• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.032 seconds

A Case Study on Intelligent Surveillance System for Urban Transit Environment (도시철도 환경에서 지능형 감시 시스템 구축 사례)

  • Chang, Il-Sik;An, Tae-Ki;Cho, Byeong-Mok;Park, Goo-Man
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1722-1728
    • /
    • 2011
  • The security issue in urban transit system has been widely considered as the common matters after the fire accident at Daegu subway station. The safe urban transit system is highly demanded because of the vast number of daily passengers, and it is one of the most challenging projects. We introduced a test model for integrated security system for urban transit system and built it at a subway station to demonstrate its performance. This system consists of cameras, sensor network and central monitoring software. We described the smart camera functionality in more detail. The proposed smart camera includes the moving objects recognition module, video analytics, video encoder and server module that transmits video and audio information.

  • PDF

Implementation of Speech Recognition Security System Using Speaker Defendent Algorithm (화자 종속 알고리즘을 이용한 음성 인식 보안 시스템 구현)

  • 김영현;문철홍
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.65-68
    • /
    • 2003
  • In this paper, a speech recognition system using a speaker defendant algorithm is implemented on the PC. Results are loaded on a LDM display system that employs Intel StrongArm SA-1110. This research has completed so that this speech recognition system may correct its shortcomings. Sometimes a former system is operated by similar speech, not a same one. To input a vocalization is processed two times to solve mentioned defects. When references are creating, variable start-point and end-point are given to make efficient references. This references and new references are changed into feature parameter, LPC and MFCC. DTW is excuted using feature parameter. This security system will give user permission under fore execution have same result.

  • PDF

Design and Implementation of an Efficient Fair Off-line E-Cash System based on Elliptic Curve Discrete Logarithm Problem

  • Lee, Manho;Gookwhan Ahn;Kim, Jinho;Park, Jaegwan;Lee, Byoungcheon;Kim, Kwangjo;Lee, Hyuckjae
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.81-89
    • /
    • 2002
  • In this paper, we design and implement an efficient fair off-line electronic cash system based on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is revocable by a trustee in case of dispute. To achieve this, we employ the Petersen and Poupard s electronic cash system [1] and extend it by using an elliptic curve over the finite field GF($2^n$). This naturally reduces message size by 85% compared with the original scheme and makes a smart card to store coins easily. Furthermore, we use the Baek et al. s provably secure public key encryption scheme [2] to improve the security of electronic cash system. As an extension, we propose a method to add atomicity into new electronic cash system. To the best of our knowledge, this is the first result to implement a fair off-line electronic cash system based on ECDLP with provable security.

Surveillance over IP and its standardization (SoIP(Surveillance over IP)와 표준화)

  • Kim, Choon-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.464-468
    • /
    • 2005
  • The DVR industry has been grown with their own, proprietary systems without the need of standards because the security products are independently installed in small scale and the communication needs are very limited. The industry might have tighter security than having standardized products, but the appearance of IP surveillance and the need of communications with IP products such as IP Phones and IP-PBX made the standardization unavoidable. In this paper, we built an IP surveillance system with SIP based session control and investigated the applications of it other than the security itself.

PC Security Management Control System using Agent (에이전트를 이용한 PC 보안 관제 시스템)

  • 김우년;노원섭;이승우;이종남;강창구
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.44-47
    • /
    • 2002
  • 본 논문에서는 에이전트를 이용하여 개인용 컴퓨터의 보안성을 높이고, 중앙에서 PC 보안 정책을 조직 내에 일괄 적용하고 관리할 수 있는 PC 보안 관제 시스템의 개발에 대해서 설명한다. 에이전트는 각 PC에서 보안 정책을 적용하고 보안 로그를 수집하여 관제 시스템으로 전송하며, 관제 시스템은 이러한 정보를 기반으로 조직내의 PC 보안정책을 일괄 적용할 수 있도록 지원한다. 에이전트를 이용한 PC 보안 관제 시스템은 에이전트에서 수집된 보안 로그를 이용하여 보안 정책을 조직에 알맞게 수립할 수 있으며, 수립된 조직의 정책이 조직내의 PC에 적용할 수 있고, 정책에 위배되는 사항을 실시간으로 확인할 수 있는 장점이 있다.

  • PDF

Detection of invalidated sanity checks caused by undefined behaviors (정의되지 않은 행동에 의한 안전성 검사 무효화 탐지 기법)

  • Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.215-219
    • /
    • 2014
  • C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

Anomaly Intrusion Detection using Neuro-Fuzzy (Neuro-Fuzzy를 애용한 이상 침입 탐지)

  • 김도윤;서재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.37-43
    • /
    • 2004
  • Expasion of computer network and rapid growth of Internet have made computer security very important. As one of the ways to deal with security risk, much research has been made on Intrusion Detection System(IDS). The paper, also, addresses the issue of intrusion detection, but especially with Neuro-Fuzzy model. By applying the fuzzy logic which is known to deal with uncertainty to Anomaly Intrusion, it not only overcomes the difficulty of Misuse Intrusion, but also ultimately aims to detect the intrusions yet to be known.

  • PDF

Flexible Video Authentication based on Aggregate Signature

  • Shin, Weon;Hong, Young-Jin;Lee, Won-Young;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.833-841
    • /
    • 2009
  • In this paper we propose a flexible video authentication scheme based on aggregate signature, which provides authenticity of a digital video by means of cryptographic signature to guarantee right of users. In contrast to previous works, the proposed scheme provides flexible usages on content distribution system, and it allows addition of new contents to the signed contents and deletion of some parts of the signed contents. A modification can be done by content owner or others. Although contents are modified by one or more users, our scheme can guarantee each user's right by aggregation of the each user's signatures. Moreover, proposed scheme has half size of Digital Signature Algorithm (DSA) with comparable security.

  • PDF

Requirements Analysis of a TestBed for Mobile Data Networks Security Threats Response System verification (이동통신 데이터망 보안위협 대응 시스템 검증을 위한 테스트베드 요구사항 분석)

  • Kim, Sung-Ho;Lee, Kevin;Im, Chea-Teae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.337-339
    • /
    • 2012
  • 스마트폰 사용자의 증가와 함께 이동통신망의 데이터 트래픽이 폭증하고 있다. 유입되는 트래픽 중 비정상적, 악의적인 트래픽이 발생하고 있지만, 이동통신 데이터망의 보안 시스템은 미비한 실정이다. 이 논문에서는 이동통신 데이터망으로 유입되는 악의적인 트래픽 및 비정상 트래픽에 대응하기 위하여 이동통신 데이터망의 구성과 발생 가능한 위협을 정리하였다. 그리고 대응 시스템을 마련하기 위해 필요한 테스트베드가 갖춰야 할 요구사항을 정리하였다. 이 요구사항을 준수하여 테스트베드를 구축하면 이동통신 데이터망의 위협에 대응하는 시스템의 설계 및 실험에 많은 도움을 줄 수 있을 것이다.