• Title/Summary/Keyword: Security Indicator

Search Result 119, Processing Time 0.025 seconds

Study on the Positioning Method using BLE for Location based AIoT Service (위치 기반 지능형 사물인터넷 서비스를 위한 BLE 측위 방법에 관한 연구)

  • Ho-Deok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • Smart City, a key application area of the AIoT (Artificial Intelligence of Things), provides various services in safety, security, and healthcare sectors through location tracking and location-based services. an IPS (Indoor Positioning System) is required to implement location-based services, and wireless communication technologies such as WiFi, UWB (Ultra-wideband), and BLE (Bluetooth Low Energy) are being applied. BLE, which enables data transmission and reception with low power consumption, can be applied to various IoT devices such as sensors and beacons at a low cost, making it one of the most suitable wireless communication technologies for indoor positioning. BLE utilizes the RSSI (Received Signal Strength Indicator) to estimate the distance, but due to the influence of multipath fading, which causes variations in signal strength, it results in an error of several meters. In this paper, we conducted research on a path loss model that can be applied to BLE IPS for proximity services, and confirmed that optimizing the free space propagation loss coefficient can reduce the distance error between the Tx and Rx devices.

Detecting Daily-Driven Game-Bot Based on Online Game Play Log Clustering (온라인 게임 로그 데이터 클러스터링 기반 일일 단위 게임봇 판별)

  • Kim, Joo Hwan;Choi, Jin-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1097-1104
    • /
    • 2021
  • Online game-bots are already known for a lot of persons by various ways. It leads to problems such as declining game player's interest, in-game financial crisis, etc. Detecting and restricting of game-bot is now essential. Because both publishers and players get disadvantages from their long term abnormal working. But it is not easy to restrict, because of false restriction risks. Game publishers need to distinguish game-bot from server-side game logs. At last, it should can make reasons for game-bot restriction. In this paper, we classified game-bot users by using daily separated game logs for testing data. For daily-driven detection, we separated total dataset into one day logs. Preliminary detects game-bots with one day logs, and determines total results by using these data. Daily driven detection advantages on detection which contains combined game playing style. Which shows like normal user and game-bot. These methodology shows better F1-score, which one of indicator which demonstrate classification accuracy. It increases from 0.898 to 0.945 by using Random Forest classifier.

Risk Assessment Improvement Method of Small Stream When Small Sized Hazard Infrastructures Survey (소규모 공공시설 조사시 세천의 위험도 평가 방안)

  • Jungsoo Rho;Kyewon Jun;Jaesung Shin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Recently, the damage caused by natural disasters such as typhoons and localized torrential rains has been increasing rapidly. The Ministry of the Interior and Safety enacted a 「law on safety management of small sized infrastructures」 and local governments have to register small sized infrastructures with the National Disaster and Safety Management System (NDMS) until March 31st every year. Recently, each local government has ordered Safety inspections of small sized infrastructures and maintenance plans and six types of facilities, including small streams, small bridges, farm roads, access roads to village, inlet weirs, and drop structures are being surveyed and digitized into a database. Each facility is being evaluated for risk, and for those deemed hazardous, maintenance plans are being developed. However, since the risk assessment method of small sized infrastructures is not clear so that is conducted through visual investigation by field investigators, risk assessment is conducted in a subjective and ambiguous form. Therefore, this study presented a reasonable and quantitative risk assessment method by providing a quantitative evaluation indicator for small stream, which has the highest disaster risk among other small sized infrastructures, so that small sized hazard infrastructures can be selected to secure transparent evidence for improvement plans and action plans.

