• Title/Summary/Keyword: Security plan

Search Result 979, Processing Time 0.02 seconds

A Study on the Estimation of the Design Flood for Small Catchment in Jirisan (지리산 소하천유역의 홍수량 산정에 대한 고찰)

  • Chang, Hyung Joon;Kim, Seong Goo;Yoon, Young Ho;Kim, Min Ho
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.23-29
    • /
    • 2022
  • The frequency of localized heavy rain is increasing due to the influence of abnormal climate that is rapidly increasing in recent years. As a result, the difficulty of safe water resource management is increasing and human and material damage is increasing. Various countermeasures are being established to reduce the damage caused by localized heavy rain, but small-scale mountain catchments are experiencing many difficulties due to the lack of a basic plan. Therefore in this study the risk of flooding was evaluated using the rainfall-runoff model in the Yu-pyeong catchment national park among national parks in Korea. As a result of the analysis, it was simulated that flooding occurred in the Yu-pyeong catchment of Mt. Jirisan when rainfall with a recurrence frequency of 50 years or more occurred, and it was confirmed that there was a high risk of structures, safety facilities and trails.

Deep Learning-Based Neural Distinguisher for PIPO 64/128 (PIPO 64/128에 대한 딥러닝 기반의 신경망 구별자)

  • Hyun-Ji Kim;Kyung-Bae Jang;Se-jin Lim;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.175-182
    • /
    • 2023
  • Differential cryptanalysis is one of the analysis techniques for block ciphers, and uses the property that the output difference with respect to the input difference exists with a high probability. If random data and differential data can be distinguished, data complexity for differential cryptanalysis can be reduced. For this, many studies on deep learning-based neural distinguisher have been conducted. In this paper, a deep learning-based neural distinguisher for PIPO 64/128 is proposed. As a result of experiments with various input differences, the 3-round neural distinguisher for the differential characteristics for 0, 1, 3, and 5-rounds achieved accuracies of 0.71, 0.64, 0.62, and 0.64, respectively. This work allows distinguishing attacks for up to 8 rounds when used with the classical distinguisher. Therefore, scalability was achieved by finding a distinguisher that could handle the differential of each round. To improve performance, we plan to apply various neural network structures to construct an optimal neural network, and implement a neural distinguisher that can use related key differential or process multiple input differences simultaneously.

Performance Comparison of Autoencoder based OFDM Communication System with Wi-Fi

  • Shiho Oshiro;Takao Toma;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.172-178
    • /
    • 2023
  • In this paper, performance of autoencoder based OFDM communication systems is compared with IEEE 802.11a Wireless Lan System (Wi-Fi). The proposed autoencoder based OFDM system is composed of the following steps. First, one sub-carrier's transmitter - channel - receiver system is created by autoencoder. Then learning process of the one sub-carrier autoencoder generates constellation map. Secondly, using the plural sub-carrier autoencoder systems, parallel bundle is configured with inserting IFFT and FFT before and after the channel to configure OFDM system. Finally, the receiver part of the OFDM communication system was updated by re-learning process for adapting channel condition such as multipath channel. For performance comparison, IEEE802.11a and the proposed autoencoder based OFDM system are compared. For channel estimation, Wi-Fi uses initial long preamble to measure channel condition. but Autoencoder needs re-learning process to create an equalizer which compensate a distortion caused by the transmission channel. Therefore, this autoencoder based system has basic advantage to the Wi-Fi system. For the comparison of the system, additive random noise and 2-wave and 4-wave multipaths are assumed in the transmission path with no inter-symbol interference. A simulation was performed to compare the conventional type and the autoencoder. As a result of the simulation, the autoencoder properly generated automatic constellations with QPSK, 16QAM, and 64QAM. In the previous simulation, the received data was relearned, thus the performance was poor, but the performance improved by making the initial value of reception a random number. A function equivalent to an equalizer for multipath channels has been realized in OFDM systems. As a future task, there is not include error correction at this time, we plan to make further improvements by incorporating error correction in the future.

RFID Ubiquitous Public Information Documental Administration System construction and Security research (RFID 유비쿼터스 영구기록물관리시스템 구축과 보안 연구)

  • Jang, Young-Sang;Lee, Sung-Yooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.111-121
    • /
    • 2009
  • Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through. research of this treatise.

