• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.037 seconds

A Macroscopic Framework for Internet Worm Containments (인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크)

  • Kim, Chol-Min;Kang, Suk-In;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.9
    • /
    • pp.675-684
    • /
    • 2009
  • Internet worm can cause a traffic problem through DDoS(Distributed Denial of Services) or other kind of attacks. In those manners, it can compromise the internet infrastructure. In addition to this, it can intrude to important server and expose personal information to attacker. However, current detection and response mechanisms to worm have many vulnerabilities, because they only use local characteristic of worm or can treat known worms. In this paper, we propose a new framework to detect unknown worms. It uses macroscopic characteristic of worm to detect unknown worm early. In proposed idea, we define the macroscopic behavior of worm, propose a worm detection method to detect worm flow directly in IP packet networks, and show the performance of our system with simulations. In IP based method, we implement the proposed system and measure the time overhead to execute our system. The measurement shows our system is not too heavy to normal host users.

A study for Internal Accounting Control Based on Computerized Accounting Information System (전산화된 회계정보시스템의 내부회계통제의 운영방안에 관한 연구)

  • 손명철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1355-1364
    • /
    • 2001
  • Internal control comprises the plan of Organization and all of the coordinate methods and measure adopted within a business to safeguard its assets. check the accuracy and reliability of its accounting data, promote operation efficiency, and encourage adherence to prescribed managerial policies. Internal accounting control is classified into General Control and Application Control. Essential elements of internal accounting control as follows : 1. General Control $\circled1$ Organization and operation controls. $\circled2$ System development and Documentation controls. $\circled3$ Hardware controls. $\circled4$ Software and hardware Accessibility controls. $\circled5$ General systems security and protection 2. Application control $\circled1$Input control. $\circled2$ Processing control. $\circled3$ Output control. Internal accounting control can establish a total management information system by connecting with mana-gement control of a company, and enable decision makers to establish decision support system(DSS), is so vital today.

  • PDF

Non-memorizing authentication system using the preference words (좋아하는 단어를 이용한 암기하지 않는 패스워드 시스템)

  • Rim, Kwang-Cheol;Lim, Dong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.565-570
    • /
    • 2016
  • User requirements for access and authentication increase daily because of the diversification of the Internet of Things (IoT) and social structures. The increase in authentication needs requires the generation of new passwords. Users want to utilize the same passwords for memorization convenience. However, system administrators request each user to use different passwords, as well as passwords that include special symbols. Differnet passwords and including special symbols passwords seem to exceed the tolerance range within your memorization skills. It fetches a very negative consequences in terms of password management. This paper proposes a preference symbol password system that does not require memorization by users. First, a survey is conducted to prove statistical safety, and based on this, an evolution-type password system that uses preference symbols is designed. Preference symbol passwords show superiority with respect to installation cost and convenience, compared with conventional non-memorizing password systems such as biometrics, keystrokes, and mouse patterns.

The Present Status and Future of Disaster Safety Communication Network (재난안전통신망의 현황과 미래)

  • Hong, Sung-Hwa;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.115-120
    • /
    • 2020
  • PS-LTE, which is mentioned as a next-generation disaster network technology, is a communication technology that supports communication between terminals and group communication necessary for public safety communication based on LTE technology. Currently, Korea is establishing a PS-LTE network construction plan and installing a PS-LTE system. The world is currently making a lot of efforts to build a disaster network system using PS-LTE. However, due to the characteristics of the closed network that only the related persons can access, it can not be operated like the existing commercial network, so it is necessary to build a new network. And it is expected that many periods and costs will be required. In order to establish a disaster safety communication network efficiently, it is necessary to consider the linkage of PS-LTE network, which is newly constructed by complementing the problems such as security and access priority to existing LTE network rather than unconditional new construction.

