• Title/Summary/Keyword: Data leak

Search Result 256, Processing Time 0.022 seconds

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

Development of an efficient method of radiation characteristic analysis using a portable simultaneous measurement system for neutron and gamma-ray

  • Jin, Dong-Sik;Hong, Yong-Ho;Kim, Hui-Gyeong;Kwak, Sang-Soo;Lee, Jae-Geun;Jung, Young-Suk
    • Analytical Science and Technology
    • /
    • v.35 no.2
    • /
    • pp.69-81
    • /
    • 2022
  • The method of measuring and classifying the energy category of neutrons directly using raw data acquired through a CZT detector is not satisfactory, in terms of accuracy and efficiency, because of its poor energy resolution and low measurement efficiency. Moreover, this method of measuring and analyzing the characteristics of low-energy or low-activity gamma-ray sources might be not accurate and efficient in the case of neutrons because of various factors, such as the noise of the CZT detector itself and the influence of environmental radiation. We have therefore developed an efficient method of analyzing radiation characteristics using a neutron and gamma-ray analysis algorithm for the rapid and clear identification of the type, energy, and radioactivity of gamma-ray sources as well as the detection and classification of the energy category (fast or thermal neutrons) of neutron sources, employing raw data acquired through a CZT detector. The neutron analysis algorithm is based on the fact that in the energy-spectrum channel of 558.6 keV emitted in the nuclear reaction 113Cd + 1n → 114Cd + in the CZT detector, there is a notable difference in detection information between a CZT detector without a PE modulator and a CZT detector with a PE modulator, but there is no significant difference between the two detectors in other energy-spectrum channels. In addition, the gamma-ray analysis algorithm uses the difference in the detection information of the CZT detector between the unique characteristic energy-spectrum channel of a gamma-ray source and other channels. This efficient method of analyzing radiation characteristics is expected to be useful for the rapid radiation detection and accurate information collection on radiation sources, which are required to minimize radiation damage and manage accidents in national disaster situations, such as large-scale radioactivity leak accidents at nuclear power plants or nuclear material handling facilities.

A Study on the Characteristics of Production and Using for Acidic Chemicals with High Accident Frequency (화학사고 빈도가 높은 산 계열 물질의 취급 특성 연구)

  • Kim, Ki-Joon;Lee, Jin-Seon;Yoon, Young-Sam;Jung, Mi-Suk;Yoon, Junheon;Seok, Kwang-Seol
    • Korean Journal of Hazardous Materials
    • /
    • v.2 no.1
    • /
    • pp.1-5
    • /
    • 2014
  • Acidic chemicals like sulfuric acid, nitric acid and hydrogen chloride take up 37% of the total chemical accidents which took place for the past 10 years. When an acidic chemical leak happens, fume is generated, diffusing into the air, which might cause serious damage to health of local residents and the environment. However, we have only little reference data for production and using of acidic chemicals. In this study, we investigated characteristics of production and using for acidic chemicals with high accident frequency. As a results, domestic chemical accidents were categorized according to chemical types and production, using, and handling characteristics of acidic chemicals were identified. Sulfuric acid was handled in the largest amount, followed in the order of hydrogen chloride, nitric acid, acrylic acid, and hydrogen fluoride. Sulfuric acid is used in the industry of manufacturing composite fertilizer and mainly used for manufacturing fertilizer. Hydrogen chloride is used in the industry of manufacturing basic chemicals for petrochemical family and mainly used for pH regulator. It is expected that this results could be used as preliminary data for making decisions on facilities required intensive management in order to prevent chemical accidents and prepare countermeasures against such accidents.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Recent Developments and Field Application of Foreign Waterworks Automatic Meter Reading (국외 상수도 원격검침시스템의 개발 동향 및 현장 적용 사례 고찰)

  • Joo, Jin Chul;Ahn, Hosang;Ahn, Chang Hyuk;Ko, Kyung-Rok;Oh, Hyun-Je
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.12
    • /
    • pp.863-870
    • /
    • 2012
  • The market trends of automatic meter reading associated with smart water meters were investigated. Also, recent developments and field applications of key technology for automatic meter reading associated with smart water meters were analyzed. Smart water meters have been manufactured mostly in United States and Europe and have been expanded their business to Asia. Integrated water management system combining with the additional functions such as real-time consumption metering, cost notification, water conservation, leak detection, water quality monitoring, and flow control have been operated in automatic meter reading. Both water quality and quantity data measured from smart water meters and sensors were transferred to data concentration units through neighborhood area network, and then were transferred to integrated server through wide area network. The data transfer methods were determined by comprehensively considering urban scale, density of smart water meters, power supply and network topologies. Common data collection methods such as fixed network to data concentation units, vehicles drive by, people walk by, and drone fly by have been applied. The automatic meter reading associated with smart water meters are spread throughout the world, and both water and energy savings result in saving the money and reducing the greenhouse gases emission.

