• Title/Summary/Keyword: 정보스캐닝

Search Result 291, Processing Time 0.036 seconds

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.

A Study on the Development and Application of Efficient Evaluation Criteria for Performance Testing of Commercial Open Source Vulnerability Scanning Tools (상용 오픈소스 취약점 스캐닝 도구의 성능 시험을 위한 효율적 평가 기준 개발 및 적용)

  • Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.709-722
    • /
    • 2022
  • The recent "Log4j Security Vulnerability Incident" has occurred, and the information system that uses the open source "Log4J" has been exposed to vulnerabilities. The incident brought great vulnerabilities in the information systems of South Korea's major government agencies or companies and global information systems, causing problems with open source vulnerabilities. Despite the advantages of many advantages, the current development paradigm, which is developed using open source, can easily spread software security vulnerabilities, ensuring open source safety and reliability. You need to check the open source. However, open source vulnerability scan tools have various languages and functions. Therefore, the existing software evaluation criteria are ambiguous and it is difficult to evaluate advantages and weaknesses, so this paper has developed a new evaluation criteria for the vulnerability analysis tools of open source

Automatic Reporting System through ID Number Recognition at ID Card Image (주민등록증 이미지의 숫자 인식을 통한 보고서 자동 기입 시스템)

  • Lea, Jong-Ho
    • Annual Conference on Human and Language Technology
    • /
    • 2002.10e
    • /
    • pp.57-61
    • /
    • 2002
  • 대부분의 공문서들이 주민등록증에 기입된 정보들을 반복적으로 기입하도록 요구하는 경우가 많다. 자동으로 주민 정보들을 기입하기 위해서 기계적으로 해독 가능한 정보로는 현재 주민등록증의 이미지만이 가능하다. 본 연구에서는 주민등록증을 스캐닝해서 얻은 이미지에서 주민번호를 추출하여, 개인신용정보의 조회나 반복적인 서류 작성에 개인정보들이 자동으로 기입되는 시스템을 개발하였다. 주민증의 이미지에는 사진과 위조 방지 문양, 그리고 성명, 주소, 주민번호 등의 문자 정보들이 들어있는데, 이 중에서 주민번호 숫자만 추출하였다. 이렇게 인식된 주민번호를 이용해서, 전산화가 되어 있는 주민 정보와의 대조를 할 수 있게 하였고, 개인 정보들을 XML로 정리하여 각종 문서 양식에 자동으로 기입될 수 있도록 하였다. 위조방지문양과 스캐너의 잡음 등에 기인한 왜곡을 해소하기 위해, 히스토그램 기법을 이용하여 숫자영역을 분리하고, 이진화한 다음, 특징점(끝점, 교차점, 분기점)의 정보와 ART1를 사용하여 숫자들을 분류하였다.

  • PDF

Image color and shape feature extraction technique using object MBR (객체 MBR을 이용한 이미지 내용 기반 색상정보 및 모양정보 추출 기법)

  • 한정운;김병곤;이재호;정헌석;임해철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.136-138
    • /
    • 2000
  • 대용량의 멀티미디어 자료를 기반으로 하는 산업의 급성장은 이에 적합한 효율적인 저장 및 검색시스템을 요구하고 있다. 그러나, 멀티미디어 자료의 고차원적인 특성은 저장과 검색에 있어 성능을 저하시키는 문제점으로 지적되고 있다. 이를 해결하기 위하여 멀티미디어 자료로부터 저차원의 특성을 추출하여 내용기반 검색을 수행하는 연구가 진행되어오고 있다. 본 논문에서는 이미지내의 객체 MBR(Minimum Bounding Rectangle)을 이용하여 저차원의 색상정보와 모양정보를 추출하는 기법을 제안한다. 히스토그램정보는 이미지의 객체를 포함하는 MBR을 이용하여 9개의 타일로 균등분할하여 추출하며, 모양정보는 객체 MBR의 중심으로부터 16방향의 스캐닝을 통해 16개의 점으로 구성된 모양정보를 추출한다. 실험을 통하여 추출된 정보의 검색성능을 평가하였다.

  • PDF

PCAV: Parallel Coordinates Attack Visualizer (PCAV: 평행좌표계를 이용한 네트워크 공격의 시각화)

  • Choi, Hyun-Sang;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.130-132
    • /
    • 2005
  • 인터넷상의 수많은 트래픽 정보 중에서 악성 트래픽 정보를 빠르게 감지하는 것은 그 정보의 방대함 때문에 쉽지 않다. 공격시각회(Attack Visualization) 기법은 이런 수많은 정보 중에서 악성 트래픽 정보를 좀 더 쉽게 인지하게 함으로써 새로운 공격에 대해서 빠른 대응과 피해 최소화를 하는데 활용할 수 있다. 본 연구에서는 평행좌표계(Parallel Coordinates)를 이용해 공격시각화를 하여, 분산 서비스 거부 공격, 웜, 스캐닝 공격 등 인터넷상에 알려진 혹은 알려지지 않은 새로운 공격들에 대해 빠른 대응을 하기위한 기술 연구를 하였으며, 각 공격들의 특정 시각화 패턴을 감지하고 이를 알려주는 이상탐지(anomaly detection) 시각화 시스템 PCAV를 구현하였다. PCAV 시스템을 통해 네트워크 관리자는 실시간으로 트래픽 정보와 공격들의 시각화 정보를 원격에서도 모니터링하고 이를 통해 즉시 대응하는 것이 가능하다. 또한, 이전에 발생한 공격들의 시각화 정보를 확인하고 이를 분석하는 것과, 알려지지 않은 공격이 발생했을지라도 그 공격의 시각적 패턴이 나타났을 때 즉각 공격 서명(Signature)으로 활용 하는 것이 가능하다.

