Catálogo de publicaciones - libros
Knowledge-Based Intelligent Information and Engineering Systems: 10th International Conference, KES 2006, Bournemouth, UK, October 9-11 2006, Proceedings, Part II
Bogdan Gabrys ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 10º International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) . Bournemouth, UK . October 9, 2006 - October 11, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Information Storage and Retrieval; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-46537-9
ISBN electrónico
978-3-540-46539-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11893004_91
Development of an Attack Packet Generator Applying an NP to the Intelligent APS
Wankyung Kim; Wooyoung Soh
Security systems need be tested on the network, when they are developed, for their security test and performance evaluation. Even though the security tests have to be done on the real network but, it is usually tested in a virtual test environment. APS (Attack Packet Simulator) is one of tools for performance test of security system on the virtual environment. In this paper, the development of an attack packet generator extracts the attack information from Snort rule and creates attack information in the Database using the extracted information applying intelligent APS. Also, the proposed generator generates high speed network attack packets to closely assimilate the real network for security system tests using an NP (Network Processor).
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 709-717
doi: 10.1007/11893004_92
Class Based Intelligent Community System for Ubiquitous Education and Medical Information System
Seoksoo Kim
Various kinds of community method is being researched to design effective systems within the ubiquitous environment. The research aimed to provide smooth mutual interlock among systems by grouping classified class based intelligent systems and focused on easy scalability and modification. The basic model of the research was; each class contains its own applications and these services mutually interlock in complex platforms. The community considered in this research is a basis for providing combined management of medical equipments and applications within environment where compatibility is causing problems during migration, and is suitable for designing medical information system within the intelligent ubiquitous environment.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 718-725
doi: 10.1007/11893004_93
Intelligent Anonymous Secure E-Voting Scheme
Hee-Un Park; Dong-Myung Shin
Various selection processes are present in the real world. Among them, some processes are open to everyone and others allow only members to validate them. These choice and selection types have been developed using cryptography protocol model. But, further study of definite anonymous secure selection protocols based on a cryptography is needed. In this paper, we propose the ’Intelligent Magic Sticker’ scheme which is anonymous secure selection to get the anonymity of an originator, and which blinds the selection result from other entities on the open network. Because this approach protects a selection result of an originator using one-way anonymous authentication service, although the selection information is opened, the Magic Sticker scheme can be used in electronic voting, fair E-money and electronic bidding etc.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 726-736
doi: 10.1007/11893004_94
Actively Modifying Control Flow of Program for Efficient Anormaly Detection
Kohei Tatara; Toshihiro Tabata; Kouichi Sakurai
In order to prevent the malicious use of the computers exploiting buffer overflow vulnerabilities, a corrective action by not only calling a programmer’s attention but expansion of compiler or operating system is likely to be important. On the other hand, the introduction and employment of intrusion detection systems must be easy for people with the restricted knowledge of computers. In this paper, we propose an anomaly detection method by modifying actively some control flows of programs. Our method can efficiently detect anomaly program behavior and give no false positives.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 737-744
doi: 10.1007/11893004_95
Intelligent Method for Building Security Countermeasures
Tai-hoon Kim; Sun-myoung Hwang
It is critical to note that a weakness (or security hole) in any component of the IT systems may comprise whole systems. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods for reducing the threat to the system by applying security engineering, and for building security countermeasure.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 745-750
doi: 10.1007/11893004_96
Intelligent Frameworks for Encoding XML Elements Using Mining Algorithm
Haeng-Kon Kim
Mining of association rules is to find associations among data items that appear together in some transactions or business activities. As of today, algorithms for association rule mining, as well as for other data mining tasks, are mostly applied to relational databases. As XML being adopted as the universal format for data storage and exchange, mining associations from XML data becomes an area of attention for researchers and developers. The challenge is that the semi-structured data format in XML is not directly suitable for traditional data mining algorithms and tools. In this paper we present an intelligent encoding method to encode XML tree-nodes. This method is used to store the XML data in 2-dimensional tables that can be easily accessed via indexing using knowledge. The hierarchical relationship in the original XML tree structure is embedded in the encoding. We applied this method in some applications, such as mining of association rules.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 751-759
doi: 10.1007/11893004_97
Graphical Knowledge Template of CBD Meta-model
Haeng-Kon Kim
There are several component reference models for component development. However, there is few integrated and generic reference model among reference models. That results in the problem of interoperability among component designs. In this paper, we propose an integrated component metamodel to support consistency and interoperability between component designs. Also we validate a proposed meta-model through graph theory. We expect that new meta-model will be added and extended because proposed meta-model is represented with UML’s class diagram.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 760-768
doi: 10.1007/11893004_98
Two-Phase Identification Algorithm Based on Fuzzy Set and Voting for Intelligent Multi-sensor Data Fusion
Sukhoon Kang
Multi-sensor data fusion techniques combine data from multiple sensors in order to get more accurate and efficient meaningful information through several intelligent process levels that may not be possible from a single sensor alone. One of the most important parts in the intelligent data fusion system is the identification fusion, and it can be categorized into physical models, parametric classification and cognitive-based models. In this paper, we present a novel identification fusion method by integrating two fusion approaches such as the parametric classification techniques and the cognitive-based models for achieving high intelligent decision support. We also have confirmed that the reliability and performance of two-phase identification algorithm never fall behind other fusion methods. We thus argue that our heuristics are required for effective decision making in real time for intelligent military situation assessment.
- Hybrid Information Technology Using Computational Intelligence | Pp. 769-776
doi: 10.1007/11893004_99
H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment
Jong Hyuk Park; Sangjin Lee; Byoung-Soo Koh; Jae-Hyuk Jang
In this paper, we propose a H-PMAC ( Home – Privilege Management Access Control) model which is suitable to access control of ubiquitous intelligent environment. The model considers the temporary limit conditions as access control of home device or user location information considering the characteristics of members who could limit the use of resource. In addition, the model provides authentication policy which authenticates not only devices but also domains and access control policy which considers inheritance of role. Finally, the model can be applied various and scalable access control policies which are suitable to the characteristics of intelligent digital environment as considering the user location information as a temporary limit condition.
- Hybrid Information Technology Using Computational Intelligence | Pp. 777-784
doi: 10.1007/11893004_100
A One-Time Password Authentication Scheme for Secure Remote Access in Intelligent Home Networks
Ilsun You
One of the important services that intelligent home networks provide is to remotely control home appliances in home network. However, the remote control service causes intelligent home networks to have various security threats. Thus, for the service, intelligent home networks should provide strong security services, especially user authentication. In this paper, we provide a public key based one-time password authentication scheme for secure remote access in intelligent home networks. To provide 2-factor strong authentication conveniently and cost effectively, we adopt and enhance YEH-SHEN-HWANG’s authentication scheme. Since our scheme uses a server-side public key to addresses the vulnerabilities of YEH-SHEN-HWANG’s scheme, it can securely perform user authentication, server authentication and session key distribution without any pre-shared secret, while defending against server compromise.
- Hybrid Information Technology Using Computational Intelligence | Pp. 785-792