본문 바로가기
  • Home

User Authentication Service Model Using Euclidean Distance Baesd on Encryption

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2018, 13(6), pp.695-703
  • DOI : 10.34163/jkits.2018.13.6.006
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : December 31, 2018

Yang Liu 1 백현철 2 suk won, Hong 3 PARK JAE HEUNG 1 KimSangBok 1

1경상대학교
2경남도립 남해대학
3경남도립거창대학

Accredited

ABSTRACT

Nowadays, network technology is changing rapidly in the environment of cloud computing and Internet of Things, but there are still many difficulties in providing dynamic correspondence and efficient services when illegal attacks occur. In particular, attackers with high-end attack techniques will try to use the IP spoofing attack. For IP spoofing attacks, it is based on the connection path of the client to detect and correspond. This is based on traceback, after the normal path information is generated, the client connection information is compared and analyzed. But the benchmark detection method in the process of connection intelligence analysis will make OTP (One Time Password) occur frequently, resulting in low service availability. In order to improve this problem, this paper takes traceback information , and uses the Euclidean law calculation method (Euclidean Distance) and the security model put forward by phases of encryption method. Based on this, abnormal path intelligence in the simple comparison process, the different path information of block first policy can complement. After analyzing the changing path information, also implement phases of encryption. Then, the process of decryption is used to certify whether service is needed.

Citation status

* References for papers published after 2023 are currently being built.