• Title/Summary/Keyword: 흔적의 보호

Search Result 53, Processing Time 0.019 seconds

Studies on river otter habitat use pattern on Hongchun river in Gangwon province (강원도 홍천강 유역에 서식하는 수달의 서식지이용에 관한 연구)

  • Park, Bo-Hyun;Lee, Sangdon
    • Journal of Wetlands Research
    • /
    • v.14 no.3
    • /
    • pp.413-418
    • /
    • 2012
  • In this study, both habitat use analysis by rumen contents of Eurasian river otter (Lutra lutra) were carried out to investigate the preference of habitat environment and diet using their fecal samples. As the target sites, two streams (the Naechon-cheon and the Koonup-cheon) were selected in the upstream of the Hongcheon river, Hongcheon County, Gangwon Province. A total of 478 track samples (e.g., feces, scent and footprint) were found during the survey periods (May to November, 2009 and November, 2010). The dominant points, where the tracks of river otters were observed, were areas with the low depth(0.5-1m) and the slow flow velocity (5m/sec). Also, both rocks and rock-beds were preferred but artificial facilities were avoided. This ecological study of river otters using habitat use analysis and diet analysis by rumen contents will be useful fundamental information to conserve the river otter populations, and to protect their habitats.

Forensic Investigation Procedure for Real-time Synchronization Service (실시간 동기화 서비스에 대한 포렌식 조사 절차에 관한 연구)

  • Lee, Jeehee;Jung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1363-1374
    • /
    • 2012
  • The number and use of Internet connected devices has dramatically increased in the last several years. Therefore many services synchronizing data in real-time is increasing such as mail, calendar and storage service. This service provides convenience to users. However, after devices are seized, the data could be changed because of characteristic about real-time synchronization. Therefore digital investigation could be difficult by this service. This work investigates the traces on each local device and proposes a method for the preservation of real-time synchronized data. Based on these, we propose the procedures of real-time synchronization data.

Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files (삭제되거나 손상된 이벤트 로그(EVTX) 파일 복구 기술에 대한 연구)

  • Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.387-396
    • /
    • 2016
  • As the number of people using digital devices has increased, the digital forensic, which aims at finding clues for crimes in digital data, has been developed and become more important especially in court. Together with the development of the digital forensic, the anti-forensic which aims at thwarting the digital forensic has also been developed. As an example, with anti-forensic technology the criminal would delete an digital evidence without which the investigator would be hard to find any clue for crimes. In such a case, recovery techniques on deleted or damaged information will be very important in the field of digital forensic. Until now, even though EVTX(event log)-based recovery techniques on deleted files have been presented, but there has been no study to retrieve event log data itself, In this paper, we propose some recovery algorithms on deleted or damaged event log file and show that our recovery algorithms have high success rate through experiments.

Applying CBR algorithm for cyber infringement profiling system (사례기반추론기법을 적용한 침해사고 프로파일링 시스템)

  • Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1069-1086
    • /
    • 2013
  • Nowadays, web defacement becomes the utmost threat which can harm the target organization's image and reputation. These defacement activities reflect the hacker's political motivation or his tendency. Therefore, the analysis of the hacker's activities can give the decisive clue to pursue criminals. A specific message or photo or music on the defaced web site and the outcome of analysis will be supplying some decisive clues to track down criminals. The encoding method or used fonts of the remained hacker's messages, and hacker's SNS ID such as Twitter or Facebook ID also can help for tracking hackers information. In this paper, we implemented the web defacement analysis system by applying CBR algorithm. The implemented system extracts the features from the web defacement cases on zone-h.org. This paper will be useful to understand the hacker's purpose and to plan countermeasures as a IDSS(Investigation Detection Support System).

Proposal of Functional Assessment for Wetland-type Abandoned Channel (습지형 구하도의 기능평가 제안)

  • Kang, Su Jin;Kang, Joon Gu;Hong, Il;Yeo, Hong Koo
    • Journal of Wetlands Research
    • /
    • v.14 no.4
    • /
    • pp.547-559
    • /
    • 2012
  • Abandoned channel is vestiges of running in the past. Abandoned channels have been formed mostly by artificial river maintenance through channel straightening in Korea. Managed properly, these now abandoned channels can provide habitat for wildlife, maintain biodiversity of aquatic life, security against flooding and recreation area for human. However, because the areas are officially classified as abandoned, the channels is collapsing and decaying from years of neglect. This study suggested functional assessment for wetland-type abandoned channel in order to provide appropriate management and investment. For this reason, The study will examine and evaluate these channels with regard to the following four major criteria (Natureless, Habitat, Water-friendliness and Water quality) and 21 indices. Consequently, abandoned channel in two Nakdong river sites, site 1 was needed for protection or improvement in the medium to longer term, while site 2 was in good condition. This evaluation method will be helpful to manage wetland-type abandoned channel in Korea and will be able to use National River Health Program.

Intrusion Detection through Monitoring of Network Security Status (네트워크 보안상태 감시를 통한 침입탐지)

  • 황혜선;이상호;임채호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.153-156
    • /
    • 2001
  • Code Red, Nimda 등 최근 인터넷웜(Internet Worm)에 의한 침입은 방화벽시스템, 침입탐지시스템 등 보안제품이 존재하는 네트워크에서도 적절한 대책이 되지 않은 경향을 보이고 있다. 침입차단시스템을 통과할 수 있는 신종 취약점을 이용한 침입에는 오용방지방법(Misuse Detection)에 의한 침입탐지시스템이 침입패턴을 업데이트하기 전에 이미 네트 워크에 피해를 입힐 가능성이 크게 증가하는 것이다. 향후에도 크게 증가할 것으로 보이는 인터넷웜 공격 등에는 침입차단시스템, 침입탐지시스템 등 보안제품의 로그기록 상황과 네트워크의 보안상태를 지속적으로 감시함으로서 조기에 침입을 탐지할 수 있다. 본 논문에서는 신종 웜 공격에 의한 침입이 발생되었을 때 IDS가 탐지하지 못하는 상황에서도 침입의 흔적을 조기에 발견할 수 있는 네트워크 보안 상태변수확인방법(Network Security Parameter Matching Method)을 제안하고자 한다.

