• Title/Summary/Keyword: Intrusion Prevention

Search Result 144, Processing Time 0.028 seconds

The Design of SIP-Aware Intrusion prevention System (SIP-Aware 침입방지 시스템 설계)

  • Kim, Jeong-Wook;Kim, Hwan-Kuk;Ko, KyoungHee;Lee, Chang-Yong;Ha, DoYoon;Jeong, HyunCheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.655-656
    • /
    • 2009
  • 인터넷전화는 저렴한 가격과 다양한 서비스를 장점과 번호이동과 같은 정부 정책에 힘입어 급속한 성장을 이루고있다. SIP는 VoIP의 시그널링 프로토콜로서 다양한 부가서비스 제공을 위해 기존의 H.323을 대체하고 있을뿐만 아니라, IMS의 시그널링 제어 프로토콜로 채택되어 향후 SIP기반 응용서비스의 급속한 성장이 예상된다. 하지만 SIP기반 응용서비스는 기존의 IP 망에서 발생되는 보안 위협뿐만 아니라 SIP 특성에 기인한 신규 위협에 의한 피해 사례가 발생하고 있음에도 불구하고, 현재 보안 시스템으로는 이러한 위협에 효과적으로 대응하지 못하고 있다. 본 논문에서는 SIP기반 네트워크 보안 위협에 대해서 설명하고, 이러한 공격을 탐지 및 대응할 수 있는 SIP-Aware 침입방지시스템 설계 및 구조도를 설명한다.

Real-time Abnormal Behavior Analysis System Based on Pedestrian Detection and Tracking (보행자의 검출 및 추적을 기반으로 한 실시간 이상행위 분석 시스템)

  • Kim, Dohun;Park, Sanghyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.25-27
    • /
    • 2021
  • With the recent development of deep learning technology, computer vision-based AI technologies have been studied to analyze the abnormal behavior of objects in image information acquired through CCTV cameras. There are many cases where surveillance cameras are installed in dangerous areas or security areas for crime prevention and surveillance. For this reason, companies are conducting studies to determine major situations such as intrusion, roaming, falls, and assault in the surveillance camera environment. In this paper, we propose a real-time abnormal behavior analysis algorithm using object detection and tracking method.

  • PDF

A Study on the Improvement of Life Safety Code for Logistics Warehouse Facilities (물류창고 시설의 인명안전기준 개선 방안에 관한 연구)

  • Kim, Yun-Seong;Jin, Seung-Hyeon;Lee, Byeong-Heun;Kwon, Yeong-Jin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.05a
    • /
    • pp.98-99
    • /
    • 2021
  • The number of fires in the Korean distribution warehouse increased by about 350 from 1,070 in 2014 to 1,416 in 2020. In addition, the fire load increases with the scale of the distribution warehouse, and even if the automatic sprinkler operates, there is a limit to the direct intrusion of the water source into the ignition source, and the detector is often installed on a high ceiling. The sensing time is often delayed. In order to improve the fire safety of such distribution warehouses, the US NFPA stipulates in detail the contents related to the facility, such as sprinkler water discharge standards, rack-type warehouse installation height restrictions, and regulations on collection and equipment. However, in Japan, the goods loaded inside the distribution warehouse are not classified in detail, and it is considered that the fire safety for the distribution warehouse is low due to the relaxation regulations of the fire prevention section. Therefore, in this study, common problems are classified into material, spatial, and safety management characteristics through the cases of distribution warehouse fires that occurred in Korea and abroad, and the problems related to distribution warehouses in Korea and abroad are compared and analyzed. And present basic materials for improving the life safety standards of future distribution warehouse facilities.

  • PDF

Characteristics of Intrusion MO and Perception of Target Hardening of Burglars (침입절도범 재소자의 수법 특성과 타겟하드닝 관련 인식)

  • Park, Hyeonho;Kim, Kang-Il;Kim, Hyo-gun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.33-61
    • /
    • 2019
  • It is quite difficult to actually prove the effectiveness of so-called target-hardening, one of the various strategies used to reduce crime, one of the serious problems in society recently. In particular, three to five minutes is often used as golden time for intruders to give up or stop, which is based on foreign and some indirect research cases in Korea, but there were no studies that more directly identified the average break-in operation time or the abandonment time based on the elapsed time when the shield hardware resists intruders. This study was the first of its kind in Korea to investigate and verify samples of 90 inmates of break-in burglars who were imprisoned in August 2018 by profiling the average criminal experience, education level, age, height and weight of typical Korean professional break-in thieves, and specific criminal methods, average break-in operation time, and the criteria for giving up if not breached. According to the analysis results, in the survey on the number of pre-invasion theft crimes by intruders, many of the respondents who participated in the survey were criminals of professional invasions, and by their physical characteristics, there was not much difference from ordinary adult men. Residential facilities were the highest in the world, followed by commercial and educational facilities. According to the survey on the types of facilities that committed intrusion into residential facilities, it was not safe to say that single-family housing accounted for the largest portion of single-family housing, multi-family housing, apartment high-rise (more than three stories), and apartment low-rise (more than one to three stories) among residential facilities, and that the ratio of apartment high-rise was higher than expected. Based on the average time required to break into a place for an intrusion crime, it is assumed that the psychological time worked in a place where the break-in was difficult, since the break-in was not performed while measuring the time of the break-in operation. In the case of time to give up a crime, more than half of the respondents said they would give up the crime even in less than four minutes, suggesting that a significant number of intrusive crimes can be prevented even if the facility has four minutes of intrusion resistance. This proves that most intruders will give up the break-in if the break-in resistance performance of the security facility is exercised for more than five minutes.

