A Study on Machine Learning Based Light Weight Authentication Vector

Do-Hyeon Choi (1), Jung-Oh Park (2)
(1)
(2)
Fulltext View | Download
How to cite (IJASEIT) :
Choi, Do-Hyeon, and Jung-Oh Park. “A Study on Machine Learning Based Light Weight Authentication Vector”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 4, Aug. 2018, pp. 1327-32, doi:10.18517/ijaseit.8.4.5738.
Artificial Intelligence area has been rapidly advanced around the global companies such as Google, Amazon, IBM and so on. In addition, it is anticipated to facilitate the innovation in a variety of industries in the future. AI provides us with convenience in our lives, on the other hand, the valuable information on the subjects that utilize this has the potential to be exposed at anytime and anywhere. In the next advancement of AI area, the technical developments of the new security are required other than the existing methods. Generation and validation methods of light-weight authentication vector are suggested in this study to be used in many areas as an expanded security function. Upon the results of the capacity analysis, it was verified that efficient and safe security function could be performed using the existing machine learning algorithm. Authentication vector is designed to insert the encrypted data as variable according to the change of time. The security function was performed by comparing coordinate distance values within the authentication vector, and the internal structure was verified to optimize the performance cost required for data reverse search.

IDC(International Data Corporation), Worldwide Semiannual Cognitive/Artificial Intelligence Systems Spending Guide, 2016.

Danial Hooshyar, Moslem Yousefi, and Heuiseok Lim, “Data-driven Approaches to Game Player Modeling: A Systematic Literature Review”, ACM Computing Surveys 50(6), 2017, pp. 1-19.

Yeongwook Yang, Wonhee Yu, and Heuiseok Lim, “Predicting Second Language Proficiency Level Using Linguistic Cognitive Task and Machine Learning Techniques”, Wireless Personal Communications: An International Journal, 86(1), 2016, pp. 271-285.

OWL Cyber Security, OWL Cybersecurity Launches Darknet Index Reranking the Fortune 500 by Darknet Footprint and Security Threat Levels, 2017.

Dakota Rudesill, James Caverlee, Daniel Sui, The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box, Science+Technology Innovation Program, 2015.

Peter Harrington, Machine Learning in Action, black & white, 2012.

Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Thory to Algorithms”, Cambridge University Press, 2014.

Leonardo Araujo dos Santos, Artificial Intelligence, GitBook, 2017.

BENGIO, Yoshua, et al, Learning deep architectures for AI, Foundations and trends® in Machine Learning, 2(1), 2009, pp. 1-127.

VMWARE, Virtualization Overview, Vmware White Paper, 2006.

Fayyad-Kazan, Hasan, Luc Perneel, and Martin Timmerman, Benchmarking the performance of Microsoft Hyper-V server, VMware ESXi and Xen hypervisors, Journal of Emerging Trends in Computing and Information Sciences, 4(12), 2013, pp. 922-933.

Graziano, Charles David. A performance analysis of Xen and KVM hypervisors for hosting the Xen Worlds Project, 2011.

Zhang, Minjie, and Raj Jain, Virtualization security in data centers and clouds, http://www.cse.wustl.edu/~jain/index.html, 2011.

Sabahi, Farzad, Secure virtualization for cloud environment using hypervisor-based technology, International Journal of Machine Learning and Computing, 2(1), 2012, pp. 39-45.

Bhunia, Swarup, et al, Hardware Trojan attacks: threat analysis and countermeasures, Proceedings of the IEEE, 102(8), 2014, pp. 1229-1247.

Nguyen, Anh M., et al, Mavmm: Lightweight and purpose built vmm for malware analysis, Computer Security Applications Conference, ACSAC'09, Annual. IEEE, 2009.

Garfinkel, Tal, and Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection, Ndss. 3, 2003, pp. 191-206.

Hwang, T., Shin, Y., Son, K., & Park, H, Design of a hypervisor-based rootkit detection method for virtualized systems in cloud computing environments, In Proceedings of the 2013 AASRI Winter International Conference on Engineering and Technology, 2013, pp. 27-32.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).