• Title/Summary/Keyword: Data Leaks

Search Result 123, Processing Time 0.023 seconds

A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer (윈도우 환경에서의 증거 수집 시스템 설계 및 구현에 관한 연구)

  • Lee, SeungWon;Roh, YoungSup;Han, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Lately, intrusive incidents (including system hacking, viruses, worms, homepage alterations, and data leaks) have not involved the distribution of an virus or worm, but have been designed to acquire private information or trade secrets. Because an attacker uses advanced intelligence and attack techniques that conceal and alter data in a computer, the collector cannot trace the digital evidence of the attack. In an initial incident response first responser deals with the suspect or crime scene data that needs investigative leads quickly, in accordance with forensic process methodology that provides the identification of digital evidence in a systematic approach. In order to an effective initial response to first responders, this paper analyzes the collection data such as user usage profiles, chronology timeline, and internet data according to CFFPM(computer forensics field triage process model), proceeds to design, and implements a collection application to deploy the client/server architecture on the Windows based computer.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Pipe Leak Detection System using Wireless Acoustic Sensor Module and Deep Auto-Encoder

  • Yeo, Doyeob;Lee, Giyoung;Lee, Jae-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.59-66
    • /
    • 2020
  • In this paper, we propose a pipe leak detection system through data collection using low-power wireless acoustic sensor modules and data analysis using deep auto-encoder. Based on the Fourier transform, we propose a low-power wireless acoustic sensor module that reduces data traffic by reducing the amount of acoustic sensor data to about 1/800, and we design the system that is robust to noise generated in the audible frequency band using only 20kHz~100kHz frequency signals. In addition, the proposed system is designed using a deep auto-encoder to accurately detect pipe leaks even with a reduced amount of data. Numerical experiments show that the proposed pipe leak detection system has a high accuracy of 99.94% and Type-II error of 0% even in the environment where high frequency band noise is mixed.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Development of Gas Type Identification Deep-learning Model through Multimodal Method (멀티모달 방식을 통한 가스 종류 인식 딥러닝 모델 개발)

  • Seo Hee Ahn;Gyeong Yeong Kim;Dong Ju Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.525-534
    • /
    • 2023
  • Gas leak detection system is a key to minimize the loss of life due to the explosiveness and toxicity of gas. Most of the leak detection systems detect by gas sensors or thermal imaging cameras. To improve the performance of gas leak detection system using single-modal methods, the paper propose multimodal approach to gas sensor data and thermal camera data in developing a gas type identification model. MultimodalGasData, a multimodal open-dataset, is used to compare the performance of the four models developed through multimodal approach to gas sensors and thermal cameras with existing models. As a result, 1D CNN and GasNet models show the highest performance of 96.3% and 96.4%. The performance of the combined early fusion model of 1D CNN and GasNet reached 99.3%, 3.3% higher than the existing model. We hoped that further damage caused by gas leaks can be minimized through the gas leak detection system proposed in the study.

Multivariate Outlier Removing for the Risk Prediction of Gas Leakage based Methane Gas (메탄 가스 기반 가스 누출 위험 예측을 위한 다변량 특이치 제거)

  • Dashdondov, Khongorzul;Kim, Mi-Hye
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.23-30
    • /
    • 2020
  • In this study, the relationship between natural gas (NG) data and gas-related environmental elements was performed using machine learning algorithms to predict the level of gas leakage risk without directly measuring gas leakage data. The study was based on open data provided by the server using the IoT-based remote control Picarro gas sensor specification. The naturel gas leaks into the air, it is a big problem for air pollution, environment and the health. The proposed method is multivariate outlier removing method based Random Forest (RF) classification for predicting risk of NG leak. After, unsupervised k-means clustering, the experimental dataset has done imbalanced data. Therefore, we focusing our proposed models can predict medium and high risk so best. In this case, we compared the receiver operating characteristic (ROC) curve, accuracy, area under the ROC curve (AUC), and mean standard error (MSE) for each classification model. As a result of our experiments, the evaluation measurements include accuracy, area under the ROC curve (AUC), and MSE; 99.71%, 99.57%, and 0.0016 for MOL_RF respectively.

