.87-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A simple and effective external parameter calibration and optimize method based on epipolar geometry for improving the accuracy and stabilization of 3D optical measurement system are present. First, the internal parameters of two cameras are calibrated using the planar calibration method. Then using the parameters as initial value calibrates the external parameter of the 3D optical measurement system in every view. Optimization result is computed through minimizing epipolar line error of the same pair of points in every view. Experimental results show that the measurement precision is high and stable in the measurement volume.

9

A XSS Attack Detection Method based on Skip List

Shan Chun, Cui Jing, Hu ChangZhen, Xue JingFeng, Wang Hao, Mhagama Raphael

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.95-106

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

10

Digital Image Watermarking Based On Joint (DCT-DWT) and Arnold Transform

Majdi Farag Mohammed El Bireki, M. F. L. Abdullah, li Abdrhman M. Ukasha, Ali A. Elrowayati

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.107-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The researcher has adopted a digital watermarking technique which operates in the frequency domain: a hybrid watermarking scheme based joint discrete wavelet transform – discrete cosine transform – (DWT-DCT). Its main objective is to test whether this technique can withstand attacks (its robustness) and invisibility (its imperceptibility), achieved by taking DCT of the DWT coefficients of the LL mid-frequency sub-bands from its band. To ensure security, the secret code (watermark) is scrambled using the Arnold transformation which is embedded in the original host image; only gray-scale digital images are used. The results of this research reveal that the secret code (watermark) is strong enough against threats (noise). Comparative results are measured using signal-to-noise ratio criterions, mean square error and normalized cross correlation. Simulated experimentation is done in Matlab.

11

Image Steganography in a Karhunen-Loeve Transform Optimization Model

Li-Yangbo, Guo-Zuhua

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.119-128

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In allusion to such problems as large perceptual distortion and high error rate caused by high image compression ratio in existing steganography technology in the information security field, an image Steganography based on Karhunen-Loeve transform optimization is proposed in this paper. Specifically, the iterative clustering algorithm is adopted for this method to solve the covariance matrix and the clustering mean value, and relevant values are adjusted for image segmentation; then, KLT algorithm is introduced to compress the image data and the least significant bit is adopted to replace the ciphertext data for data hiding. During information extraction, the reverse linear transformation operation and the original pixel matrix are adopted to obtain the effective hidden image information. The experiment result shows: compared with common algorithms, the proposed method has improved capacity and PSNR, and the image data extracted thereby has small distortion.

12

Network Information Security Situation Assessment Based on Bayesian Network

Wang Xing-zhu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.129-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The situation of information security is difficult to be precise, autonomous and controllable. In this situation, the situation of the system is based on Fuzzy Dynamic Bayesian network. The model of situation awareness and situation estimation is constructed. The simulation results are compared with that of static Bayesian network model. The experimental results show that this method can better reflect the dynamic changes of network space operations.

13

Evaluation of Flow and Average Entropy Based Detection Mecha-nism for DDoS Attacks using NS-2

Raghav Vadehra, Manjit Singh, Butta Singh, Nitika Chowdhary

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.139-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Distributed Denial of Service (DDoS) attacks has started posing a serious threat to all sorts of businesses, which have used the power of internet to their credit. DDoS attacks have put a big question mark on the capabilities and reliability of the World Wide Web. The use of supreme techniques to combat the DDoS attacks has not been substantial enough to fight the distributed nature of attacks. Hackers have been successful in blocking the services and flooding traffic to servers, in spite of a tight check on the network. Thus, in the view of personal data being present on the web and the threat to global economy worth million dollars, it becomes really important to devise some new techniques that are self-capable enough to capture, trace and nullify the dangers posed by such attacks. This term paper talks about such solutions to combat DDoS attacks. Here, the flow entropy in combination with average entropy technique is used to detect an attack. It highlights how the loop holes of one technique are covered by the other, resulting in a considerable improvisation in the methods of how we deal with these attacks.

14

A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.147-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content to others. With traitor tracing, it can detect illegal users who use multimedia content illegally. However, collusion attack can avoid some illegal users being detected. With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique should deter collusion attacks. In order to improve the performance of new digital fingerprinting technique in future, this paper presents a new collusion attack approach based on interpolation. The proposed interpolation collusion attack scheme comes from the idea of image fusion. The experimental results demonstrate that the proposed interpolation collusion attack method outperform average attack and maximum attack.