Housing Need and Demand Assessment: Focused on Public Housing Development Projects (공공주택 사업지구의 수요평가모델 구축 연구)

  • Ji, Kyu-Hyun;Lee, So-Young;Kim, Yong-Soon
    • Land and Housing Review
    • /
    • v.5 no.4
    • /
    • pp.247-257
    • /
    • 2014
  • This study proposes a new housing need and demand assessment model centering on small-scale housing development projects and happy house development projects that reflected the recent changes in rental and small sized apartment centered public housing policies and development paradigms. The housing need and demand assessment model of public housing development projects consists of quantitative evaluation factors such as potential need indicator and demand pressure indicator and qualitative evaluation factors such as local condition indicator. The potential need indicators of small sized housing development projects are calculated by subtracting the stock of already-supplied constructed rental and purchased rental housings from the potential quantity of need drawn from the small regions such as -eup, -myeon, and -dong. In the potential need indicators of happy house development projects, the potential need is calculated from those who are expected to receive a happy house in the unit of -si, -gun, and -gu. In small-sized housing development projects, demand pressure indictors are the number and the proportion of those who opened a subscription deposit, the number of those who received basic livelihood security and the number of those who were patriots and veterans. The demand pressure indicators of the happy house development projects are stock ratio of small-sized houses, rate of rise in housing rent price, level of housing rent price, and rate of monthly rent house.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Countermeasure to the Stealth Sniff of the Private Media Information (개인 영상 및 음성 정보의 임의수집에 대한 대응방안)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.378-385
    • /
    • 2011
  • This paper introduces technical aspects of the privacy exposure problem of the video and the audio information on the personal computer and proposes a countermeasure to them. According to the increased number of peripherals for computers, especially including the cameras and the mikes, it is required to be careful on the privacy exposure. Currently, some incorporated or standalone cameras have a pilot lamp to indicate their usage. However, many other cameras and all mikes have not equipped with the pilot lamp or other dedicated indicator. Even though this problem doesn't obstruct their assigned functionalities, it should make the devices susceptible to be exposed with the information they are gathering without any notice to the owners. As a countermeasure to the problem, this paper proposes a reasonable solution that alarms the access trials to the devices and implements programs for the practical sniffing and its counterpart.

Study on design indicator for wood structure of forest engineering works in Japan(2) - Focus on the design and construction - (일본에 있어서 산림토목 목제구조물 설계지침에 관한 연구(2) - 설계 및 시공을 중심으로 -)

  • Kim, Min-Sik;Chun, Kun-Woo;Lee, Jin-Ho;Ezaki, Tuzio
    • Journal of Forest and Environmental Science
    • /
    • v.22 no.1
    • /
    • pp.50-57
    • /
    • 2006
  • The design instruction put in the wood structure construction manual of forest engineering works issued in Japan in 2004 is composed of the introduction, the use and characteristic of wood, investigation, planning, design, and etc. We analyzed planing and construction. By the results, the contents for the design are shown about applied woody conditions and deterioration, structure, selection of tree, the standardization of the size displays in wood, safety and examination of intensity, intensity of wood, the ranges of wood size allowance, and etc. With respect to the construction of wood structure, there are detailed descriptions regarding security of wood quality, confirmation of wood quality by preservative treatment and security methods of function in wood structure, the regular investigation method, the qualitative standard criterion and the quantitative examination method on the deterioration of wood.

  • PDF

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

Strategic Business Process Based on Business Intelligence by Connected with BPM & 6 Sigma (BPM과 6 Sigma 연계에 의한 BI기반의 전략적 비즈니스 프로세스)

  • Park, Sang-Min;Nam, Ho-Ki;Shin, Seung-Ho;Kim, Qui-Nam
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.27-37
    • /
    • 2007
  • Companies have to take agility against change of environment and build up the capacity of new value creation in today's management environment. Until now, there are so many management method for efficiency of management, rationality of management and IT (information technology) supported this method by integration of enterprise task and process automation. but company's competitiveness through the efficiency of management realized the limitations recently. so companies needs the new management method to raise core value of enterprise. This study applies strategy intelligence which is some part of Business Intelligence. We can identify the core value driver by using this method. and the core value driver is connected the KPI (key performance indicator) of processes in BPM (Business Process Management). This help the management of process focused on value driver. and some part of activity driver that effect the process performance can be use the Six Sigma method to strategic business process. This study first introduces the concept of Business Intelligence, Business Process Management and Six Sigma. and then efficient connection plan for value based strategic business process is introduces.

  • PDF