• Title/Summary/Keyword: 침해 대응

Search Result 479, Processing Time 0.02 seconds

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System (고성능 침입탐지 및 대응 시스템의 구현 및 성능 평가)

  • Kim, Hyeong-Ju;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.157-162
    • /
    • 2004
  • Recently, the growth of information infrastructure is getting fatter and faster. At the same time, the security accidents are increasing together. We have problem that do not handle traffic because we have the Intrusion Detection Systems in low speed environment. In order to overcome this, we need effective security analysis techniques that ran Processed data of high-capacity because high speed network environment. In this paper we proposed the Gigabit Intrusion Detection System for coordinated security function such as intrusion detection, response on the high speed network. We suggested the detection mechanism in high speed network environment that have pattern matching function based packet header and based packet data that is proceeded in system kernel area, we are shown that this mechanism was excellent until maximum 20 times than existing system in traffic processing performance.

A Study on Security Risk according to the activation of Bio-Authentication Technology (바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • In recent years, there is growing interest in 'Fin-tech' in the domestic and international financial sector. And a variety of services in such a situation has emerged. To ensure the safety of from hacking attacks, many new technologies have been developed. These leading technology is the Bio-authentication method that you consider applying to the financial sector. Bio authentication is using biometric information. Also it is known that can cope the threat of fabrication and modifying attacks with shared and stored. However, Recently, When you look at hacking incidents of biometric data(560 million cases) in the United States Office of Personnel Management and advent of the fingerprints counterfeit technology, We can be known that should be reconsidered about the safety of bio-certification. Especially, it should be provided with a response measures for the problem of embezzlement that biometric information already been leaked. Thereby In this paper, by investigating biometric technologies and practices applied and of the vulnerability factor in many industries, it expected to be utilized in the prepared threats countermeasures in accordance with the application of the biometric authentication technology in a future.

COVID-19 Related Personal Information Issues and Countermeasures from the Perspective of Record Management (기록관리 관점에서 본 코로나 19 관련 개인정보 이슈와 대응방안)

  • Jeong, Ji-Hye;Na, Jeong-Ho;Jang, Ji-Hye;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.81-107
    • /
    • 2020
  • At a time when Korea and the rest of the world recently faced the unprecedented situation of "COVID-19," the view of actively "disclosure" of information to prevent the spread of infectious diseases is at odds with the view of "protecting" personal information as these social measures are coupled with the infringement of individuals' basic rights. In order to see the nation's response to the infectious disease crisis, we examined the current status and characteristics of public records according to crisis alert levels based on the manual for responding to infectious disease. Especially we analyzed the types and disclosure status of records containing personal information. For detecting personal information-related issues on news media, we collected online news articles and performed text anlaysis. Through this, we reviewed the problems of record management including personal information and suggested improvement points from the perspective of the life cycle of records: collect, manage, and dispose of them.

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

Taxonomy and Countermeasures for Generative Artificial Intelligence Crime Threats (생성형 인공지능 관련 범죄 위협 분류 및 대응 방안)

  • Woobeen Park;Minsoo Kim;Yunji Park;Hyejin Ryu;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.301-321
    • /
    • 2024
  • Generative artificial intelligence is currently developing rapidly and expanding industrially. The development of generative AI is expected to improve productivity in most industries. However, there is a probability for exploitation of generative AI, and cases that actually lead to crime are emerging. Compared to the fast-growing AI, there is no legislation to regulate the generative AI. In the case of Korea, the crimes and risks related to generative AI has not been clearly classified for legislation. In addition, research on the responsibility for illegal data learned by generative AI or the illegality of the generated data is insufficient in existing research. Therefore, this study attempted to classify crimes related to generative AI for domestic legislation into generative AI for target crimes, generative AI for tool crimes, and other crimes based on ECRM. Furthermore, it suggests technical countermeasures against crime and risk and measures to improve the legal system. This study is significant in that it provides realistic methods by presenting technical countermeasures based on the development stage of AI.