15

Effect of Anhydride Grafting Agent on Trap Levels of Low-Density Polyethylene

Lijuan He, Zhenhua Yuan, Xiong Yang, Huiqing Niu, Chao Zhu, Dawei Li, Lei Zhao, Chuntian Chen

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.157-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Trap distribution of the low-density polyethylene(LDPE) modified by anhydride grafting agent was studied and the effect of grafting agent on the trap levels was analyzed by the method of Photo-stimulated Discharge in this paper. Different concentrations and types of same concentration of LDPE modified by anhydride grafting agent were measured by using continuous UV scanning. The results showed that different concentrations and types of grafting agent had effect on trap levels distribution of LDPE. The trap depth would decrease with the anhydride grafting agent content increasing and increase with its damaged condition increasing when anhydride grafting agent was destroyed. Anhydride grafting agent are widely applied to the production and research of high pressure insulating polyethylene materials. The purpose of this paper is to elaborate the effect of anhydride grafting agent on the insulating properties of polyethylene material and explain the strongest binding capacity of anhydride grafting agent to space charge.

16

Recently, as utilization rate of the Internet gets higher, cybercrime rates are growing up. In order not to be damaged from such cybercrimes, the importance of an education for protection from them is increasingly critical. However, the existing information security educations have not been enough to deal effectively with rising cybercrimes. To tackle the problems of the existing educations, in this paper, we examine a way to prevent cybercrimes using learning contents related to a real life, help learners to improve awareness of cybercrimes and realize their seriousness through an indirect experience of them. We develop a program with learning contents based on a simulation for preventing cybercrimes. Furthermore, we provide a quiz game to enhance the understanding of the cybercrimes. After learning through the quiz game, the learners can check and extend their knowledge of preventing the cybercrimes. Specifically, each learner can identify vulnerable cybercrime types and get the proper feedbacks for preventing them through the analysis of learner’s own correct/wrong answers.

17

Research on Wormhole Attack Detection Algorithm in Space Information Networks

Yu Geng, Zhang jie, Zhang Yongfang, Ye ning, Ren Kaiya

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.181-192

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wormhole attack is a coordinated attack that launched by two or more malicious node. With a high quality private link malicious node, attracted traffic, attacked routing protocol, destroyed network topology, has a great threat to space information network. We propose a wormhole attack detection algorithm based on abnormal topology and time delay in space information network and the algorithm is mainly composed of two phases: finding abnormal topology and getting the malicious node. According to the number of nodes which are mutually non-one-hop neighbors in the normal network and the abnormal topology in backbone get the suspicious neighbors. To confirm the fake link, uses the round trip time to detect suspicious neighbors. Sends warning messages to isolate false neighbors or malicious nodes to ensure the security of the network. Using the network simulation software NS2 analyses the performance of the detection algorithm. The simulation results show that the proposed algorithm can detect wormhole also has high detection rate and a low false positive rate.

18

Intrusion Detection Method based on Improved BP Neural Network Research

Zhu YuanZhong

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.193-202

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the development of computer network technology, more closely the relationship between people and network.The current network security problem has also been gradually into the public's field of vision, actively carried out on the network intrusion detection becomes an important direction of the development of the network security technology.On the basis of the original BP neural network, this paper puts forward an improved algorithm, and applied to network intrusion detection. After the test, the method is better than traditional convergence, better performance.

19

Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm

Yong-Dal Shin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.203-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we proposed a new fast detection method of copy-move forgery image using two step search algorithm in the spatial domain. We proposed a new two step search algorithm for copy-moved forgery image detection. The performance of the proposed method is experimented on several forged images. Our two step search algorithm reduced 96.82% computational complexity more than conventional algorithms for copy-move forgery image detection. The block distortion measure (BDM) of the two step search algorithm is sufficient by 2 pixels checking points instead of 64 pixels checking points for exhaustive search in the not copy-moved forgery image regions. Most blocks of the images constitute not copy-moved forgery images. Therefore, we can reduce computational complexity more than conventional methods. We didn’t use any exhaustive search method and frequency domain (ex. DCT, Wavelet Transform) to reduce computational complexity in this paper.

