• 제목/요약/키워드: Action Visibility

검색결과 17건 처리시간 0.024초

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • 제50권9호
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Transaction Visibility: Re-Interpretation of Successful SIS Cases, and Implications for E-Commerce (거래가시성: 성공적인 SIS의 재해석을 통한 새로운 e-Commerce 프레임워크)

  • Yang, Hee-Dong;Choi, In-Young
    • Asia pacific journal of information systems
    • /
    • 제13권1호
    • /
    • pp.73-101
    • /
    • 2003
  • Firms can create additional customer values by changing the visibility characteristic of business transactions. Both visible and invisible transactions can provide distinctive values to the customers. Visible transactions are those that are open to the customer: the customer can see the detailed logic of the transaction and may manipulate specific variables to control the transaction process. Invisible transactions mean that customers have little ability to control the transaction flow and may even be insulated from seeing the transaction. These invisible transactions will be taken care of only by suppliers, and be regarded as a process performed by suppliers. This paper pursues finding out the contingencies of successful transaction visibility change by answering to the following question; "when does increasing(or decreasing) transaction visibility make sense to customers?" This archival case study finds out that transaction visibility change should fit to the need and capabilities of customers. Increasing transaction visibility makes sense when customers need a certain supplier's performance and have a confidence in the capabilities of executing the performance. By the same token, decreasing transaction visibility makes sense when customers have substantial troubles in conducting their current transaction actions or when customers don't feel it necessary to conduct them separately because they can be derived from other action.

Development of Failure Reporting Analysis and Corrective Action System

  • Hong, Yeon-Woong
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 한국데이터정보과학회 2006년도 추계 학술발표회 논문집
    • /
    • pp.97-112
    • /
    • 2006
  • FRACAS(Failure Reporting, Analysis and Corrective Action System) is intended to provide management visibility and control for reliability and maintainability improvement of hardware and associated software by timely and disciplined utilization of failure and maintenance data to generate and implement effective corrective actions to prevent failure recurrence and to simplify or reduce the maintenance tasks. This process applies to acquisition for the design, development, fabrication, test, and operation or military systems, equipment, and associated computer programs. This paper shows the FRACAS development process and developed FRACAS system for a defense equipment.

  • PDF

Analysis for the causes of sea collisions, with particular emphasis on the lookout (선박충돌사고의 원인분석(경계를 중심으로))

  • Hugh, I.;Joo, J.H.
    • Journal of the Korean Institute of Navigation
    • /
    • 제12권1호
    • /
    • pp.71-84
    • /
    • 1988
  • For traffic proceeding in random directions on a plane surface the frequency of collision, if no avoiding action in taken ,is approximately proportional to the square of the traffic density and directly proportional to the size and speed of the ship, Avoiding is normally taken and the rte of collisions is therefore also governed by additional factors such as the visibility, the effectiveness of the collisionavoidance rules, the competence of personnel or watchkeeping attitude, the maneuverability of the ship and the efficiency of radar and other equipments. From the viewpoint of watchkeeper who is responsible for maneuvering, watchkeeping attitude such as lookout and action to avoid collision is the most controllable factor among those mentioned above. In practice, according to the investigation of the institution of marine courts, about 50% co collisions occurred is caused by disorbedience to steering and sailing rules of international regulations for preventing collision at sea including lookout. So we classify the process of collisions with first sight of another ship , assessment of risk of collisions and action to avoid collisions and make a factural survey about lookout and action to avoid collisions from the point on "time" and " distance", namely relationship among ship's size, speed, first sight time of another ship, action to avoid collisions ,and distance from sight of another ship to collision occurred. According to the results of the actual survey , we come to conclude that most of collisions occurred are due to improper lookout and ineffective action to avoid collision which means time lag from first sight of another ship to time of action taken to avoid collision is relatively long. is relatively long.

  • PDF

The Study of Visual Immersion of Interactive Type of VR Action Contents (VR체감형 액션콘텐츠의 시각적 몰입감)

  • Lee, Young-Woo
    • The Journal of the Korea Contents Association
    • /
    • 제20권7호
    • /
    • pp.525-533
    • /
    • 2020
  • In recent years, the VR-interactive action contents industry, which utilizes five senses of human bodies, has continued to grow through areas such as games, tourism, movies, performances and exhibitions, but it has reached to breaking point by unrealistic visual elements. Therefore, the purpose of this study is to analyze the effect of each evaluation factor based on visual immersion of interactive type of VR action contents to overcome the limitations. For this study, firstly, prior research is reviewed. Secondly, the evaluation factors of visual immersion of interactive type of VR action contents and hypothesis are to be derived. Research finding is that there is no difference to recognize proximity, three-dimensionality, visibility and immersion by gender. Also, in order to influence visual immersion, it is important that 3D modeling of characters and objects must be sophisticated to be fit in with their surroundings and lighting. This makes user to be confused where they are actually in.

