@article{ART002418291},
author={Yang Liu and 백현철 and suk won, Hong and PARK JAE HEUNG and KimSangBok},
title={User Authentication Service Model Using Euclidean Distance Baesd on Encryption},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2018},
volume={13},
number={6},
pages={695-703},
doi={10.34163/jkits.2018.13.6.006}
TY - JOUR
AU - Yang Liu
AU - 백현철
AU - suk won, Hong
AU - PARK JAE HEUNG
AU - KimSangBok
TI - User Authentication Service Model Using Euclidean Distance Baesd on Encryption
JO - Journal of Knowledge Information Technology and Systems
PY - 2018
VL - 13
IS - 6
PB - Korea Knowledge Information Technology Society
SP - 695
EP - 703
SN - 1975-7700
AB - Nowadays, network technology is changing rapidly in the environment of cloud computing and Internet of Things, but there are still many difficulties in providing dynamic correspondence and efficient services when illegal attacks occur. In particular, attackers with high-end attack techniques will try to use the IP spoofing attack. For IP spoofing attacks, it is based on the connection path of the client to detect and correspond. This is based on traceback, after the normal path information is generated, the client connection information is compared and analyzed. But the benchmark detection method in the process of connection intelligence analysis will make OTP (One Time Password) occur frequently, resulting in low service availability. In order to improve this problem, this paper takes traceback information , and uses the Euclidean law calculation method (Euclidean Distance) and the security model put forward by phases of encryption method. Based on this, abnormal path intelligence in the simple comparison process, the different path information of block first policy can complement. After analyzing the changing path information, also implement phases of encryption. Then, the process of decryption is used to certify whether service is needed.
KW - Big data;Cloud computing;Euclidean distance;Encryption;Traceback
DO - 10.34163/jkits.2018.13.6.006
ER -
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG and KimSangBok. (2018). User Authentication Service Model Using Euclidean Distance Baesd on Encryption. Journal of Knowledge Information Technology and Systems, 13(6), 695-703.
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG and KimSangBok. 2018, "User Authentication Service Model Using Euclidean Distance Baesd on Encryption", Journal of Knowledge Information Technology and Systems, vol.13, no.6 pp.695-703. Available from: doi:10.34163/jkits.2018.13.6.006
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG, KimSangBok "User Authentication Service Model Using Euclidean Distance Baesd on Encryption" Journal of Knowledge Information Technology and Systems 13.6 pp.695-703 (2018) : 695.
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG, KimSangBok. User Authentication Service Model Using Euclidean Distance Baesd on Encryption. 2018; 13(6), 695-703. Available from: doi:10.34163/jkits.2018.13.6.006
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG and KimSangBok. "User Authentication Service Model Using Euclidean Distance Baesd on Encryption" Journal of Knowledge Information Technology and Systems 13, no.6 (2018) : 695-703.doi: 10.34163/jkits.2018.13.6.006
Yang Liu; 백현철; suk won, Hong; PARK JAE HEUNG; KimSangBok. User Authentication Service Model Using Euclidean Distance Baesd on Encryption. Journal of Knowledge Information Technology and Systems, 13(6), 695-703. doi: 10.34163/jkits.2018.13.6.006
Yang Liu; 백현철; suk won, Hong; PARK JAE HEUNG; KimSangBok. User Authentication Service Model Using Euclidean Distance Baesd on Encryption. Journal of Knowledge Information Technology and Systems. 2018; 13(6) 695-703. doi: 10.34163/jkits.2018.13.6.006
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG, KimSangBok. User Authentication Service Model Using Euclidean Distance Baesd on Encryption. 2018; 13(6), 695-703. Available from: doi:10.34163/jkits.2018.13.6.006
Yang Liu, 백현철, suk won, Hong, PARK JAE HEUNG and KimSangBok. "User Authentication Service Model Using Euclidean Distance Baesd on Encryption" Journal of Knowledge Information Technology and Systems 13, no.6 (2018) : 695-703.doi: 10.34163/jkits.2018.13.6.006