• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.034 seconds

Implementation of Synchronized Stream Cryptosytsem for Secure Communication in Radio Channel (무선 채널에서의 암호 통신을 위한 동기식 스트림 암호시스템 구현)

  • 홍진근;손해성;황찬식;김상훈;윤희철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.894-904
    • /
    • 1999
  • In this paper, a synchronized stream cryptosystem for secure communication in radio channel is designed and its security level is analyzed. The main parts of the proposed cryptosystem consist of synchronization pattern generator, session key generator, and key stream generator. The system performance is evaluated by analyzing the security level depending on the randomness, period, linear complexity, and correlation immunity. Experimental results with image data signal in the 10-1 and 10-2 channel error environment demonstrate the proper operation of the implemented crypto system.

  • PDF

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

Image Contents Encryption Technique for Digital Hologram Broadcasting Service (디지털 홀로그램 방송을 위한 영상 콘텐츠의 암호화)

  • Ha, Jun;Choi, Hyun-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.818-819
    • /
    • 2013
  • This paper propose a contents security technique for digital holographic display service. Digital holographic video system assumes the existing service frame for 2-dimensional or 3-dimensional video, which includes data acquisition, processing, transmission, reception, and reconstruction. In this paper, we perform the encryption of RGB image and depth-map for such a system. The experimental results showed that encrypting only 0.048% of the entire data was enough to hide the constants of the RGB image and depth-map.

  • PDF

Design and Implementation of An Application Program Logging System with Linux Security Module (리눅스 보안 모듈을 이용한 응용 프로그램 로깅 시스템 설계 및 구현)

  • Park, Nam-Youl;Song, Choon-Hwan H.;Kim, Chong-Il;Noh, Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.1081-1084
    • /
    • 2001
  • 리눅스 시스템의 급격한 사용증가에 비해 리눅스 보안에 대한 인식은 취약한 상태이며, 응용수준에서 제공되는 로깅시스템은 위.변조의 가능성이 높다. 특히 서버 데몬에서의 감시나 추적은 전적으로 응용수준에 의존하고 있는 상태이므로 현재의 특정한 자료나 연결 요청이 공격인지 아닌지를 판단하기에는 어려움이 많다. 본 논문에서는 리눅스의 시스템 호출 로깅 모듈인 리눅스 보안 모듈(LSM:Linux Security Module)을 이용하여 서버 데몬이나 유틸리티 등에 대해 선택적으로 응용프로그램에 대한 동작상태를 감사 및 추적하여 침입여부를 판단할 수 있도록 지원하는 응용 프로그램 로깅 시스템(ALOGS: Application Program Logging System)을 설계 및 구현하고자 한다.

  • PDF

The computer system of Mutual Saving Finance service using GIS in Client/Server environment (C/S환경에서 GIS를 이용한 신용금고업무 전산화시스템)

  • 안병규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.161-165
    • /
    • 2000
  • In the past, the mutual saving finance service was managed by the Packages which consisted of the softwares managing data under the text mode environment. The data was mostly managed at only one place. So it becomes very important things that we efficiently deal various services and systematically support public-relation activities and efficient managements of a security mortgage. Therefor. we develope the system which efficiently manages customer service and management of a security mortgage by using GIS under the Client/server environment.

  • PDF

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

Target Object Image Extraction from 3D Space using Stereo Cameras

  • Yoo, Chae-Gon;Jung, Chang-Sung;Hwang, Chi-Jung
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1678-1680
    • /
    • 2002
  • Stereo matching technique is used in many practical fields like satellite image analysis and computer vision. In this paper, we suggest a method to extract a target object image from a complicated background. For example, human face image can be extracted from random background. This method can be applied to computer vision such as security system, dressing simulation by use of extracted human face, 3D modeling, and security system. Many researches about stereo matching have been performed. Conventional approaches can be categorized into area-based and feature-based method. In this paper, we start from area-based method and apply area tracking using scanning window. Coarse depth information is used for area merging process using area searching data. Finally, we produce a target object image.

  • PDF

Suggestions for improving the security features illegal parking and stopping of the existing system for Mega Pixel CCTV (메가 픽셀 CCTV를 적용한 기존 불법 주정차 시스템의 방범 기능 향상에 대한 제안)

  • Kim, Nam-Kuk;Park, Koo-Rack
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.135-137
    • /
    • 2014
  • 시대가 발전함에 따라 기술도 발달하지만 시민의식이 따라가지 못하기 때문에 그 만큼 범죄도 늘어나고 있다. 그럼에 따라 범죄를 예방하기 위해 방범용 CCTV를 늘리고 있는 추세이다. 그러나 방범용 CCTV를 늘리기 위해서는 많은 시간과 예산이 필요하다. 그래서 사용자들은 불법 주정차 시스템에 방범 기능을 요구하고 있는 추세이다. 그러나 기존의 CCTV는 화소가 낮아 이미지가 선명하지 않기 때문에 방범 기능에 적용하기에는 미흡한 점이 많았다. 그래서 본 논문에는 기존의 시스템을 보완하기 위한 방안으로 메가 픽셀을 적용하여 불법 주정차 시스템의 방범 기능을 향상 시킬 수 있는 방안을 제안하였다. 결과적으로 저화질 CCTV를 사용 할 때보다 불법 주정차 단속뿐만 이라 방범 시스템으로도 더 나은 효과를 보일 것으로 예상한다.

  • PDF

Effective RFID Authentication Using Hash Function (해시 함수를 이용한 효율적인 RFID 인증)

  • Shin, Hyo-Young;Jung, Gye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1171-1177
    • /
    • 2010
  • Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.

A Study on Joint Coding System using VF Arithmetic Code and BCH code

  • Sukhee Cho;Park, Jihwan;Ryuji Kohno
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.537-545
    • /
    • 1998
  • This paper is the research about a joint coding system of source and channel coding using VF(Variable-to-fixed length) arithmetic code and BCH code. We propose a VF arithmetic coding method with EDC( Error Detecting Capability) and a joint coding method in that the VF arithmetic coding method with EDC is combined with BCH code. By combining both the VF arithmetic code with EDC and BCH code. the proposed joint coding method corrects a source codeword with t-errors in decoding of BCH code and carries out a improvement of the EDC of a codeword with more than (t+1)-errors in decoding of the VF arithmetic coding with EDC. We examine the performance of the proposed method in terms of compression ratio and EDC.

  • PDF