• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.033 seconds

An Effective Intrusion Detection System for MobileAdHocNetwork (모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템)

  • Shrestha, Rakesh;Park, Kyu-Jin;Park, Kwang-Chae;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

A Research on Standard Profile for Improving Security of Information System (정보시스템 보안성 향상을 위한 표준프로파일에 관한 연구)

  • Ryu, Jung-Hee;Ryoo, In-Tae;Shin, Shin-Ae
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1099-1102
    • /
    • 2002
  • 최근의 정보화 사업들은 인터넷 환경을 기반으로 하여, 웹 시스템으로 구축되고 있다. 그러나 웹 환경은 그 개방성으로 인하여 보안이 매우 취약하지만, 보안에 대한 체계적으로 정립된 보안모델이 없어 정보화사업마다 나름대로의 보안 모델을 만들어 적용하고 있다. 이렇게 자체적으로 정의한 보안모델은 구성 정도에 따가 취약성을 내포할 수 있으며, 일부 시스템 보안성에 문제가 발생하면 네트워크로 연결된 다른 시스템에도 문제가 전이치는 사례를 초래할 수 도 있다. 이러한 문제를 해결하기 위하여 부 연구에서는 정보화 사업들의 보안성 향상을 위하여 지켜야 하는 최소한의 보안 모델을 표준과 함께 제시하고자 한다.

  • PDF

A Study on the Establishing of Single Window System for Simplification of Trade Procedures (무역절차 간소화를 위한 Single Window 구축에 대한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.7 no.4
    • /
    • pp.157-177
    • /
    • 2005
  • In many countries, a Single Window system for simplifications is establishing in order to reduce works submitted double data and compliance costs. A Single Window is defined as a facility that allows parties involved in trade and transport to lodge standardized information and documents with a single entry point to fulfil all import, export, and transit-related regulatory requirements. A Single window can bring improved level of security, faster clearance and reduced compliance costs. UN/CEFACT released "Recommendation and Guidelines on establishing a Single Window to enhance the efficient exchange of information between trade and government". Also, WCO has made progress several projects to assist effective establishing a single window, i.e. CDM, UCR, ICT. Korea has being established a single window system, "e-trade platform" connected with trade, clearance, logistics, marketing and payment system. Some suggestions to establish a effective single window system in Korea are as follows. Firstly, it is necessary to clearly define roles and responsibilities of a lead agency in a single window system and form a organic relationship with PGA. Secondly, a single window system has to be progressed by stages, namely, customs clearance portal system should be established first, and later established e-trade platform. Lastly, the Korean government has to take part in CDM project to gain an advantage over other countries.

  • PDF

Database Structure and Information Exchange System of KEPCO's EMS SYSTEM (한전(韓電)EMS의 데이터베이스 및 정보교환체제(情報交換體制))

  • Lee, Kyung-Jae;Yu, Sung-Chul;Kim, Yeong-Han;Lee, Hyo-Sang
    • Proceedings of the KIEE Conference
    • /
    • 1988.11a
    • /
    • pp.87-91
    • /
    • 1988
  • For the electric power system operation, the information to monitor the operation status of power plants and transmission lines is very important factor in the view point of system security and economic operation. This paper presents the logical and physical structures of database used by KEPCO's EMS. The adopted DataBase Management System (DBMS) of a relational model type offers many advantages such as easy maintenance of database. In addition, this paper briefly introduces the data exchange system between application programs and database.

  • PDF

Building a Mobile AR System Based on Visual SLAM (Visual SLAM 기반의 모바일 증강현실 시스템 구축)

  • Song, Ju Eun;Kook, Joongjin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.4
    • /
    • pp.96-101
    • /
    • 2021
  • The SLAM market is growing rapidly with advances in Machine Learning, Drones, Augmented Reality technologies. However, due to the absence of an open source-based SLAM library for developing AR content, most SLAM researchers are required to conduct their own research and development to customize SLAM. In this paper, we propose an opensource-based Mobile Markerless AR System by building our own pipeline based on Visual SLAM. To implement the Mobile AR System of this paper, it uses ORB-SLAM3 and Unity Engine and We experimented with running our system in a real environment and confirming it in the Unity Engine's Mobile Viewer. Through this experimentation, we can verify that the Unity Engine and the SLAM System are tightly integrated and communicate smoothly. Also, we expect to accelerate the growth of SLAM technology through this research.

A Low Power Wireless Communication-based Air Pollutants Measuring System (저전력 무선통신 기반 대기오염 측정시스템)

  • Kang, Jeong Gee;Lee, Bong Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

Dynamic Stitching Algorithm for 4-channel Surround View System using SIFT Features (SIFT 특징점을 이용한 4채널 서라운드 시스템의 동적 영상 정합 알고리즘)

  • Joongjin Kook;Daewoong Kang
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.1
    • /
    • pp.56-60
    • /
    • 2024
  • In this paper, we propose a SIFT feature-based dynamic stitching algorithm for image calibration and correction of a 360-degree surround view system. The existing surround view system requires a lot of processing time and money because in the process of image calibration and correction. The traditional marker patterns are placed around the vehicle and correction is performed manually. Therefore, in this study, images captured with four fisheye cameras mounted on the surround view system were distorted and then matched with the same feature points in adjacent images through SIFT-based feature point extraction to enable image stitching without a fixed marker pattern.

  • PDF

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Design and Implementation of Packet Filtering System for IPv4/IPv6 Tunneling Environment (IPv4/IPv6 터널링 환경에 적합한 패킷 필터링 기능 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Kim, Kyung-Jun;Jeong, Sang-Jin;Shin, Myung-Ki;Kim, Hyoung-Jun;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.407-419
    • /
    • 2006
  • As substituting IPv6 network for all IPv4 network in a short time seems unattainable due to high cost and technical limitation, IPv4 and IPv6 are expected to coexist for a certain period of time. Under the co]existing environment of IPv4 and IPv6, interworking brings a number of extra security considerations even if it may have no security problem for each protocol respectively. Thus, the analysis and solutions for those various attacks toward IPv4/IPv6 interworking-related security are inevitably required for the sake of effective transition and settlement to IPv6. In this paper we carried out a proper rule of packet filtering for IPv6-in-IPv4 tunneling interworking environment to protect the IPv4/IPv6 interworking-related security attacks. Design and implementation of the packet filtering system suitable for IPv4/IPv6 tunneling environment in the form of Linux netfilter and ip6tables are also shown. Thru this study, the packet filtering system was found operating correctly ill the tunneling mechanism.