• Title/Summary/Keyword: Information Security Strategy

Search Result 474, Processing Time 0.033 seconds

A Basic Study of iBUM Development based on BIM/GIS Standard Information for Construction of Spatial Database (공간자료 구축을 위한 BIM/GIS 표준정보 기반 건축도시통합모델(iBUM)의 개발에 관한 기초연구)

  • Ryu, Jung Rim;Choo, Seung Yeon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.27-41
    • /
    • 2014
  • Recently, BIM(Building Information Modeling) has been applied to the infrastructure such as road and bridge, and information about the outside environment of buildings is needed for maintaining and managing the large urban facilities. In addition, the convergence between spatial information and Big-data has a large potentiality, in respect that considerable profits and developments in other application problems such as various simulations and urban plans, national land security, may be brought about on the basis of the interoperability of information between BIM and GIS. Therefore, this study attempted to suggest the development direction of a model integrating building for spatial information analysis and city on the subject by comparing and analyzing difference between information system and shape expression of IFC, CityGML and LandXML to efficiently link information between IFC as a standard model of BIM and CityGML as a standard model in the GIS sector and to prepare a basic fusion strategy and a method of utilization between BIM and GIS. The result of the study are as follow. Firstly, contents and structure of IFC, CityGML and LandXML are compared and analyzed. Secondly, the development direction of iBUM(Integrated Building and Urban Model) suggested, which is based on convergence technology for analysis of space information. Finally, a strategy and method of the BIM and GIS are proposed in the iBUM environment.

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.

A Fast and Exact Verification of Inter-Domain Data Transfer based on PKI

  • Jung, Im-Y.;Eom, Hyeon-Sang;Yeom, Heon-Y.
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.61-72
    • /
    • 2011
  • Trust for the data created, processed and transferred on e-Science environments can be estimated with provenance. The information to form provenance, which says how the data was created and reached its current state, increases as data evolves. It is a heavy burden to trace and verify the massive provenance in order to trust data. On the other hand, it is another issue how to trust the verification of data with provenance. This paper proposes a fast and exact verification of inter-domain data transfer and data origin for e-Science environment based on PKI. The verification, which is called two-way verification, cuts down the tracking overhead of the data along the causality presented on Open Provenance Model with the domain specialty of e-Science environment supported by Grid Security Infrastructure (GSI). The proposed scheme is easy-applicable without an extra infrastructure, scalable irrespective of the number of provenance records, transparent and secure with cryptography as well as low-overhead.

The Ecosystem of the Smartphone Industry in Korea: Perspectives on Its Sustainable Growth (지속적 성장 관점에서 본 한국 스마트폰 산업 생태계)

  • Park, Jinsoo;Choi, Youngseok
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.25-43
    • /
    • 2013
  • The Korean Smartphone industry has advanced rapidly. There seems to have a considerable change in Korea smartphone industry as the security policy related to wireless devices is changed from Whitelist Policy to Blacklist Policy. In regard to such a change, this paper analyzes the smartphone market in terms of the Business Ecosystem Model suggested by Moore. This study examines how Korean Smartphone Ecosystem has been formed and how any shifts in policy will have an effect on the ecosystem. In line with this policy shift, this study also suggests the ways how these ecosystem members should establish a strategy for the continuous development of this smartphone ecosystem. Furthermore, this study presents cooperation directions among ecosystem members based on the organic connections in the ecosystem as well as each individual's corresponding measures. In addition, based on this analysis, this study puts forward Korean smartphone ecosystem's current problems, improvement, and its future.