Dilemma of Data Driven Technology Regulation : Applying Principal-agent Model on Tracking and Profiling Cases in Korea (데이터 기반 기술규제의 딜레마 : 국내 트래킹·프로파일링 사례에 대한 주인-대리인 모델의 적용)

  • Lee, Youhyun;Jung, Ilyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.17-32
    • /
    • 2020
  • This study analyzes the regulatory issues of stakeholders, the firm, the government, and the individual, in the data industry using the principal-agent theory. While the importance of data driven economy is increasing rapidly, policy regulations and restrictions to use data impede the growth of data industry. We applied descriptive case analysis methodology using principal-agent theory. From our analysis, we found several meaningful results. First, key policy actors in data industry are data firms and the government among stakeholders. Second, two major concerns are that firms frequently invade personal privacy and the global companies obtain monopolistic power in data industry. This paper finally suggests policy and strategy in response to regulatory issues. The government should activate the domestic agent system for the supervision of global companies and increase data protection. Companies need to address discriminatory regulatory environments and expand legal data usage standards. Finally, individuals must embody an active behavior of consent.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

Prospect users' perceptions of TSI technologies: An analysis of focus group interviews with adolescents (실감공간기술(Tangible Space Initiative)에 대한 잠재적 수용자의 인식: 청소년을 대상으로 한 포커스 그룹 인터뷰를 중심으로)

  • Yang, Yeon-Hee;Yang, Hae-Young;Kim, Joo-Han
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.598-607
    • /
    • 2007
  • 본 연구에서는 실감공간에 대한 청소년의 반응을 바탕으로 향후 기술 개발 방향에 대한 조언을 하기 위하여 총 41명의 학생을 대상으로 소집단 포커스 그룹 인터뷰를 시행하였다. 청소년들이 자주 사용하는 미디어의 종류와 이유, 미디어 사용에서 느끼는 불편한 점, 그들이 상상하는 미래형 미디어의 모습과 실감공간기술에 대한 반응을 묻고, 그 결과를 유형화하였다. 연구 결과 포커스 그룹 인터뷰 참가자들은 자주 사용하는 미디어로 휴대폰과, 인터넷, MP3, 활자 매체 등을 꼽았다. 활자매체의 장점으로는 높은 몰입도를, 인터넷의 장점으로는 편리한 인터페이스, 핸드폰의 장점으로는 이동성이 제기되었다. 그러나 핸드폰과 관련하여 청소년들은 불편한 인터페이스, 작은 용량과 빨리 닳는 배터리를 단점으로 지적했고 뉴미디어 공통적으로 느린 속도, 미디어에 의존하게 되는 강박증적 증세, 사생활 침해의 문제와 대인관계유지에 있어서의 부작용, 높은 이용료 등의 문제가 제기되었다. 이들은 일상생활이 미디어 이용에 의해 방해받고 있으며 미디어 이용으로 인해 불필요한 '필요'가 생겨나고 있다고 지적했다. 미래형 미디어에 대한 바람은 기존 미디어의 단점이 보완, 개선되는 측면에서 제시되었다. 더욱 편리해진 인터페이스와 기존 뉴미디어의 장점이 접목되는 방향의 미디어 통합도 요청되었다. 그러나 실감공간기술에 대해서는 긍정적인 반응보다는 부정적인 반응을 수적으로 우세해 주목을 끌었다. 진화된 형태의 미디어에 대해 긍정적인 반응을 보일 것이라는 예상과는 달리 실감공간기술이 기존의 면 대 면 대인관계를 파괴할 것이며 사생활을 침해하고 건강에 부정적인 영향을 미칠 것이라는 등의 거부감과 공포를 구체적으로 피력한 것이다. 이러한 두려움(fear)은 선행연구에 따르면 사람들이 새로운 매체에 대해 갖는 두려움과 이로부터 발생하는 두려움에 대한 대응은 혁명적 변화의 가능성을 억압하여 기존의 질서와 새로운 질서가 공존하는 기간을 늘림으로써 미시적 차원에서 단절적 역사의 경험을 완화시키는 기능을 하는 것으로 해석된다. 따라서 연구 결과 나타난 실감공간 기술에 대한 부정적인 반응도 이러한 맥락에서 해석될 수 있다. 즉 인터뷰 참가자들이 피력한 두려움은 뉴미디어 도입과 함께 반복되는 현상이며 이것은 새로운 현상이 아니다. 두려움은 기존 질서와 새로운 질서가 공존하는 기간을 연장시킴으로써 완충재로서 기능한다. 따라서 향후 기술 개발과 확산 과정에서 실감공간기술의 긍정적인 면모에 대한 적극적인 홍보가 필요하며 수용자들의 바람과 신기술에 대한 공포감을 이해하고 이를 기술 개발 방향 설정에 적극적으로 반영하는 자세가 요청된다고 하겠다.

  • PDF

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF