• Title/Summary/Keyword: 보안 모니터링

Search Result 462, Processing Time 0.037 seconds

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Petrochemical Plant Safety Management System based on Wireless Transmitter (무선 트랜스미터 기반의 석유화학 플랜트 안전관리 시스템)

  • Kang, Sung-Min;Park, Soo-Yeol;Yeo, Keum-Soo;Park, Jae-Woo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.6
    • /
    • pp.88-94
    • /
    • 2015
  • Large-scale petrochemical and power plants has increased demanting wireless technology for continuous monitoring. However, the current USN technologies, such as ZigBee and Bluetooth, are lackof reliability and security. Therefore, there is a strong need to apply a new wireless technology standard of the ISA. In this study, a petrochemicalplant safety management system based on the ISA wireless transmitter isdeveloped. ISA100.11a communication module and LTE communication module equippedwith an explosion-proof wireless transmitter are developed. A petrochemicalplant safety management system is built based on the IoT technologies. Thedeveloped system is verified through a wide range of testing and thus, on-siteapplicability is proved.

Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network (누리온 슈퍼컴퓨팅서비스 네트워크에서 트래픽 및 공격 빈도 분석)

  • Lee, Jae-Kook;Kim, Sung-Jun;Hong, Taeyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.113-120
    • /
    • 2020
  • KISTI(Korea Institute of Science and Technology Information) provides HPC(High Performance Computing) service to users of university, institute, government, affiliated organization, company and so on. The NURION, supercomputer that launched its official service on Jan. 1, 2019, is the fifth supercomputer established by the KISTI. The NURION has 25.7 petaflops computation performance. Understanding how supercomputing services are used and how researchers are using is critical to system operators and managers. It is central to monitor and analysis network traffic. In this paper, we briefly introduce the NURION system and supercomputing service network with security configuration. And we describe the monitoring system that checks the status of supercomputing services in real time. We analyze inbound/outbound traffics and abnormal (attack) IP addresses data that are collected in the NURION supercomputing service network for 11 months (from January to November 1919) using time series and correlation analysis method.

Study of Platform for Real-Time Medical Information Protection and Management (실시간 의료정보 보호 및 관리를 위한 플랫폼에 관한 연구)

  • Jeong, Chang Won;Lee, Sung Gwon;Joo, Su Chong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.245-250
    • /
    • 2014
  • In recent years, the developments of medical technology and emergency medical services have been changed to home from the hospital. In this regard, the researches for the prevention or early diagnosis have become actively. In particular, bio-signal monitoring is applied to a variety of u-healthcare application services. The proposed system in this paper is to provide a security technology to protect the medical information measured from the various sensors. Especially, bio-signal information is privacy-sensitive personal information that must be protected. We applied a two-dimensional code technology, QR code, for the protection and management. In the client side, it can analyze the QR code and confirm the results on devices. Finally, with this proposed platform, we show the results of application service to verify the creation and distribution of integrated image file between the bio-signal and medical image information.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Study on Device Monitoring using SNMP (SNMP를 이용한 장비 모니터링에 관한 연구)

  • Park, Mi Jeong;Lee, Dong Hoon;Lee, Jeong Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.561-564
    • /
    • 2014
  • The Rare Isotope Science Project (RISP) at the Institute for Basic Science (IBS) constructs the rare isotope accelerator facility in South Korea. Since the accelerator control system uses various Ethernet-based devices and equipment, it is essential to build a unified Network-based control system. Because of the complexity of the accelerator facility, it will be a challenge to install a device in a proper location where the device could react quickly and exactly with respect to network security. In this report, we will present early study on Simple Network Management Protocol (SNMP) that tests various Ethernet-based devices out on an ideal network configuration in order to find an optimal location for each Ethernet-based device. Moreover, we will discuss future plan to integrate SNMP into Experimental Physics and Industrial Control System (EPICS) that is distributed soft real-time control systems for scientific instruments such as a particle accelerators, telescopes and other large scientific experiments.

  • PDF

Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis (모바일 디바이스에서의 전자금융사고 예방을 위한 사용자입력패턴분석 기반 이상증후 탐지 방법)

  • Seo, Ho-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.47-60
    • /
    • 2011
  • With the increase in the use of mobile banking service, mobile banking has become an attractive target to attackers. Even though many security measures are applied to the current mobile banking service, some threats such as physical theft or penetration to a mobile device from remote side are still remained as unsolved. With aiming to fill this void, we propose a novel approach to prevent e-financial incidents by analyzing mobile device user's input patterns. This approach helps us to distinguish between original user's usage and attacker's usage through analyzing personal input patterns such as input time-interval, finger pressure level on the touch screen. Our proposed method shows high accuracy, and is effective to prevent the e-finance incidents proactively.

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

The remote video monitoring system based on Android (안드로이드 기반의 원격 영상 모니터링 시스템 개발)

  • Kang, Dae-Cheol;Sin, Dong-Seok;Choi, Sung-Wook;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.171-172
    • /
    • 2012
  • 최근 스마트폰의 보급률이 높아짐에 따라 생활 속에서 편리하게 쓸 수 있는 영상 서비스 어플리케이션들이 많이 개발되고 있다. 그에 따라 본 논문은 영상정보를 이용하면서 보안 및 기타 영상정보가 필요로 하는 환경에서 방문자에 대한 영상정보를 스마트폰(Smart-phone)으로 서비스하여 방문자를 인식하고 사용자 요구에 따라 필요한 메시지를 전송하거 원격지 디바이스를 원격에서 관리할 수 있는 원격 관리용 어플리케이션을 안드로이드(Android) 기반으로 개발하고자 한다. 이러한 어플리케이션의 구성은 블루투스(Bluetooth) 무선 통신모듈을 이용하거나 WiFi인 무선 TCP/IP 통신 기술을 이용하여 영상정보를 원격 서버에서 관리하도록 시스템을 구성하여 시스템의 활용 가능성을 제시하고자 한다.

  • PDF

Online Game Service Stabilization (온라인게임 서비스 안정화)

  • Choe, Yong-Jun;Park, Seong-Su;Kim, Jae-Won;Lee, Beom-Ryeol
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.4 s.106
    • /
    • pp.43-52
    • /
    • 2007
  • 온라인게임에서 가장 많은 문제가 발생하는 시기는 오픈베타 이후의 일이다. 적은 인원으로 테스트를 진행하는 클로즈베타에서 경험하지 못한 게임의 버그가 발생할 수 있고 게임사용자의 폭주를 사전에 예상하지 못해 게임서비스가 마비되는 경우도 발생한다. 또는 불법해킹에 의해 서비스가 중단하는 사태도 발생한다. 게임개발사에서는 오픈베타에 앞서 여러 번의 클로즈베타 테스트를 진행하는 동안 게임 내의 버그를 잡는 과정을 거친다. 시스템 및 네트워크 설계, 게임 및 웹서비스 보안, CDN, 로드밸런싱, 콘텐츠동기화, 모니터링, 가상유저테스트 등의 기술은 온라인게임 서비스 안정화를 위한 필수적인 요소이고 향후 국내와 해외 상용화 서비스의 근간이 된다. 본 고는 온라인게임 서비스 안정화를 위해 필요한 기술적 고려사항에 대해 다루고자 한다.