• 제목/요약/키워드: Non-traditional security

검색결과 61건 처리시간 0.021초

사이버 위협의 안보화 동향에 대한 이론적 배경과 비판적 논의 (Theoretical Background and Critical Discussion about Securitzation Trend of Cyber Threat)

  • 이광호;이승규;김호길
    • 융합보안논문지
    • /
    • 제19권5호
    • /
    • pp.99-105
    • /
    • 2019
  • 본 연구에서는 사이버 위협이 사회적으로 담론화 과정을 통해 안보화 되는 이론적 배경과 주요 동향을 제시하였다. 특히 사이버 위협의 안보화에 대한 비판적 논의을 코펜하겐학파의 안보화 이론을 바탕으로 설명하였다. 또한 사이버 위협의 안보화 과정을 설명한 비전통적 위협의 안보화와 신흥안보이슈의 안보화를 기존 연구를 바탕으로 제시하였으며 이에 대한 한계점을 설명하였다. 또한 현재 나타나고 있는 사이버 위협의 군사화 현상이 기술담론과 군사담론의 결합을 통해 나타나는 현상임과 이에 대한 경계적 시각을 제시하고자 하였다. 본 연구를 통해 사이버 위협의 안보화 과정에 대한 객관적 통찰력을 바탕으로 보편적 해법 제시의 한계와 함께 군사화의 경계적 시각을 우리군에 제시하고자 한다.

전통의약분야의 지적 재산권 보호를 위한 대상 발굴 및 법적.제도적 보장 방안 연구 (A research on the selection of subject and its legal and institutional guarantee concerning protection of the intellectual property of traditional medicine)

  • 김홍준;이상정;주영승
    • 한국한의학연구원논문집
    • /
    • 제8권2호통권9호
    • /
    • pp.47-65
    • /
    • 2002
  • This project is planned to grasp the present situation of traditional medicine part in our country and to study protection method about this by the intellectual property which is the international concerning point recently. Through this, we will be able to devise means to deal with protection method of traditional medicine being developed by WIPO now. Traditional medicine field In our country Is organized with specific condition separated into the part of institution and the part of non-institution. So, because of the closed peculiarity, we have experienced the difficulties to understand the real facts about traditional medicine. We cannot be indifferent to the matter anymore. Because the expectation of object people is high, we could expect the realization of research content. In 1 detail project, we investigated the situation of traditional medicine in our country through various collecting methods for excavation of oriental treatment technique and herb medicine which is worth protecting. With it, we sorted again into 56 kinds of 11 parts through analysis of validity in the way of oriental medicine. And we tried to link this up 2 detail project which is about legal and institutional guarantee concerning protection. furthermore, we tried to find approach ways for security of objectivity into 4 steps with the example of model disease. we could complete practical classification of traditional medicine in our country. In 2 detail project, we studied the protection method by the intellectual property through research result in 1 detail project. For this, we observed an outline of the intellectual property including a patent application analysis in folk traditional medicine part, and problems of traditional medicine protection and world trend by traditional knowledge protection tendency and the patent law In domestic traditional medicines, the aspects unprotectable with the patent law now were remained. So, we suggested supplementary plan. And we also suggested the freedom of utilization between traditional medicine possession countries (in-situ utilization) and the demand compensation payment for a third country (ex-situ utilization) in connection with international movement.

  • PDF

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Framework of Non-Nuclear Methods Evaluation for Soil QC and QA in Highway Pavement Construction

  • Cho, Yong-K.;Kabassi, Koudous;Wang, Chao
    • Journal of Construction Engineering and Project Management
    • /
    • 제2권2호
    • /
    • pp.45-52
    • /
    • 2012
  • This study introduces a methodology to evaluate different types of non-nuclear technologies to see how they are competitive to the nuclear technology for quality control (QC) and quality assurance (QA) in soil condition measurement for highway pavement construction. The non-nuclear methods including the Electrical Density Gauge (EDG) and the Light Weight Deflectometer (LWD) were tested for their performance against a nuclear gauge, and traditional methods were used as baselines. An innovative way of comparing a deflection gauge to a density gauge was introduced. Results showed that the nuclear gauge generally outperformed the non-nuclear gauge in accuracies of soil density and moisture content measurements. Finally, a framework was developed as a guideline for evaluating various types of non-nuclear soil gauges. From other perspectives rather than accuracy, it was concluded that the non-nuclear gauges would be better alternative to the nuclear gauge when the followings are considered: (1) greater life-cycle cost savings; (2) elimination of intense federal regulations and safety/security concerns; and (3) elimination of licensing and intense training.

