• Title/Summary/Keyword: illegal activities

Search Result 123, Processing Time 0.024 seconds

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

A Study on the Protection Plan of Fisheries Resources against Illegal Fishing of Chinese Fishing Vessel (중국 어선의 불법조업에 대한 우리나라 수산자원의 보호방안)

  • JUNG, Bong-Kyu
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1549-1560
    • /
    • 2016
  • Today, all the countries of the world newly recognize importance of sea, which are focused on efforts for security of marine territory and fishes resources. Many of the coastal state, to strengthen the rights of their own country EEZ, marine survey and continental shelf development, travels through such maritime jurisdiction in the territorial sovereignty and the EEZ overlaps, deepening complex interests between neighboring countries cooperation activities of the fierce competition, the domestic and foreign been has been carried out. Under such circumstances, is devastated coastal of China, our territorial waters and EEZ has been violated more and more, in spite of the powerful crackdown maritime public power, illegal fishing more resistance intensified. They tend to be gradually organization, collectivization and atrocities. Currently, illegal fishing of Chinese fishing boats in the West Sea of Korea, including the waters near Yeonpyeong Island is prevalent as operating in the coast of the country. Furthermore regrettable one is illegal on a scale and the situation where South Korea of scale of damage caused by it have not been accurately grasp of the operation, but that there is damage of Korea official duty enforcement to crack down the increase to illegal operations year after year have occurred. Violent, illegal fishing of Chinese fishing boats, in order to eradicate the operations of insane at our sea, we investigated to the infringement situations of fisheries resources by multiple fields. each of problems presenting a specific preservation plan in accordance with the function and role of the maritime enforcement organization and other government organization the point. at the same time we will try to seek measures such as a scheme that it is possible to increase the capacity.

Proposals On The Designe, Construction, Management Maintenance standardization Method Of Mechanical Field Fire Protection System By NFSC (화재안전기준(NFSC)에 따른 기계분야 소방설비 설계, 시공, 감리 유지관리 업무 표준화 방안에 대한 제안)

  • Kim, Sung-Il;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.11-17
    • /
    • 2017
  • The study seeks to cooperate with the investigation of a fire investigation based on public-private partnership. Fire protection systems provide a wide variety of viewpoints from the perspectives of design, construction, management, maintenance, maintenance and maintenance systems at a particular point in time, construction, management, and maintenance systems. What is controversial is that there are illegal activities such as illegal activities of the Patent Office, misconduct of construction work and unreasonable construction of construction works.As a theoretical framework, the present study identified the four key elements of a successful disaster response system : responsiveness, control, professionalism, and bias.

Detection, Identification and Surveillance System Development of Illegal Fishing Vessels in Inshore Fishing Ground (연안 어장에서의 불법 조업 어선의 탐지, 식별 및 감시 시스템 개발)

  • LEE Dae-Jae;KIM Kwang-Sik
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.37 no.4
    • /
    • pp.337-344
    • /
    • 2004
  • A real-time surveillance system of the inshore fishing ground was constructed to identify and detect discrete targets, such as illegal fishing vessels. This paper describes measurements made with a combination of sensors, such as radar, CCTV camera, and GPS receivers, for monitoring the fishing activity of small vessels within the fishing limit zones of the inshore waters. The CCTV camera system was used to confirm detection and to classify the type of target. The location of legal vessels distributed in coastal waters was acquired from each GPS system of ships connected to commercial satellite communication network. The surveillance system was networked via LAN to one host PC with the use of electronic navigational charts (ENC) and a radar link. Radar Target Extractor (RTX) for radar signal processing can be remotely accessed and controlled on existing PC via the internet, from anywhere, at any time. Results are presented that demonstrate the effectiveness of the newly constructed fisheries monitoring system for conducting continuous surveillance of illegal fishing vessels in the inshore fishing ground. The identification of illegal fishing vessels was achieved by comparing radar positions of illegal fishing vessels exceeding the warning limits in the surveillance area with GPS position reports transmitted from legal fishing vessels, and the illegal fishing vessels were marked with red symbols on the ENC screen of a PC. The methods to track the activities of all vessels intruding or leaving the fishing limit zones also were discussed.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

International Trend of Regulation on IUU Fishing and Countermeasures (IUU어업에 대한 국제적 규제 동향과 우리나라의 대응 방안)

  • LEE, Kwang-Nam;SEO, Byung-Kwi
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.15 no.1
    • /
    • pp.81-100
    • /
    • 2003
  • It is undeniable that IUU Fishing are threatening so many legal fishermen' economic livelihood, negatively impact on conservation and protection of the fishery stock and ecosystem itself. Especially, negative impact of IUU Fishing resulted from the increasing fishery activities on the high seas. The Korea case of Coastal and Off-shore Fisheries, difficulties in conserving and controlling the fishery stock was brought about. Simultaneously, it is the fact that there are so many damage such as the reduction of fish Stock management program's effect, dissatisfaction of legal fishermen, over-exploiting of fish stock. Related with this kind of problem, FAO had adopted "International Plan of Action to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated Fishing(2001)". From this reason, Korea also needs to make actual efforts to prevent IUU Fishing. i.e. each nation should develop Korea action plan by Feb. 2004 and impliment it, report on implementation toward FAO. This Paper will review the definition of the IUU stipulated by "International Plan of Action on Illegal, Unreported and Unregulated Fishing" and study Korea cases of the IUU fishing. Finally, the analysis of Korea's implementation will be done, centering around the contents stated on the International Action Plan. The significance of this paper is to grope the political countermeasures against international movement of the IUU fishing prevention.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

국내 소프트웨어 산업 지원 방안에 대한 연구

  • 최재규;김재영;지경용
    • Proceedings of the Technology Innovation Conference
    • /
    • 2003.06a
    • /
    • pp.75-89
    • /
    • 2003
  • In recent, internal IT industries are suffering a severe pain due to stagnancy of business activities. Particularly, internal software industries are losing international competitiveness. As to solve this problems, the paper is studied about political plans for supporting internal software industries. The paper has two important topics which are enlarged plan of domestic demand and supplement of the expert personnel in internal software industries. The paper consists of three parts: one is plan which prevents for using illegal softwares, another is problems which is related to publication of expert programming books, and the other is If educations of governmental leading. The paper suggests realistic price of softwares, powerful inspection about illegal softwares as governmental leading, and continuous public relations for changing consumers'awareness.

  • PDF

Maritime Interdiction against the DPRK's Illicit Maritime Practices (북한의 불법 해상활동에 대한 해양차단에 관한 연구)

  • Kim, Jeong-Soo
    • Strategy21
    • /
    • s.46
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.