  • PDF

A Study on Software algorithm for Processing n-key roll-over at Matrix Keyboard (매트릭스 구성 키보드의 n-키 롤-오버 처리를 위한 소프트웨어 알고리즘에 관한 연구)

  • Jun, Ho-Ik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.89-94
    • /
    • 2020
  • In this paper, we propose a software algorithm that can configure n-key roll-over that detects all keys without limitation on the number of pressed keys in the dynamic scanning detection of a keyboard composed of a matrix. The proposed algorithm uses the timer interrupt of the microcontroller for computer keyboard control, so that a constant and accurate detection interval can be obtained, and an accurate debounce time can be provided. In order to confirm the effectiveness of the proposed algorithm, a microcontroller was connected to a toy keyboard constructed in the form of a clavier and experiments were conducted. As a result of the experiment, it was confirmed that detection of all keys was performed accurately regardless of the number of keys pressed.

Study on Digital Restoration by 3-dimensional Image for Gilt Bronze Cap Excavated from the Ancient Tomb of Andong, Goheung (고흥 안동고분 출토 금동관모의 3차원 디지털 복원연구)

  • Lee, Joo-Wan;Oh, Jung-Hyun;Kim, Sa-Dug
    • Journal of Conservation Science
    • /
    • v.27 no.2
    • /
    • pp.181-190
    • /
    • 2011
  • A precision measurement and digital image restoration of the 5th century's gilt bronze cap of Baekje dynasty, excavated from the ancient tomb of Andong, Goheung in 2006, was undertaken. The objective of the scanning is to preserve precise feature of the artefact in the form of digital data by embodying it in 3 dimensional space. Acquirement of the data has been undertaken in the following process : 3D scanning to obtain 3D shape and color information(original data photographing)-3D modelling(joining original data and restoring non-photographed or damaged area)-CG image production. Production of restoration CG image was based on joined shape of original data and each part's measurement on CAD. Non-photographed part and area of loss was restored referring actual measurement and research result of excavated cap from the 5th to 8th century. 3D image restoration is one of artefact restoration methods which restores artefact without risk. It is also undertaken with historical research. As result, this method can enhance aesthetic and academic value of the artefact by successful restoration.

3D Indoor Modeling Based on Terrestrial Laser Scanning (지상레이저스캐닝 기반 3차원 실내 모델링)

  • Hong, Seung Hwan;Cho, Hyoung Sig;Kim, Nam Hoon;Sohn, Hong Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.2
    • /
    • pp.525-531
    • /
    • 2015
  • According to the increasing demand for 3D indoor spatial information, the utilization of a terrestrial laser scanner comes to the fore. However, the research for the comparison between a terrestrial laser scanning method and a traditional surveying method is insufficient. The paper evaluated the time-efficiency and the locational accuracy of an AMCW type and a direct TOF type of terrestrial laser scanning methods in comparison with the observation using a total station. As a result, an AMCW type showed higher time-efficiency than a direct TOF type and the RMSE between the two types of data was ${\pm}1mm$. Moreover, the terrestrial laser scanning method showed twice higher time-efficiency than the observation using a total station and the RMSE between the two data was ${\pm}3.4cm$. The results indicate that the terrestrial laser scanning method has better profitability and performance for 3D indoor modeling than the traditional survey using a total station. In the future, a terrestrial laser scanner can be efficiently utilized in the construction of 3D indoor spatial information.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Real Time Pothole Detection System based on Video Data for Automatic Maintenance of Road Surface Distress (도로의 파손 상태를 자동관리하기 위한 동영상 기반 실시간 포트홀 탐지 시스템)

  • Jo, Youngtae;Ryu, Seungki
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.8-19
    • /
    • 2016
  • Potholes are caused by the presence of water in the underlying soil structure, which weakens the road pavement by expansion and contraction of water at freezing and thawing temperatures. Recently, automatic pothole detection systems have been studied, such as vibration-based methods and laser scanning methods. However, the vibration-based methods have low detection accuracy and limited detection area. Moreover, the costs for laser scanning-based methods are significantly high. Thus, in this paper, we propose a new pothole detection system using a commercial black-box camera. Normally, the computing power of a commercial black-box camera is limited. Thus, the pothole detection algorithm should be designed to work with the embedded computing environment of a black-box camera. The designed pothole detection algorithm has been tested by implementing in a black-box camera. The experimental results are analyzed with specific evaluation metrics, such as sensitivity and precision. Our studies confirm that the proposed pothole detection system can be utilized to gather pothole information in real-time.