• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.028 seconds

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

Survey on Dumping and Analysing Techniques of Memory Contents in the Linux (Linux 상에서 메모리 덤프 데이터 분석 기술 조사)

  • Lee Gil-Ju;Kim Il-Hee;Heo Young;Park Yong-Su;Im Eul-Gyu
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.799-803
    • /
    • 2006
  • 리눅스 메모리 덤프데이터 분석기술은 메모리에 저장되는 데이터를 찾는데 목적이 있고, 현재 수행중인 프로그램이나, 리눅스 커널의 오류 발생 원인을 찾는데 이용이 된다. 이 논문에서는 리눅스 메모리 덤프 방법과 메모리 덤프 데이터 분석 기술에 대하여 기존의 방법들을 조사한 결과를 설명한다. 메모리 덤프데이터 분석기술은 메모리에 저장되는 기본적인 데이터를 조사를 할 수 있고, 수행중인 프로그램을 분석하고, 이미 만들어진 시스템을 역으로 추적하여 애초의 문서나 설계기법 등의 자료를 얻어낼 수 있다.

  • PDF

Multiple Wireless Networks based Control System for Unmanned Surveillance Robot (무인 경비 로봇을 위한 다중 무선 통신 기반 관제시스템)

  • Uhm, Taeyoung;Jung, Joon-Young;Cho, Sung-Hoon;Bae, Gi-Deok;Choi, Young-Ho
    • The Journal of Korea Robotics Society
    • /
    • v.15 no.4
    • /
    • pp.392-397
    • /
    • 2020
  • Unmanned robots are very useful for autonomous security systems. These robots navigate autonomously move in a large area for surveillance. It is very important for robots that cover such a wide area to communicate with a control systems. Therefore, the control system needs various communication methods to check the status of the robot and send/receive messages. In addition, it is necessary to provide an easy interface for the user to send security mission commands to the robot. In this paper, we propose a control system based on a variety of communication techniques to perform security by safely communicating with a number of robots in a wide area space. The proposed system designed for considering user UI, data storage and management, and shows usability by constructing it in a real environment.

Cooperative Beamformer Design for Improving Physical Layer Security in Multi-Hop Decode-and-Forward Relay Networks

  • Lee, Han-Byul;Lee, Jong-Ho;Kim, Seong-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.187-199
    • /
    • 2016
  • In this paper, we consider secure communications in multi-hop relaying systems, where multiple decode-and-forward (DF) relays are located at each individual hop and perform cooperative beamforming to improve physical layer security. In order to determine the cooperative relay beamformer at each hop, we propose an iterative beamformer update scheme using semidefinite relaxation and bisection techniques. Numerical results are presented to verify the secrecy rate performance of the proposed scheme.

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

Fire Image Processing Using OpenCV (OpenCV를 사용한 화재 영상 처리)

  • Kang, Suk Won;Lee, Soon Yi;Park, Ji Wong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.79-82
    • /
    • 2009
  • In this paper, we propose new image processing method to detect fire image. At captured image from camera, we using OpenCV library to implement various image processing techniques such like differential image, binarization image, contour extraction, remove noise(morphology open, close), pixel calculation, flickering extraction, etc.

  • PDF

Preparation and Holographic Recording of Fluorescent Photopolymer Films Containing Anthracene Polymer for Security

  • Park, Tea-Hoon;Kim, Yoon-Jung;Kim, Jeong-Hun;Kim, Eun-Kyoung
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.305-309
    • /
    • 2010
  • Photopolymer films containing fluorescent anthracene polymer, polymethyleneanthracene (PMAn), were prepared with different concentrations of PMAn for holographic recording useful for security documents. The fluorescent photopolymer film showed enhanced fluorescent intensity due to the micro-separation which arose from grating formation and diffusion during photopolymerization. Experimental values of diffraction efficiency were well matched to the simulated values for photopolymers having different PMAn concentrations. Holography patterning was carried out using the fluorescent photopolymer under a photo-mask. A grating was confirmed using microscope techniques in the recorded area under the pattern. Importantly the recorded area showed enhanced fluorescence compared to the unrecorded part, allowing fluorescence patterns at micro scale along with the submicron grating pattern. The fluorescence pattern recorded on the photopolymer film provides additional readability of holographic reading and thus is useful for secure recording and reading of information.

Standardization Activity of JTC1/SC27 for IT Security Techniques (JTC1/SC27의 정보통신 보호기술 표준화 현황)

  • 이용준;강신각;진병문;김영희
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.165-175
    • /
    • 1991
  • 정보통신 보호기술은 컴퓨터와 컴퓨터 통신망의 이용시에 발생할 수 있는 정보의 불법적인 사용 및 파괴를 방지하는 기술이다. 최근 컴퓨터범죄가 빈번하게 발생함에 따라 보안기술에 관한 관심 및 연구, 개발이 크게 증대되고 있으며 이에 따라 정보기술의 국제표준화 작업을 수행하는 ISO/IEC JTC1내에 정보기술 관련 보안기술 표준화를 담당하는 SC27을 새로이 발족하였다. 본 고에서는 SC27의 설립 배경, 설립 목적, 조직 구성. 표준화 분야, 주요 표준화 활동현황 등에 대해 최근에 개최되었던 세 차례의 SC27 총회결과를 중심으로 정보통신 보호기술 표준화에 대한 전반적인 현황을 살펴보았다.

  • PDF

A Study on Efficient Distributed Data Processing POS System of PKI Based (PKI 기반의 효율적인 분산처리 Point of sales 시스템에 관한 연구)

  • Kang Min-Gyun;Kim Seok-Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.200-204
    • /
    • 2005
  • POS system that become that is supply net administration and computerization fetters of customer management that become point in distribution network constructed database and use XML-Encryption that is certificate techniques of PKI and standard of security for security that is XML's shortcoming and design distributed processing POS system using XML for data integration by introduction of Ubiquitous concept. This POS system has four advantages. First, high portability Second, efficiency of data transmission. Third, improvement of data process speed. Fourth, security of data.

  • PDF

IPTV Contents Protection Technology (IPTV 방송 콘텐츠의 보호 기술)

  • Lee Wan-Bok;Roh Chang-Hyun;Woo Je-Hak
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.101-106
    • /
    • 2005
  • According to the IT839 strategy which was announced by the Ministry of Information and Communication(MIC) in 2004, the convergence trend of the broadcasting and the communication would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful IPTV service achievement. This paper describes the characteristics of IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a security model for IPTV, and speculate the most widespread, two security technologies for IPTV such as CAS and DRM.

  • PDF