20

Representation of Network Security Situation Elements Based on Cloud Model

Kou Guang, Yang Haopu, Wang Kun, Zhang Yuchen, Wang Shuo

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.215-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at efficiently aware the network security situation, we proposed a framework of Network Security Situation Awareness on the base of Cloud Model. With network security situation elements at the core, we modified the Cloud Model to a novel concept, situation cloud, which act as theoretical foundation in the transition between the qualitative and quantitative representation on situation elements. Finally, the experimental results showed that these two kind of representations can directly summarize the secur

21

An Improved Random Key Predistribution Scheme for Wireless Sensor Networks Using Deployment Knowledge

Lina Zhu, Zuochang Zhang, Jianhua Li, Renjie Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.225-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Key management is the basis of many security mechanisms and services in wireless sensor networks (WSN). Random key predistribution scheme is widely considered as the most practical for WSN. However, this scheme faces the challenge that it cannot achieve the ideal security connectivity and strong resilience against node capture simultaneously. To address this limitation, an improved random key predistribution scheme using deployment knowledge is proposed in this paper. Firstly, sensor nodes are divided into different groups according to their location expected. And the key pool is grouped into key pool subsets accordingly. To realize the communication between adjacent groups, the corresponding key pool subsets have a certain degree of overlapping. For all keys, there is no limitation on key reuse. Neighboring nodes sharing q common keys will establish secure link with high probability. Moreover, our scheme inherits the advantage of q-composite random key predistribution scheme that it can maintain security even if some nodes are captured. Theoretical analysis and simulation experiments show that the improved scheme performs well on network connectivity and resilience.

22

A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS

Seong-Muk Choi, Rae-Hyung Kim, Ga-Ye Kim, Hyeon-Kyung Lee, GwangYong Gim, Jong-Bae Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.235-242

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The system of SCADA(Supervisory Control and Data Acquisition Security) used in electricity, water, petroleum and gas, transportation as well as manufacturing, is to collect scattered data and to monitor assets related as a centralized suppression system. ICS system, including current SCADA, is not isolated from outside, being connected with IT solution, and can operate equipment through broadband network, instead of accessing physically. Accordingly, the security accident of suppressing system can occur in the fields of antagonistic nations, terrorists, foundational facility invaders, natural disasters and ill-will or accidental actions. The security control examined in this study provides a defense-in-depth strategy which is applicable to the effective cyber security strategy regarding ICS to protect the confidentiality of information, zero defect, availability through the classification of control, operational control and technological control.

23

A Fast Detection and Recognition Algorithm for Pedestrian at Night Based on Entropy Weight Fast Support Vector Machine

Liang Rui, Wei Honglei, Zhu Qingxin, Liao Shujiao, Deng Hongyao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.243-252

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In allusion to such problems as real-time requirement dissatisfaction and significant recognition difference caused by dimension difference existing in the imaging and recognition algorithm for pedestrian in dark scene, a fast head detection and recognition method for pedestrian at night based on fast support vector machine (FC-SVM) algorithm optimization and entropy weight is established in this paper according to relevant principle of statistics. Based on entropy weight, this method aims at improving the extraction process based on histogram gradient features in order to establish threebranch SVM for the deep recognition of pedestrian at night; meanwhile, FC-SVM algorithm is combined to optimize the recognition calculation overhead in order to ensure the real-time property of the recognition algorithm. Furthermore, the falsely detected pedestrians are evaluated on the basis of the head detection mode so as to improve pedestrian imaging matching accuracy. The simulation result shows that this method can not only effectively recognize FIR target of pedestrian at night, but also effectively adapt to such different application environments as urban and suburban areas on the basis of ensuring the real-time requirement for pedestrian recognition, thus presenting good practicability.