  • PDF

m-Gov Strategy and Policy Challenges with ICT Ecosystem Changes (ICT 생태계 변화에 따른 m-Gov의 전략수립과 정책과제)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1531-1537
    • /
    • 2013
  • In its change in ICT Ecosystem, electronic government changes to its wireless m-Gov from existing PC-based e-Gov. Thus, in order to realize the smart government, m-Gov needs to be vitalized and the strategies for this realization are required. Also, some countermeasures for those strategies and political instructions which the electric government should follows are needed. Above two are the ultimate purpose in pursuing administrative ideals because the realization of m-Gov innovates the government and betters quality of national life off. Therefore, this paper, to realize the smart government, provides some strategies for vitalization of m-Gov's electric government services, their countermeasures, and political instructions for Smart m-Gov.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

An Efficient Application of eBSS DRM Method to eBook Contents based on ePub 3.0 for Smart Device

  • Jun, Eung Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.59-72
    • /
    • 2016
  • DRM(Digital Rights Management) is essential for the copy right protection of eBooks based on ePub 3.0 by IDPF. In this paper, we developed eBSS(eBook Service System) as ePub 3.0 builder and viewer system with DRM and proposed an efficient DRM method which improves the performance of contents generation, security and distribution system. The efficient application of DRM method to the eBook contents based on ePub 3.0 for smart phone is practically useful for eBook service system. It is very useful for the suggested eBSS with DRM method and strategy to apply easily and practically to the encryption and decryption of the eBook contents. Also, it is very efficient to generate the ePub 3.0 contents and to apply DRM method to it especially, by using practically this suggested ePub 3.0 builder system from the view point of the eBook content generation and its viewer such as eBook reader for user and eBook providers.

A Study of the stockpile and mobilization framework for the disaster management resources (재난관리자원 비축 및 동원 체계 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.376-384
    • /
    • 2015
  • It needs a framework to minimizing the damage using the just-time just-resources strategy. But it is not easy to put 'what kinds of resources', 'how many resources', 'from where institutions', and 'how much money for the reimbursement'. So most of the local government depends on the field manager. In this study, we analysed the conventional system and provides the efficient methodology to the stockpiling and mobilizing against to the disaster. The study does not provide the stockpile amount for the local governments, because the stockpile amounts must consider the local diverse situations.

Maritime Security and Korea's National Economy (한국의 해양안보와 국가경제)

  • Park, Eung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.717-722
    • /
    • 2009
  • 대한민국은 국가경제발전의 기반을 무역에 두고 있는 대외 지향적 통상(通商)국가이다. 현재 한국의 무역은 화물량 기준 거의 100%를 해운에 의존하고 있다. 한나라의 경제 특성을 나타내는 지표로서 '무역의존도'가 있는데 2007년도 한국의 무역의존도는 75.09%로서 일본의 30.15%의 약 2.5배, 중국의 67.07%에 비해 현저하게 높은 세계최고 수준이다. 이는 한국경제 나아가 한국의 안전과 발전이 절대적으로 해양을 통한 무역에 의존하고 있다는 의미로 이해할 수 있다. 대외무역에 국가의 사활을 걸고 있는 한국에서 국가해양활동의 안전이 확고하게 지켜지지 못해 무역에 차질이 발생한다면 이는 국가 경제 나아가 국가안보에 심대한 악 영향을 미칠 수밖에 없다. 반면 최근 소말리아 근해 해적의 피해확대로 한국은 주력 전투함을 파견하여 한국선박보호와 인근해역의 해양안전유지를 위해 국제적 해양안보활동에 참여하고 있다. 이는 한국의 국가경제활동이 전 세계로 확대됨에 따라 해양에서의 안전도 다방면에서 위협을 받고 있어 군함까지 파견해야 할 정도로 위협이 확대되고 있다는 방증이기도 하다. 이에 반해 한국에서는 해양안보에 대한 국민적 관심과 체계적인 대비책개발을 위한 노력이 아직은 미흡한 실정이다. 따라서 한국은 지금부터라도 국가적 차원에서 해양안보에 대한 관심과 대비책마련을 본격적으로 서둘러야 한다. 우선 한국은 해양안보위협을 북한으로 부터의 군사적 위협과 동일한 개념의 안보문제로 간주하여 대비해야 나가야 할 것이다. 또한 현재 정부 각 부처에 분산된 해양안보 관련 기능을 유기적으로 통합하여 수행할 수 있는 중심기구의 설치를 검토하여야 할 것이며, 국제적인 해양안보노력에도 적극적으로 참여함으로써 해양의 안전을 확고하게 유지하여 한국의 지속적인 국가번영을 보장하여야 한다.

  • PDF

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.