• Title/Summary/Keyword: 접근관제

Search Result 95, Processing Time 0.026 seconds

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

A Study on the Organization and Function of Security for the Royal Household in the Early Koryo: focused on 2Gun6Wi (고려전기(高麗前期)의 왕실호위 제도의 조직과 기능에 관한 연구: 2군육위(二軍六衛)를 중심으로)

  • Kim, Hyeong-Jung
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.139-176
    • /
    • 2013
  • It is believed that the Koryo dynasty era is the period which has very special meaning with regard to the history of the VIP guard system. The guard system in the early Koryo dynasty time focused on the official protection for kings and their families with absolute royal authority. On the contrary, the guard system in the late Koryo dynasty time, especially military regime period, conducted providing private protection for military rulers and increasing their power. The official guard troops named 2Gun6Wii became just perfunctory organizations at that time. That is the reason why this study develops the discussion only about the guard system of the early Koryo time. The official VIP guard organizations under the government structure of the early Koryo period were Naegoonbu, Byeongbu and Joongchoowon. This study particularly reviewed the Joongchoowon with thorough research. In the meantime, the guard organizations under the military chart of the early Koryo period were 2Gun6Wii, Gonghakgoon, Geonryonggun and so on. 2Gun consisted of ungyanggun and yonghogun. They were the royal bodyguards. This study especially tried to review the substance of the Gonghakgoon, Geonryonggun with different point of view from other theories. The Gumowwii, one of 6 Wii, conducted many official duties such as royal palace protection, capital city Gaesung defence, area patrols, criminal apprehension and disturbance prevention. It also accomplished crowd control and convoy mission at the streets to respond emergency cases while carrying out VIP protection roles for kings and Chinese diplomats. Many bibliographies verified that the Chunwoowii was the royal bodyguards which helped kings during state ceremonies and grand meetings held by kings. Consequentially, it is true that this study discovered, analyzed and evaluated various references and research materials related with the guard system. It is meaningful that this study newly reviewed the organizations and functions of the guard system as one structure.

  • PDF

The status, classification and data characteristics of Seonsaengan(先生案, The predecessor's lists) in Jangseogak(藏書閣, Joseon dynasty royal library) (장서각 소장 선생안(先生案)의 현황과 사료적 가치)

  • Yi, Nam-ok
    • (The)Study of the Eastern Classic
    • /
    • no.69
    • /
    • pp.9-44
    • /
    • 2017
  • Seonsaengan(先生案) is the predecessor's lists. The list includes the names of the predecessor, the date of the appointment, the date of return, the previous job, and the next job. Therefore, previous studies on the local recruitment and Jungin (中人) that can not be found in general personnel information of the Joseon dynasty were conducted. However, the status and classification of the list has not been achieved yet. So this study aims to clarify the status, classification and data characteristics of the list. 176 books, are the Joseon dynasty lists of predecessors, remain to this day. These lists are in Jangseogak(47 cases), Kyujanggak(80 cases), the National Library of Korea(24 cases) and other collections(25 cases). Jangseogak has lists of royal government officials, Kyujanggak has lists of central government officials, and the National Library of Korea and other collections have lists of local government officials. However, this paper focuses on accessible Jangseogak list of 47 cases. As I mentioned earlier, the Jangsaegak lists are generally related to the royal government officails. This classification includes 18 central government officials, 5 local government officials, and 24 royal government officails. If the list is classified as contents, it can be classified into six rituals and diplomatic officials, 12 royal government officials, 5 local government officials, 14 royal tombs officials, and 10 royal education officials. Through the information on the list, the following six characteristics can be summarized. First, it can be finded the basic personal information about the recorded person. Second, the period of office and reasons for leaving the office and office can be known. Third, changes in the office system can be confirmed. Fourth, it can be looked at one aspect of the personnel administration system of the Joseon Dynasty through the previous workplace and the next job. Fifth, it is possible to know days that are particularly important for each government. Sixth, the contents of work evaluation can be confirmed. This is the reality of the Joseon Dynasty, which is different from the contents recorded in the Code. Through this, it is possible to look at the personnel administration system of the Joseon Dynasty. However, in order to carry out a precise review, it is necessary to make a database for 176 lists. In addition, if data is analyzed in connection with existing genealogy data, it will be possible to establish a basis for understanding the personnel administration system of the Joseon Dynasty.