A rerouting-controlled ISL handover protocol for LEO satellite networks

  • Dong, Wei;Wang, Junfeng;Huang, Minhuan;Tang, Jian;Zhou, Hongxia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2620-2631
    • /
    • 2012
  • In this paper, a rerouting-controlled ISL (Inter-Satellite link) handover protocol for LEO satellite networks (RCIHP) is proposed. Through topological dynamics and periodic characterization of LEO satellite constellation, the protocol firstly derives the ISL related information such as the moments of ISL handovers and the intervals during which ISLs are closed and cannot be used to forward packet. The information, combined with satellite link load status, is then been utilized during packet forwarding process. The protocol makes a forwarding decision on a per packet basis and only routes packets to living and non-congested satellite links. Thus RCIHP avoids periodic rerouting that occurs in traditional routing protocols and makes it totally unnecessary. Simulation studies show that RCIHP has a good performance in terms of packet dropped possibility and end-to-end delay.

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

국제 환경안보와 동북아 국가들의 한계 (International Environmental Security and limitations of North-East Asian Countries)

  • 최병두
    • 대한지리학회지
    • /
    • 제39권6호
    • /
    • pp.933-954
    • /
    • 2004
  • 본 논문은 국제환경안보의 개념적 발달과정을 비판적으로 고찰하고, 이에 기초하여 동북아 지역에서 환경거버넌스의 구축을 어렵게 하는 몇 가지 주요한 한계들을 지적하고자 한다. 국제 환경안보의 개념은 전통적 의미 또는 현실주의적 의미의 안보 개념에서 나아가 신자유주의적 환경안보와 정치경제적 환경안보의 개념으로 발전하게 되었으며, 이러한 환경안보의 개념과 관련하여 환경레짐과 환경거버넌스의 개념이 비판적으로 검토되었다. 진정한 환경거버넌스를 (이론 및 현실에서) 구축하기 위하여 환경문제를 유발하는 정치경제적 배경에 관한 분석과 더불어 시민사회의 성숙이 필요하다는 점이 강조된다. 동북아 지역의 환경안보에 있어 한계점으로 경제적 분업구조. 정치군사적 대립관계 그리고 시민 의식의 미성숙과 상호배타성 등이 지적될 수 있다. 동북아 지역의 진정한 환경안보를 위하여, 호혜적 경제협력체계의 구축, 정치적 신뢰 및 국가간 연계기구의 설립, 비정부기구의 교류 증대 등이 요청되고 있다.

Development of a Non-contact Input System Based on User's Gaze-Tracking and Analysis of Input Factors

  • Jiyoung LIM;Seonjae LEE;Junbeom KIM;Yunseo KIM;Hae-Duck Joshua JEONG
    • 한국인공지능학회지
    • /
    • 제11권1호
    • /
    • pp.9-15
    • /
    • 2023
  • As mobile devices such as smartphones, tablets, and kiosks become increasingly prevalent, there is growing interest in developing alternative input systems in addition to traditional tools such as keyboards and mouses. Many people use their own bodies as a pointer to enter simple information on a mobile device. However, methods using the body have limitations due to psychological factors that make the contact method unstable, especially during a pandemic, and the risk of shoulder surfing attacks. To overcome these limitations, we propose a simple information input system that utilizes gaze-tracking technology to input passwords and control web surfing using only non-contact gaze. Our proposed system is designed to recognize information input when the user stares at a specific location on the screen in real-time, using intelligent gaze-tracking technology. We present an analysis of the relationship between the gaze input box, gaze time, and average input time, and report experimental results on the effects of varying the size of the gaze input box and gaze time required to achieve 100% accuracy in inputting information. Through this paper, we demonstrate the effectiveness of our system in mitigating the challenges of contact-based input methods, and providing a non-contact alternative that is both secure and convenient.

핀테크 기업의 정보보안체계 관한 연구 (A Study on the Information Security System of Fin-Tech Business)

  • 강영모;이영근;권현정;한경석;정현수
    • 중소기업융합학회논문지
    • /
    • 제6권2호
    • /
    • pp.19-24
    • /
    • 2016
  • 전통적인 전자상거래방식에서는 정보를 교환할 경우 종이서류에 의한 방법이나 폐쇄형 EDI에 의한 정보교환으로 심각한 문제점은 없었다. 점차 인터넷의 발달로 전자상거래의 규모는 더 커지고 온라인 전자상거래로 변화면서 신원확인, 정보의 변조, 당사자 간의 부인 방지 등 많은 문제점이 발생하였다. 이런 문제점으로 인행 분쟁을 예방하고 사후처리를 위해 전자상거래의 모든 단계에서는 보안 기술을 활용하고 이를 관리하는 인증이 개입하고 있다. 하지만 최근의 모바일 지급결제 서비스 중심으로 핀테크 열풍이 거세게 불고 있다. 카드사 정보유출 사고 및 해킹 등으로 금융서비스의 안정성 확보에 부족하다. 핀테크 산업의 발전과 진화는 정보보호와 동반 성장해야 한다. 따라서 해외의 유명 핀테크 기업의 정보보안체계를 살펴보고 국내 핀테크 기업이 나야가야 할 방향을 제시하고자 한다.