• Title/Summary/Keyword: Secure Log

Search Result 50, Processing Time 0.028 seconds

Association between coarse woody debris and small mammals and insectivores in managed forests

  • Lee, Sang-Don
    • Journal of Ecology and Environment
    • /
    • v.35 no.3
    • /
    • pp.189-194
    • /
    • 2012
  • Coarse woody debris (CWD) is generally considered dead woody material in various stages of forest decomposition and has been hypothesized to be an important habitat feature for mammals in forests of the Pacific Northwest, USA. Sherman and pitfall trapping were conducted for 2 years on three paired sites with low and high amounts of CWD. Deer mice was the dominant species with a total capture of 605 (45.6%). Four species of insectivores were captured, including Sorex moncicolus, S. trowbridgii, S. vagrans, and Neurotrichus gibbsii. A Poisson regression model was used to test whether 11 CWD variables could predict insectivore captures. The volume of logs and mean decay were important variables for deer mice use of CWD. Mean distance from pieces of CWD to the capture point was significantly related to the total number of captures of trowbridge shrew (Sorex trowbridgii) and all insectivore species. Vagrant shrews (Sorex vagrans) were significantly associated with log volume. Retaining large size CWD should be part of a management plan for ground-dwelling insectivores in forests to secure their biodiversity.

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Secure Group Communications Using Subset Difference (부분 집합 차를 이용한 안전한 그룹 통신)

  • 김희열;이윤호;정병천;이재원;윤현수;조정완
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.254-256
    • /
    • 2003
  • 그룹 통신을 이용한 어플리케이션이 증가함에 따라 안전하면서도 효율적인 그룹 통신에 관한 요구가 높아지고 있다. 이를 위해서는 안전한 데이터 통신, 그룹 멤버 관리, 그리고 확장성이 요구되며. 특히 빈번한 멤버의 가입/탈퇴시에 효율적으로 키를 갱신하는 수단이 필요하다. 제안된 시스템에서는 대칭키 암호화 알고리즘을 통해 안전성을 획득하며, 부분집합 차를 이용해서 키갱신을 수행하기 때문에 요구되는 메시지의 횟수를 감소시켰다. 기존 방법에서는 키 갱신을 위해 O(log n)번의 멀티캐스트가 요구되었지만, 제안된 시스템에서는 오직 한 번의 멀티캐스트만이 요구된다. 또한 제안된 시스템은 큰 정수의 인수분해 문제의 어려움에 기반하기 때문에, 안전성을 보장받을 수 있다.

  • PDF

Design On Secure Messenger Mechanism Using Elliptic Curve Cryptography and IPSec

  • Choi Gwang-Mi;Park Su-Young;Kim Hyeong-Gyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.3
    • /
    • pp.182-186
    • /
    • 2004
  • When most of existing instant messengers log on server, they transmit to sever in encoding password to RC5. but RC5 don't be secured because it has been known many of password cracking tools. Also, messengers don't have any protection on the transmitted information with communicating two hosts since loging on, endangering the privacy of the user. As a counter measure, messengers need to provide security service including message encryption. In this paper, we designed a key exchange method of password representing fast, effective and high security degree, using ECC(Elliptic Curve Cryptography) that being known the very stronger than another public key cryptography with same key size. To effectively improve data transmission and its security using IPSec protocol between users, tunnel mode is introduced. Tunnel mode transmits Host-to-Host data through virtual pipelines on the Internet.

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.

Microbiological Safety Assessment to Secure Safety of Food Service in University (대학 내 급식소의 안전성 확보를 위한 미생물학적 안전성 평가)

  • Kim, Kyeong-Yeol;Nam, Min-Ji;Nam, Bo-Ram;Ryu, Hee-Jung;Heo, Rok-Won;Shim, Won-Bo;Chung, Duck-Hwa
    • Journal of Food Hygiene and Safety
    • /
    • v.25 no.1
    • /
    • pp.49-58
    • /
    • 2010
  • The objectives of this study were to investigate the microbial contamination levels on food service in university and to provide the information of microbial contamination to improve food safety. A total of 288 samples were collected during summer and winter season between 2006 and 2008 from 4 food services located in the university in Western Gyeongnam and were used to detect sanitary indicator bacteria [aerobic plate count (APC), coliform, and Escherichia coli] and pathogenic bacteria (Staphylococcus aureus, Salmonella spp.). As a result, APC and coliform for hand and kitchen utensils which are used often by the employee were detected at high levels of 1.1~5.5 and 1.3~5.3 log CFU/($100\;cm^2$, hand), respectively. The contamination levels of APC and coliform in cooked foods and drinking water were 0.8~6.4 and 1.3~5.0 log CFU/(g, mL), respectively. Especially, the cooked foods showed the highest contamination for APC (2.1~6.4 log CFU/g) and coliform (1.0~5.0 log CFU/g). We think the reason that the cooked foods may be contaminated with APC and coliform on cooking process by using employee's hand and kitchen utensils. Moreover, S. aureus for hand and kitchen utensils was detected at levels of 2.8~3.0 and 2.0~2.3 log CFU/(g, hand), but Salmonella spp. was not detected. According to the above results, contamination levels of the samples were mostly decreased irrespective of summer and winter season. The results obtained indicated that it is necessary to periodic monitoring for microorganism contamination and education about personal and environmental hygiene to employee for ensuring food safety of food service in university.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

Microbiological Characterization and Chlorine Treatment of Buckwheat Sprouts (메밀 새싹채소의 주요 내재미생물 분석 및 염소처리에 따른 품질변화)

  • Lee, Hyun-Hee;Hong, Seok-In;Kim, Dong-Man
    • Korean Journal of Food Science and Technology
    • /
    • v.41 no.4
    • /
    • pp.452-457
    • /
    • 2009
  • In order to secure microbiological safety and quality of commercial vegetable sprouts, buckwheat seeds and sprouts were investigated for their microbiological flora and for the effect of chlorine treatment on quality. Microbiological analyses showed that major inherent bacteria including Enterobacter, Sphingomonas, and Klebsiella were found in commercial buckwheat sprouts with a population size ranging from $10^5$ to $10^7$ CFU/g. In addition, buckwheat seeds had a similar microbial flora to sprouts. Foodborne pathogenic bacteria such as Escherichia coli O157:H7, Staphylococcus aureus, Salmonella Typhimurium, and Listeria monocytogenes were not detected in the sprout or in the seed samples. Chlorine treatment with 50-150 ppm sodium hypochlorite noticeably reduced viable bacteria cell counts of the sprouts by about 1 log. However, no significant difference was observed among the different chlorine concentrations. After storage for 7 days at $5^{\circ}C$, the sprouts treated with 100-150 ppm chlorine showed higher sensory scores in visual quality than the others (p<0.05). The results indicated that proper pretreatment, such as dipping in chlorinated water, could confer a beneficial effect on the microbiological safety and visual quality of buckwheat sprouts.

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.