• Title/Summary/Keyword: 관제서버

Search Result 82, Processing Time 0.022 seconds

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

Wireless Control System Using Spherical Camera (구형체 카메라를 이용한 무선 관제 시스템)

  • Jang, Jae-min;Shin, Soo Young;Ji, Yong-ju;Chae, Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.461-466
    • /
    • 2016
  • In this paper, a capsule body shaped surveillance/monitoring device is developed. The device includes a camera and GPS module to transmit live video data and real time GPS coordinates respectively using the Intel Edison module. A control application is developed for the smart phones and tablets to wirelessly view the live video stream and location of the capsule device and also to switch between the multiple capsule devices installed at different locations. The coordination between the developed device and the smart phone / tablet is done using the wireless function of the Intel Edison module.

Design and Implementation of a Mobile Terminal Device for Video Transmission in Multiple Networks (다중 네트워크에서의 동영상 전송을 위한 이동 단말 장치의 설계 및 구현)

  • Kim, Jong-Heon;Lee, Dong-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.2
    • /
    • pp.38-44
    • /
    • 2013
  • In this paper, we designed and implemented a mobile video transmission device with 1080i resolution and 30fps frame rate using wireless multi-access technologies. The video acquisition delay time of 16us and jitter of 21ms for this equipment were obtained, respectively. The device is designed to access various communication networks. In order to evaluate the performance of its video transmission capability, a server and monitoring viewer are implemented. In the performance test using LTE network, 211ms delay time was obtained at 3Mbps transmission. Rendering of 1fps frame rate at the 265kbps transmission was confirmed for the transmission test using Inmarsat network.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

Design of Integrated Control System Architecture for Green IDC (그린 IDC를 위한 통합 관제 시스템 아키텍처 설계)

  • Kim, In-Woo;Kim, Min-Su;Lee, Young-Jun;Chae, Jin-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.342-345
    • /
    • 2011
  • 최근 전 세계는 지구온난화와 기후변화로 상징되는 '환경'위기와 고유가로 대표되는 '자원'위기를 동시에 맞이하고 있다. 정보화의 가속으로 IT 기기의 증가 및 인터넷의 통신량 증가는 IDC 운영에도 많은 영향을 주고 있다. 그 중에서도 대부분의 운영비용이 막대한 전력 소모로 인해 발생하고 있는 실정이다. 이에 따라 IDC 사업자들은 운영 경비의 비용을 줄이기 위해 IDC의 불필요한 인적, 물적 자원의 소모를 줄이며, 고성능 저비용, 저전력 장비 확보에 많은 관심을 기울이고 있다. 제안 시스템에서는 IDC의 서버와 스토리지 등의 IT 장비와 공조시스템과 전력공급시스템 등의 Non-IT 장비의 자동화 통합 관리를 통하여 인적, 물적 자원을 체계적으로 관리하여 이들의 활용성을 높이고, 나아가 IDC의 운영비용 및 효율을 고도화할 수 있도록 하였다.

Reliability Evaluation for the Avionic Embedded System (항공용 임베디드 시스템 하드웨어 신뢰성 평가)

  • Kim, Byeong-Young;Lee, Dong-Woo;Na, Jong-Wha
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2009
  • Air Traffic Management (ATM) system requires extremely high reliability for the safe and dependable operations in the airport. This paper reports a study on the reliability of the prototype ATM hardware system including the servers and local area networks. Reliability Block Diagram and Fault Tree Analysis on the prototype ATM hardware were performed.

  • PDF

Information interface for underground pipelines (지하매설관 하부 정보전달)

  • Chae, Su-Gwon;Seo, Jae-Soon;Kim, Joon-Seok
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2016.11a
    • /
    • pp.219-220
    • /
    • 2016
  • 도시 운영 시스템들은 모두 자기 고유의 솔루션을 제공하기 위해서 개발되고 있으며, 또한 이들 운영 시스템들에서 제공되는 서비스를 통합하여, 도시 운영의 효율화를 꽤하고 있는 추세이다. 지하매설배관의 실시간 통합 유지관리를 위하여 최상위의 관제 및 유지관리 서버 소프트웨어와 정보전달 체계를 연결하기 위해서는 호환성을 유지하기 위한 인터페이스가 필요하다. 이를 위하여 스마트시티를 끌어가는 국내의 다양한 플랫폼 운영 소프트웨어를 조사하고. 시장 지배력이 가장 큰 플랫폼을 선정하여 이들이 가지고 있는 정보전달 인터페이스에 맞도록 소프트웨어 모듈 개발을 위한 연구를 수행하였다.

  • PDF

Automatic Composition Database For Security Patch Auto-Distribution (보안패치 자동분배를 위한 패치 DB 자동구성 방안)

  • 민동옥;손태식;서정택;구원본;장정아;문종섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.367-369
    • /
    • 2004
  • 근래 정보보안의 필요성이 대두됨에 따라 개인 사용자의 보안 지식이 다방면으로 필요하게 되었다. 특정 그룹에 속한 개인 사용자들의 보안패치나 백신 등에 대한 지식이 비슷한 수준일 수 없으므로 보안패치나 백신 등을 관리해 주는 솔루션이 필요하게 되었다. 이는 통합관제 센터나 흑은 보안패치 자동분배 솔루션를 사용하여 해결할 수 있으나, 시스템 관리자의 지속적인 패치 확인과 업데이트가 필요한 일이다. 시스템 관리자가 벤더를 검색하여 패치를 가져오는 방법은 지극히 주관적이고, 실수로 가져오지 못하거나 혹은 벤더의 업데이트 시간과 맞지 않아 긴급패치를 누락시키는 경우가 종종 발생한다. 또한, 자동분배 솔루션을 사용하는 네트워크의 병합이나 패치분배의 추가에 이렇다 할 대안이 없다. 이 논문에서 제안하는 패치 자동업데이트와 자동구성에 대한 방안은 패치의 누락을 미연에 방지하고 네트워크의 병합 등 패치분배 서버가 늘어나면서 생기는 문제점을 해결해준다.

  • PDF

Analysis and Countermeasure of Malicious Code in Small Businesses (중소기업 환경에서 악성코드 유형 분석과 대응 방안)

  • Hong, Jun Suk;Kim, Young hee;Park, Won Hyung;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.55-62
    • /
    • 2015
  • Due to the development of various information systems and PC, usage of Internet has rapidly increaced which lead to malicious codes rapidly spreading throughout the Internet. By the increasing use of the Internet, the threat by malicious codes has become a serious problem. In particular, Small businesses which lack investments in security personnels makes it impossible to verify and measure the servers and PC infected with malicious codes. We have analized malware infection types by using malicious code detection technology of security monitoring service and proposed countermeasures in small businesses.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).