A Study on the Safety Assessment and Damage Pattern of Water Purifier Compressors (정수기용 압축기의 안전성 평가 및 소손 패턴 분석에 관한 연구)

  • Choi, Chung-Seog
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.2
    • /
    • pp.21-25
    • /
    • 2013
  • The purpose of this study is to provide basic data for the safety assessment of a water purifier when water leaks due to inappropriate maintenance and the examination of the cause of accidents related to the leak. Due to its inspection and management by non-specialists, if a leak occurs in a water purifier with the water level controller being inclined, it may result in the failure of the compressor, power supply line, PCB, etc. The analysis of the thermal diffusion pattern of water purifier compressors using a thermal image camera shows that its maximum temperature was approximately $80^{\circ}C$. In addition, its operating current was a maximum of 13 A and the system's operating current was approximately 1.7 A after the compressor was charged. It was found that the housing type power cable cover of the compressor had the effect of preventing electric shock but has poor flame resistance. Furthermore, the performance of the overload protector, PTC relays, etc., was excellent but they have potential for problems as metallic terminals were exposed, resulting in the potential of a safety related accident. The terminals and their surface damaged by the tracking showed a trace of carbonization and the resistance between terminals was measured to be approximately $8{\Omega}$. In addition, while the tracking was proceeding, the fuse and circuit breaker installed for system protection did not operate.

Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices (모바일 기기를 활용한 고객 개시 카드결제 시스템 설계 및 구현)

  • Seo, Moon Seog
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.245-254
    • /
    • 2014
  • Payment system is defined as the various contracts and operating facilities for the transfer of monetary value to clear the relationship between credit and debt. Payment systems essentially require the efficient and reliable operations. Card-based payment systems are developed practically and creatively in accordance with the progress of ICT. Especially in mobile environment with intelligent mobile devices such as smart-phones and tablets, a variety of payment services are provided. Existing card-based payment services are configured by the payment transaction initiated by the merchants card acceptance and then swiping into the CAT (Card Authorization Terminal) to begin the transaction. The merchant initiated payment services are now applied to the Wireless CAT (W-CAT) for mobile environment. That kind of payment services cause many problems such the illegal card information leaks and the lingering threat of W-CAT theft. Also, the use of many W-CATs increased cost to the merchant. In this paper, we propose the card holder initiated card payment system using the intelligent mobile devices in mobile environment for solving problems of the existing merchant initiated card payment system and coping effectively with the activation of a wireless data network and changes of information technology.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

Performance Monitoring Study of Unglazed Transpired Solar Air Heating Module (무창 기공형 태양열 공기 난방 모듈 성능 모니터링 연구)

  • Kang, Eun-Chul;Hyun, Myung-Taek;Lee, Euy-Joon
    • Journal of the Korean Solar Energy Society
    • /
    • v.22 no.1
    • /
    • pp.67-72
    • /
    • 2002
  • Solar Air Systems (SAS) have unique advantages for space heating and tempering ventilation air. Air, unlike water, needs no protection against freezing nor are leaks damaging to the building structure or its contents. In contrast to glazed collector, unglazed steel solar collector may have higher efficiencies over glazed flat collector due to the absence of the glass. Therefore, the monitoring of SAS is so important to evaluate actual performance of SAS for right applications. This study is to provide a testing method with a movable test cell developed in KIER to evaluate the thermal performance of SAS based on international standard method ASHRAE 93-86, "Method of Testing to Determine the Thermal Performance of Solar Collectors". The monitoring tool used advanced technique LabVIEW 6i with portable notebook computer. Sample results have been obtained to access the performance of a reference and a target SAS module. The process and tool introduced here could be used to provide a performance verification data for future implementation study applications.