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

Research on Improvements of the Legal Deposit System for the Preservation of Online Electronic Book (온라인 전자책 보존을 위한 납본제도 개선 방안 연구)

  • Jang, Bo-Seong;Nam, Young-Joon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.435-456
    • /
    • 2010
  • This research compares and analyzes the legal deposit of national online electronic publishing and related laws that were recently amended in order to preserve the exponentially increasing number of electronic books(e-books). Based on the analysis, it also seeks ways to initiate a legal deposit system of e-books in South Korea. The research, therefore, defines the exact range and types of e-books. This research proposes three conditions to introduce the legal deposit system in order to preserve South Korean e-books. The first is to establish a clear definition and classification of e-books as data subject to legal deposit for preservation purposes. The second condition is to establish a legal system in order to deposit and collect network(online-exclusive) type e-books. The final condition is to reflect the opinion of publishers and to create security measures against any loss of the companies.

A Study on the Malware Realtime Analysis Systems Using the Finite Automata (유한 오토마타를 이용한 악성코드 실시간 분석 시스템에 관한 연구)

  • Kim, Hyo-Nam;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.69-76
    • /
    • 2013
  • In the recent years, cyber attacks by malicious codes called malware has become a social problem. With the explosive appearance and increase of new malware, innumerable disasters caused by metaphoric malware using the existing malicious codes have been reported. To secure more effective detection of malicious codes, in other words, to make a more accurate judgment as to whether suspicious files are malicious or not, this study introduces the malware analysis system, which is based on a profiling technique using the Finite Automata. This new analysis system enables realtime automatic detection of malware with its optimized partial execution method. In this paper, the functions used within a file are expressed by finite automata to find their correlation, and a realtime malware analysis system enabling us to give an immediate judgment as to whether a file is contaminated by malware is suggested.

A Study on Functional Design of Electronic Records Management System in Records Centers (전자기록관리시스템의 기능 설계에 관한 연구)

  • Kim, Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.7 no.1
    • /
    • pp.61-82
    • /
    • 2007
  • With changes of information environment on records managements, ERMS can be a suitable solution for managing multi-typed records. In this point, this study performed analysis and design of ERMS based on key functions and requirements to perform creation, preservation, management and use of electronic records. Especially, this study focused on interoperability with the related systems, security issues and back-up methods for secured preservation and management including fundamental requirements. Also, ERMS has a close relation with related systems such as intranet system, electronic document settlement system, and so on. compared to digital library managing information resources. Considering those features mentioned above, this study proposes functional requirements and a system architecture of ERMS which is satisfied with four characteristics of electronic records mentioned on ISO 15489 and environmental requirements.

Service Delivery Time Improvement using HDFS in Desktop Virtualization (데스크탑 가상화에서 HDFS를 이용한 서비스 제공시간 개선 연구)

  • Lee, Wan-Hee;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.913-921
    • /
    • 2012
  • The current PC-based desktop environment is being converted into server-based virtual desktop environment due to security, mobility, and low upgrade cost. In this paper, a desktop virtualization system is implemented using an open source-based cloud computing platform and hypervisor. The implemented system is applied to the virtualziation of computer in university. In order to reduce the image transfer time, we propose a solution using HDFS. In addition, an image management structure needed for desktop virtualization is designed and implemented, and applied to a real computer lab which accommodates 30 PCs. The performance of the proposed system is evaluated in various aspects including implementation cost, power saving rate, reduction rate of license cost, and management cost. The experimental results showed that the proposed system considerably reduced the image transfer time for desktop service.

A Study on the development of ECU for Adaptive Front-lighting System (Adaptive Front-lighting System용 ECU 개발에 관한 연구)

  • Kim, Gwan-Hyung;Kang, Sung-In
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2078-2082
    • /
    • 2007
  • Recently, according to traffic accident statistics, traffic accidents occurring at night are as frequent as those during daytime, but their death rate is 1.5 times higher than that of daytime traffic accidents. This problem originates that the insufficient range of vision security of a driver causes the inappropriate accident confrontation. Therefore, in this paper, a microcontroller-based digital control method for the superior performance in headlight system is presented for optimal control that can adapt complex transient state, steady state and various environments. Specially in vehicles# headlight, its fundamental purpose is to implement the artificial headlight system which automatically controls the lighting patterns most adaptive to driving, road and weather conditions. Therefore we aimed at the development of headlight system, focused on the implementation of an artificial vehicle, of more advanced convenience and safety for drivers.