A Study on the New RFP for the PMO-based Development of Next-Generation MIS (PMO 기반의 차세대 MIS개발을 위한 신RFP 작성 연구)

  • Han, Moonhee;Kim, Yousin;Kim, Dae Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.11
    • /
    • pp.585-594
    • /
    • 2016
  • Information system development projects are increasingly enlarging in size and are becoming more complex in the development environment. The traditional approaches for the development of information system, however, haven't shown the expected performances in the management for them and many researchers have been trying to find a new approach for overcoming this challenges. And one of the new approaches is the PMO and it is introduced to solve the problems of project management and the related organizational, technical, and administrative problems. This study attempted to find the efficient information system establishment plan. In particular, this study wants to research the practicality of PMO and the detailed utilization plans. As a result, this study proposes the structure of project implementation, the requirements, the direction of the basic system design, the scope of system development, and the budgeting for the systems. It is expected to contribute the successful implementation of the project.

A study on the application of PbD considering the GDPR principle (GDPR원칙을 고려한 PbD 적용 방안에 관한 연구)

  • Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2022
  • Countries around the world have recognized the importance of personal information protection and have discussed protecting the rights of data subjects in various forms such as laws, regulations, and guidelines. PbD (Privacy by Design) is one of the concepts that are commonly emphasized as a precautionary measure for the protection of personal information, and it is starting to attract attention as an essential element for protecting the privacy of information subjects. However, the concept of PbD to prioritize individual privacy in system development or service operation in advance is still only at the declarative level, so there is relatively little discussion on specific methods to implement it. Therefore, this study discusses which principles and rights should be prioritized to implement PbD based on the basic principles of GDPR and the rights of data subjects. This study is meaningful in that it suggests a plan for the practical implementation of PbD by presenting the privacy considerations that should be prioritized when developing systems or services in the domestic environment.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

Decryption of KakaoTalk Database for macOS (macOS용 카카오톡 데이터베이스 복호화 방안)

  • Beomjun Park;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.753-760
    • /
    • 2023
  • KakaoTalk has the highest market share among domestic messengers. As such, KakaoTalk's conversation content is an important evidence in digital forensics, and the conversation is stored in the form of an encrypted database on a user's device. In addition, macOS has the characteristic that it is difficult to access because the disk encryption function is basically activated. The decryption method of the KakaoTalk database for Windows has been studied, but the decryption method has not been studied for KakaoTalk for macOS. In this paper, research the decryption method of the KakaoTalk database for macOS and a way to Brute-Force plan using the characteristics of KakaoTalk's UserID and compare it with KakaoTalk for Windows to examine the commonalities and differences. The results of this paper are expected to be used to analyze users' actions and events when investigating crimes using macOS.

A Study on the Estimation of the Design Flood for Small Catchment in Sobaek (소백산 소하천 유역의 홍수량 산정에 대한 고찰)

  • Hyung Joon Chang;Seong Goo Kim;Ki Soon Park;Young Ho Yoon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.99-104
    • /
    • 2023
  • In recent years, the occurrence of abnormal weather has increased rapidly, increasing the frequency of torrential rain. As a result, stable water resource management is difficult, and human and material damage is increasing. Various measures are being established to reduce damage caused by torrential rains, but small-scale mountain catchments are relatively difficult to manage due to lack of basic plan. In this study, the risk of flooding was evaluated using the rainfall-flow model in the Yeonhwa-dong catchment national park among national parks in Korea. The Yeonhwa-dong catchment of Mt. Sobaeksan was simulated to cause flooding when rainfall of more than 50 years occurred, and it was confirmed that there was a high risk of water resource structures, safety facilities, and trails.

A Study on How to Build an Optimal Learning Model for Artificial Intelligence-based Object Recognition (인공지능 기반 객체 인식을 위한 최적 학습모델 구축 방안에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.3-8
    • /
    • 2023
  • The Fourth Industrial Revolution is bringing about great changes in many industrial fields, and among them, active research is being conducted on convergence technology using artificial intelligence. Among them, the demand is increasing day by day in the field of object recognition using artificial intelligence and digital transformation using recognition results. In this paper, we proposed an optimal learning model construction method to accurately recognize letters, symbols, and lines in images and save the recognition results as files in a standardized format so that they can be used in simulations. In order to recognize letters, symbols, and lines in images, the characteristics of each recognition target were analyzed and the optimal recognition technique was selected. Next, a method to build an optimal learning model was proposed to improve the recognition rate for each recognition target. The recognition results were confirmed by setting different order and weights for character, symbol, and line recognition, and a plan for recognition post-processing was also prepared. The final recognition results were saved in a standardized format that can be used for various processing such as simulation. The excellent performance of building the optimal learning model proposed in this paper was confirmed through experiments.