24

Intrusion Detection in Aviation Terminal Region Petri Net with Non-arc and Unchanged Library

Song Yu, He Xiaoli, Ralf Volker Binsack

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.253-260

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Due to the complex structure and the large number of the running aircrafts in the application of the intrusion detection in terminal regions, the defense conflict dangers and the influence on aviation safety exist in such terminal region. Therefore, Petri net framework with non-arc and unchanged library is constructed in this paper to propose the terminal intrusion detection scheme. Firstly, the aviation operation structure of the terminal region is analyzed and the constraint model of the terminal region is constructed as the terminal intrusion detection basis according to Petri net model framework; secondly, the aviation constraint model of the terminal region constructed thereby and the principle of non-arc and unchanged library are adopted to establish the terminal intrusion detection control strategy, and the control decision is made according to the transition activation for the aviation instructions; finally, the experimental analysis of the practical cases shows that the proposed terminal intrusion detection scheme can effectively handle the terminal intrusion detection problem and reduce the workload of the controllers.

25

Security Analysis of Vehicular Ad Hoc Networks (VANETs) : A Comprehensive Study

Nirbhay Kumar Chaubey

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.261-274

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Vehicular Ad-hoc Networks (VANETs) is a technology that has been recently emerged, and brings a lot of research interests. Security is one of the important issues in VANET, it is considered a critical point in the development of robust VANET applications. In this paper, various dimensions of VANETs including its emerging applications, security issues, challenges, security threats and the existing solutions proposed by the different researchers are studied. Also author reviewed various type of VANET simulator available and presented possible key research area of VANETs.

26

Simulation and Optimization Study on Layout Planning of Plant Factory Based on WITNESS

Li Ma, Meiqiong Ma, Chao Ma, Jingwen Deng, Xingluo Liu, Lijun Zhao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.275-282

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The emergence of plant factory has solved great restriction problem of natural environment in the traditional agriculture. Therefore, it has been the research concentrate on the facility agriculture in recent years. However, the reasonability of factory's production process and layout determines quality of the product, production efficiency and economic benefits. This paper took Wuchang Jingtian Plant Factory as an example, analyzed the production process and layout and provided a corresponding improvement scheme which was verified by the WITNESS simulation software. An optimal solution was determined from the evaluation index of production efficiency, busy rate, production cycle etc.. Besides, the simulation analysis of production cost before and after the improvement verified the improved plant factory operation is effective and feasible. This improvement scheme not only improved efficiency of production system of the plant factory, but also reduced the operating cost.

27

The Research of AMI Intrusion Detection Method using ELM in Smart Grid

Yuancheng Li, Chaochao Zhang, Liqun Yang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.283-296

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

28

Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis

Mohammad Rasmi, Khaled E. Al-Qawasmi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.297-308

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The increasing amount of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. Reconstructing useful evidence of a cybercrime is difficult due to the vagueness of the analysis phase processes. The analysis phase is challenging because it provides detailed information on the intention and strategy of the attack. This paper aims to show the importance of reconstructing attack intentions in order to improve the analysis phase in network forensics. Intentions are identified through an algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining mathematical evidence theory and a probabilistic technique. In this paper, the attack intention model will be improved to present the motivation behind cyber crimes. The results of the comparison of the attack intention analysis methods prove that the AIA algorithm is more accurate.

29

In order to give full play to ability of existing devices, the combined positioning algorithm of volume image sequence is proposed, which is applied in large scale topographical map. Firstly, the observation equations of observable image sequence are analyzed, and the five different coordinates relating with space 3D coordinate of object can be calculated. Secondly, the combining positioning algorithm based the characteristics of hyperbolic curve and Kalman filter is put forward and the corresponding mathematical model is constructed. Finally, the dynamic measured data of a highway is used as basis, the corresponding simulation analysis is carried out, and results show that the new combined positioning algorithm can improve the precision of mobile measurement system effectively.

30

In all kinds of Internet security incidents, the most serious is malicious code. The increasingly serious problem caused by malicious code, not only make the enterprises and users suffered huge economic losses, but also makes network security facing serious threat. In this paper, based on the analysis of malicious code detection technology and detection system, the author designs and implements an unknown malicious code detection system based on network behavior analysis. Test results show that the detection system can distinguish three kinds of ARP attack; it can produce normal alarm information and achieve the desired results. At the same time, the network behavior analysis method needs to be further improved in order to achieve better analysis results, and provide more reliable results for the detection system.

 
1 2
페이지 저장