  • PDF

사이버 위협 인텔리전스 환경에서의 종합분석 전략

  • Lee, Seulgi;Kim, Dongwook;Kim, Byeongjae;Lee, Taewoo;Han, Sangwon;Lee, JaeKwang
    • Review of KIISC
    • /
    • v.31 no.5
    • /
    • pp.33-38
    • /
    • 2021
  • 한국인터넷진흥원 종합분석팀은 사이버 위협 인텔리전스(CTI)를 통해 주요 침해사고를 추적하여 분석하고 이에 대한 대응방안을 마련, 공유하는 역할을 수행하고 있다. 구체적으로는 외부 협력채널 혹은 기존 사고에서 사용된 악성도구의 흔적을 기반으로 악성 인프라를 탐지하고, 이에 대한 공격자의 전략을 상세히 분석, 정리한 보고서를 발간하여 기업의 보안 수준을 제고하려 노력하고 있다. 본고에서는 사이버 위협 인텔리전스 측면에서 변화한 종합분석의 관점 및 역할을 소개하고, 고도화되어가는 침해사고를 대응하기 위한 향후 전략을 제안한다.

A Study on the Landscape Planning and Landscape Architecture Construction Principles by the Type Outside Relics (발굴유적 외부공간의 유형별 경관계획 및 조경시공 원칙 연구)

  • Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.58-69
    • /
    • 2018
  • The purpose of this study was to present specific standards for landscape planning and construction applicable to landscaping areas in various historical sites. The results are as follows: First, the types of historical sites are classified according to their preservation status and processing techniques, and the classification according to their status is divided into those that have been buried underground, such as those that have been exposed to the ground, such as buildings and structures, and those that have a reputation or a record of the sites. The classification according to the wartime processing technique was classified by such techniques as closures that isolate the site, penetration that can be seen on the site, and overlays where a separate protection facility is installed on the site. Second, the principles of landscape planning for display of historical sites are divided into the items that make up the historical site, surface treatment of the sites, tree planting, and installation of facilities. If the site is not a circular space, the area separating the space by different materials between the components is required. In the event that preservation of the historical site is required, it is deemed desirable to use the soil, and to do so, the use of grasses and shrubs is effectively considered to be effective. The introduction of plants and plants should be considered according to the nature of the space. Depending on the area and nature of the monument, the facility is required to take a cautious approach by reviewing its influence on the landscape and the additional excavation of the monument. Third, the readjustment method derived as a result of looking at the landscaping principle in the historical site space was classified as conservation of status, installation of protection facilities, burial, restoration, relocation, and reproduction. Preservation of the status quo is essential for limited landscape planning and should not affect the prototype of existing relics. The protection facility shall be installed where necessary to protect the relics, and when the soil is formed, the surface treatment shall be required to remove trees that could damage the site and prevent soil and soil oil from being lost after the site. The restoration shall establish a landscaping plan according to the circular preservation based on the clues to the circle. The transfer requires a landscaping plan to create an environment similar to the outer space of an existing site and should be able to highlight the value or location of the original site. The reenactment should have a landscaping plan to revive the landscape and atmosphere of the past for the now-defunct remains. Fourth, landscaping can simultaneously satisfy the preservation of excavation sites and the increase in exhibition effects. In order to protect the traces of the past and vitalize the site of the ruins today, specific measures are required, the creation of a park for historical sites that preserve the functions and value of the relics, and the formation of a shape of linked contents can be suggested as alternatives.

The Automatic Collection and Analysis System of Cloud Artifact (클라우드 아티팩트 자동 수집 및 분석 시스템)

  • Kim, Mingyu;Jeong, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1377-1383
    • /
    • 2015
  • As the cloud services users' increase, there are important files created by individual in cloud storage. Thus, investigation of cloud artifact should be conducted. There are two methods of analyzing cloud service, one is that investigates cloud server provider (CSP), and another is that investigates client. In this paper, we presents an automated framework to detect the altered artifact and developes a tool that detects the cloud artifact. We also developed Cloud Artifact Tool that can investigate client computer. Cloud Artifact Tool provides feature of collection and analysis for the services such as Google Drive, Dropbox, Evernote, NDrive, DaumCloud, Ucloud, LG Cloud, T Cloud and iCloud.

Fingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart Devices (지문 영상 복원 기반의 스마트 기기 지문 스머지 공격 연구)

  • Lee, Hoyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.233-240
    • /
    • 2017
  • Fingerprint authentication identifies individuals based on user specific information. It is widely used as it is convenient, secure and has no risk of leakage, loss, or forgotten. However, the latent fingerprints remaining on the smart device's surface are vulnerable to smudge attacks. We analyze the usage patterns of individuals using smart device and propose methods to reconstruct damaged fingerprint images using fingerprint smudges. We examine the feasibility of smudge attacks with frequent usage situations by reconstructing fingerprint smudges collected from touch screens. Finally, we empirically verify the vulnerability of fingerprint authentication systems by showing high attack rates.