• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.032 seconds

A Study on the Multiple Texture Rendering System for 3D Image Signal Recognition (3차원 영상인식을 위한 다중영상매핑 시스템에 대한 연구)

  • Kim, Sangjune;Park, Chunseok
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2016
  • Techniques to be developed in this study is intended to apply to an existing integrated control system to "A Study on the multiple Texture Rendering system for three-dimensional Image Signal Recognition" technology or become a center of the building control system in real time video. so, If the study plan multi-image mapping system developed, CCTV camera technology and network technology alone that is, will be a number of security do not have to build a linked system personnel provide services that control while the actual patrol, the other if necessary systems and linked to will develop a system that can reflect the intention Ranger.

Development of the Practical System for the Automated Damage Assessment (재해 피해조사 자동화를 위한 실용시스템 구축)

  • Jin, Kyeonghyeok;Kim, Youngbok;Choi, Woojung;Shim, Jaehyun
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.73-78
    • /
    • 2008
  • Recently, large scale natural disasters such as floods and typhoons due to climate change have been occurring all over the world causing severe damages. Among the various efforts to reduce and recover damages, recently, advanced information technology and remote sensing techniques are applied in disaster management. In this study, a real-time automated damage estimation system using information technology and spatial imagery was developed to accomplish prompt and accurate disaster damage estimation. This system is able to estimate the damage amounts of public facilities such as roads, rivers, bridges automatically through spatial imageries including ground based digital images, aerial photos, satellite images of disaster sites. Based on these spatial imageries, the damage amounts are analyzed in the Web-GIS based analysis system. Consequently, the digital damage reports such as digital disaster information sheets and damage maps can be made promptly and accurately. This system can be a useful tool to carry out prompt disaster damage estimation and efficient disaster recovery.

  • PDF

Monitoring of Landslide in Kangwondo Area using 2-Pass DInSAR Technique (2-Pass DInSAR 기술을 활용한 강원도 지역 산사태 탐측)

  • Yoo, Su Hong;Sohn, Hong Gyoo;Jung, Jae Hoon;Choi, Si Kyong
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.85-90
    • /
    • 2009
  • In recent days, climatic change cause abnormal weather all over the world and we have a great loss of life and property every year. In Korea, we suffer from landslide problem because large regions of Korea Peninsula are composed of mountain. In order to detect rapidly and to take follow-up measures of disaster, the remote sensing is being used actively as conventional field survey has many restrictions in accessibility because of more time and man power requirement. In additions interferometric SAR is one of the techniques that have our attention because it can provide many kinds of accurate surface information without restriction of atmospheric and ground conditions by using L-band. In this study, we aimed to monitor the displacement of mountain area in Kangwondo and this results will be used for detecting landslide. Also we build the web system for detecting and analyzing the landslide.

  • PDF

A Study for a Method of Designing of Security Domain Infrastructure and Its Efficiency Measuring (네트워크 보안 서비스 향상을 위한 도메인 구조설계와 성능분석 방법)

  • Moon, Song-Chul;Noh, Si-Choon;Jung, Ji-Moon
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.331-339
    • /
    • 2010
  • On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efficiency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

Development of Digital Watermarking Technology to Protect Cadastral Map Information

  • Kim, Jung-Yeop;Lee, Hyun-Joon;Hong, Sung-Eon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.57-65
    • /
    • 2010
  • This research aimed to prevent illegal distribution and reproduction of digital cadastral map information using digital watermarking. To this end, a digital watermarking was developed in consideration of the properties of cadastral maps and based on watermarking methods, after which its performance was evaluated. A watermark key and a one-way function was used to compensate for the algorithm and, therefore, watermarking security, based on the existing research results. In these ways, the present method meets the requirements for fidelity, robustness, false positive rate and the maintenance of consistent topology. The advanced techniques suggested in this paper were devised so as to be suitable for vector data such as GIS and navigation data as well as cadastral maps. Moreover, if the existing methodology is further improved, it could be expected to be used even more widely.

A Pipelined Design of the Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘의 파이프라인 하드웨어 설계)

  • 엄성용;이규원;박선화
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.149-159
    • /
    • 2003
  • The need for information security increases interests on cipher algorithms recently. Especially, a large volume of data transmission over high-band communication network requires faster encryption and decryption techniques for real-time processing. It would be a good solution for this problem that we implement the cipher algorithm in forms of hardware circuits. Though some previous researches use this approach, they focus only on repeatedly executing the core part of the algorithm to minimize the hardware chip size, while most cipher algorithms are inherently parallel. In this paper, we propose a new design for the SEED block cipher algorithm developed by KISA (Korea Information Security Agency) in 1998 as Korean standard cipher algorithm. It exploits the parallelism of the algorithm basically and implements it in a pipelined fashion. We described the design in VHDL program and performed functional simulations on the program, and then found that it worked correctly. In addition, we synthesized it and verified that it could be implemented in a single FPGA chip, implying that the new design can be Practically used for the actual hardware implementation of a high-speed and high-performance cipher system.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation (VMProtect 동작원리 분석 및 자동 역난독화 구현)

  • Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.605-616
    • /
    • 2020
  • Obfuscation technology delays the analysis of a program by modifying internal logic such as data structure and control flow while maintaining the program's functionality. However, the application of such obfuscation technology to malicious code frequently occurs to reduce the detection rate of malware in antivirus software. The obfuscation technology applied to protect software intellectual property is applied to the malicious code in reverse, which not only lowers the detection rate of the malicious code but also makes it difficult to analyze and thus makes it difficult to identify the functionality of the malicious code. The study of reverse obfuscation techniques that can be closely restored should also continue. This paper analyzes the characteristics of obfuscated code with the option of Pack the Output File and Import Protection among detailed obfuscation technologies provided by VMProtect 3.4.0, a popular tool among commercial obfuscation tools. We present a de-obfuscation algorithm.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.

Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity (SVM 기반 유전 알고리즘을 이용한 컴파일러 분석 프레임워크 : 특징 및 모델 선택 민감성)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.537-544
    • /
    • 2020
  • Advances in detection techniques, such as mutation and obfuscation, are being advanced with the development of malware technology. In the malware detection technology, unknown malware detection technology is important, and a method for Malware Authorship Attribution that detects an unknown malicious code by identifying the author through distributed malware is being studied. In this paper, we try to extract the compiler information affecting the binary-based author identification method and to investigate the sensitivity of feature selection, probability and non-probability models, and optimization to classification efficiency between studies. In the experiment, the feature selection method through information gain and the support vector machine, which is a non-probability model, showed high efficiency. Among the optimization studies, high classification accuracy was obtained through feature selection and model optimization through the proposed framework, and resulted in 48% feature reduction and 53 faster execution speed. Through this study, we can confirm the sensitivity of feature selection, model, and optimization methods to classification efficiency.