Development of failure reporting analysis and corrective action system (고장보고분석 및 정비 시스템의 개발에 관한 실증 연구)

  • Hong, Yeon-Woong
    • Journal of the Korean Data and Information Science Society
    • /
    • 제21권1호
    • /
    • pp.109-119
    • /
    • 2010
  • FRACAS (Failure Reporting, Analysis and Corrective Action System) is intended to provide management visibility and control for reliability and maintainability improvement of hardware and associated software by timely and disciplined utilization of failure and maintenance data to generate and implement effective corrective actions to prevent failure recurrence and to simplify or reduce the maintenance tasks. This process applies to acquisition for the design, development, fabrication, test, and operation of military systems, equipment, and associated computer programs. This paper shows the FRACAS development process and developed FRACAS system for a defense equipment.

A Pilot Study on a Strategic Development Plan for a National Branch Library (국가도서관 지역분관의 발전전략 모형 연구 - 국립세종도서관을 중심으로 -)

  • Yoon, Hee-Yoon;Chang, Durk Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • 제50권2호
    • /
    • pp.197-213
    • /
    • 2016
  • This study aims at suggesting mid- and long-term development plan (vision, core values, strategic goals and functional performances, major tasks and detailed action plans for each strategy, organizational and human resources management, shared responsibility with the National Library of Korea which is main library in collection and services of policy information, and cooperation and collaborative exchange programs) for the National Library of Korea, Sejong. This study is based on the appropriateness that the library should enhance its visibility through focusing on the role as the specialized library in charge of public policy information services if it wished to ensure the identity of a branch of the National library of Korea for the comprehensive collection, preservation, and nationwide services of public policy information.

Jointly Learning of Heavy Rain Removal and Super-Resolution in Single Images

  • Vu, Dac Tung;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 한국방송∙미디어공학회 2020년도 추계학술대회
    • /
    • pp.113-117
    • /
    • 2020
  • Images were taken under various weather such as rain, haze, snow often show low visibility, which can dramatically decrease accuracy of some tasks in computer vision: object detection, segmentation. Besides, previous work to enhance image usually downsample the image to receive consistency features but have not yet good upsample algorithm to recover original size. So, in this research, we jointly implement removal streak in heavy rain image and super resolution using a deep network. We put forth a 2-stage network: a multi-model network followed by a refinement network. The first stage using rain formula in the single image and two operation layers (addition, multiplication) removes rain streak and noise to get clean image in low resolution. The second stage uses refinement network to recover damaged background information as well as upsample, and receive high resolution image. Our method improves visual quality image, gains accuracy in human action recognition task in datasets. Extensive experiments show that our network outperforms the state of the art (SoTA) methods.

  • PDF

Multimodal Image Fusion with Human Pose for Illumination-Robust Detection of Human Abnormal Behaviors (조명을 위한 인간 자세와 다중 모드 이미지 융합 - 인간의 이상 행동에 대한 강력한 탐지)

  • Cuong H. Tran;Seong G. Kong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.637-640
    • /
    • 2023
  • This paper presents multimodal image fusion with human pose for detecting abnormal human behaviors in low illumination conditions. Detecting human behaviors in low illumination conditions is challenging due to its limited visibility of the objects of interest in the scene. Multimodal image fusion simultaneously combines visual information in the visible spectrum and thermal radiation information in the long-wave infrared spectrum. We propose an abnormal event detection scheme based on the multimodal fused image and the human poses using the keypoints to characterize the action of the human body. Our method assumes that human behaviors are well correlated to body keypoints such as shoulders, elbows, wrists, hips. In detail, we extracted the human keypoint coordinates from human targets in multimodal fused videos. The coordinate values are used as inputs to train a multilayer perceptron network to classify human behaviors as normal or abnormal. Our experiment demonstrates a significant result on multimodal imaging dataset. The proposed model can capture the complex distribution pattern for both normal and abnormal behaviors.