Estimation of Instream Flow in Han River (한강에서의 하천유지유량 산정)

  • 오규창;정상만
    • Water for future
    • /
    • v.24 no.1
    • /
    • pp.119-128
    • /
    • 1991
  • This study was focused on establishing the concepts of the instream flow to prevent the problems for the conceptual ambiguity and the difference in the instream flow estimation methods. The average drought flow is defined as the flow required to guarantee the minimum function of the river such as prevention of drying. The environmental control flow is defined as the flow required to control optimal river environment, the flow required for navigation, prevention of sea water-intrusion, protection of river management facilities, conservation of water Quality, fishing, prevention of river mouth closure, control of groundwater level, protection of animals and plants, and landscape. The average drought flow was obtained by flow duration analysis for the natural flows in the Han River at Indo-Bridge gaging station. When considering the 9 factors related to environment conservation, the conservation of water quality was proved to be most important. The pollutants for the river flows were estimated and the water qualities were forecasted. After comparing the water qualities in the future and water quality standards, there quired optimal dilution flow was estimated. The average drought flow and environmental control flow are all non-consumptive flows. Therefore larger flow between them, i.e., Max. (average drought flow, environmental control flow) can be the instream flow. The river management flow can be added to the flows for water utilization in the downstream. The results from this study are expected to be very helpful in the systematic river management on the other main rivers in Korea.

  • PDF

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

Enhancement of Sampling Based DDoS Detecting System for SDN (소프트웨어 정의 네트워크를 위한 샘플링 기반 서비스거부공격 탐지 시스템 개선)

  • Nguyen, Sinhngoc;Choi, Jintae;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.315-318
    • /
    • 2017
  • Nowadays, Distributed Denial of Service (DDoS) attacks have gained increasing popularity and have been a major factor in a number of massive cyber-attacks. It could easily exhaust the computing and communicating resources of a victim within a short period of time. Therefore, we have to find the method to detect and prevent the DDoS attack. Recently, there have been some researches that provide the methods to resolve above problem, but it still gets some limitations such as low performance of detecting and preventing, scope of method, most of them just use on cloud server instead of network, and the reliability in the network. In this paper, we propose solutions for (1) handling multiple DDoS attacks from multiple IP address and (2) handling the suspicious attacks in the network. For the first solution, we assume that there are multiple attacks from many sources at a times, it should be handled to avoid the conflict when we setup the preventing rule to switches. In the other, there are many attacks traffic with the low volume and same destination address. Although the traffic at each node is not much, the traffic at the destination is much more. So it is hard to detect that suspicious traffic with the sampling based method at each node, our method reroute the traffic to another server and make the analysis to check it deeply.

Design of Memory-Efficient Deterministic Finite Automata by Merging States With The Same Input Character (동일한 입력 문자를 가지는 상태의 병합을 통한 메모리 효율적인 결정적 유한 오토마타 구현)

  • Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.395-404
    • /
    • 2013
  • A pattern matching algorithm plays an important role in traffic identification and classification based on predefined patterns for intrusion detection and prevention. As attacks become prevalent and complex, current patterns are written using regular expressions, called regexes, which are expressed into the deterministic finite automata(DFA) due to the guaranteed worst-case performance in pattern matching process. Currently, because of the increased complexity of regex patterns and their large number, memory-efficient DFA from states reduction have become the mainstay of pattern matching process. However, most of the previous works have focused on reducing only the number of states on a single automaton, and thus there still exists a state blowup problem under the large number of patterns. To solve the above problem, we propose a new state compression algorithm that merges states on multiple automata. We show that by merging states with the same input character on multiple automata, the proposed algorithm can lead to a significant reduction of the number of states in the original DFA by as much as 40.0% on average.

Fabrication and Characterization of Porous PLLA Scaffolds with Gentamicin Sulfate Release System (겐타마이신 설페이트를 서방화한 다공성 PLLA 지지체의 제조와 물성평가)

  • 최명규;강길선;이일우;이종문;이해방
    • Polymer(Korea)
    • /
    • v.25 no.3
    • /
    • pp.318-326
    • /
    • 2001
  • PLLA scaffold loaded with gentamicin sulfate (GS) was prepared by emulsion freeze-drying method for the prevention of infection and the improvement of wettability. i.e., the cell- and tissue-compatibility. GS-loaded PLLA scaffolds were characterized by scanning electron microscopy (SEM), mercury porosimetry and blue dye intrusion, and the GS release pattern was analyzed by high performance liquid chromatography (HPLC). GS-loaded PLLA scaffolds with porosity above 50%, medium pore size ranging from 30 to 57 ${\mu}{\textrm}{m}$ (with larger pore diameters greater than 150 ${\mu}{\textrm}{m}$), and specific pore area in the range of 35 to 75($m^2$ /g )were manufactured by varying processing parameter as GS concentration. It was observed that GS-loaded PLLA scaffolds were highly porous with good interconnections between pores for allowing cell adhesion and growth. These scaffolds may be applicable for scaffold as structures that facilitate either tissue regeneration or repair during reconstructive operations.

  • PDF

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).