A Study on the Estimation of Stability of Fill Dam by Long-term Electrical Resistivity Monitoring (장주기 전기비저항 모니터링 기법을 이용한 필댐의 안정성 평가)

  • Kim, Gi-Ho;Lim, Heui-Dae;Ahn, Hee-Yoon
    • Journal of the Korean Geotechnical Society
    • /
    • v.29 no.5
    • /
    • pp.53-64
    • /
    • 2013
  • Resistivity monitoring is based on the fact that a change in the porosity leads to the changes in water content and fine particles, which alter the electrical resistivity. At every embankment dam, internal erosion always occurs as time passes. The internal erosion generally develops into piping over a long time by backward erosion and concentrated leak, and finally leads to dam failure. Resistivity is known to be very sensitive to the changes in porosity in embankment dams. Thus resistivity monitoring is a reasonable method to find out the leakage zone. However, resistivity is strongly influenced by seasonal variation of temperature, TDS of reservoir water and water level. In this paper. we first installed electrodes permanently at the center of the crest. The electrical resistivity monitoring data was acquired every 6 hours from Apr. 3, 2011 to July. 31, 2012. To analyze the characteristics of monitoring data, each resistivity data was calculated from up to 2,950 data sets. The result indicated a seasonal resistivity variation due to related temperature. Finally, a quantitative method to estimate porosities of the embankment dam from the resistivity monitoring data was analyzed. The applicability and reliability were verified and the importance of electrical resistivity monitoring for obtaining reliable result was emphasized.

Clinical impact of admission hypothermia in very low birth weight infants: results from Korean Neonatal Network

  • Lee, Na Hyun;Nam, Soo Kyung;Lee, Juyoung;Jun, Yong Hoon
    • Clinical and Experimental Pediatrics
    • /
    • v.62 no.10
    • /
    • pp.386-394
    • /
    • 2019
  • Background: Preterm infants have difficulty maintaining body temperature after birth. However, clinical guidelines advocate that neonatal body temperature should be maintained at 36.5℃-37.5℃. Purpose: We aimed to investigate the incidence of admission hypothermia in very low birth weight (VLBW) infants and to determine the association of admission temperature with in-hospital mortality and morbidities. Methods: A cohort study using prospectively collected data involving 70 neonatal intensive care units (NICUs) that participate in the Korean Neonatal Network. From registered infants born between January 2013 and December 2015, 5,343 VLBW infants born at less than 33 weeks of gestation were reviewed. Results: The mean admission temperature was 36.1℃±0.6℃, with a range of 31.9℃ to 38.4℃. Approximately 74.1% of infants had an admission hypothermia of <36.5℃. Lower birth weight, intubation in the delivery room and Apgar score <7 at 5 minutes were significantly related to admission hypothermia. The mortality was the lowest at 36.5℃-37.5℃ and adjusted odd ratios for all deaths increased to 1.38 (95% confidence interval [CI], 1.04-1.83), 1.44 (95% CI, 1.05-1.97) and 1.86 (95% CI, 1.22-2.82) for infants with admission temperatures of 36.0℃-36.4℃, 35.0℃-35.9℃, and <35.0℃, respectively. Admission hypothermia was also associated with high likelihoods of bronchopulmonary dysplasia, pulmonary hypertension, proven sepsis, pulmonary hemorrhage, air-leak, seizure, grade 3 or higher intraventricular hemorrhage and advanced retinopathy of prematurity requiring laser therapy. Conclusion: A large portion of preterm infants in Korea had hypothermia at NICU admission, which was associated with high mortality and several important morbidities. More aggressive interventions aimed at reducing hypothermia are required in this high-risk population.

A Methodology for the Establishment of CityGML Based 3D Drainage Facility Information Model for Runoff Analysis (강우우수 유출해석을 위한 CityGML 기반 3차원 도시 배수시설 정보모델 구축 방안)

  • Lee, Sang-Ho;Jang, Young-Hoon;Kim, Jong Myung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.77-86
    • /
    • 2016
  • In this study, we have created CityGML based 3D information model for drainage facility, manhole and terrain. It conducted analysis of the rainfall-runoff leak through the information model for obtaining interoperability for information integration between city models. The models have advantages to manage the infrastructure information in point of semantic meaning and geometric information by converting the original 2D GIS construction information into the 3D information model. The input values can be automatically generated through the 3D information model of this study, while the values should be entered manually in the conventional method. Also, it can be useful to check the flooding level and related locations by connecting the result of rainfall interpretation and information model.