• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.034 seconds

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Research on Object Detection Library Utilizing Spatial Mapping Function Between Stream Data In 3D Data-Based Area (3D 데이터 기반 영역의 stream data간 공간 mapping 기능 활용 객체 검출 라이브러리에 대한 연구)

  • Gyeong-Hyu Seok;So-Haeng Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.551-562
    • /
    • 2024
  • This study relates to a method and device for extracting and tracking moving objects. In particular, objects are extracted using different images between adjacent images, and the location information of the extracted object is continuously transmitted to provide accurate location information of at least one moving object. It relates to a method and device for extracting and tracking moving objects based on tracking moving objects. People tracking, which started as an expression of the interaction between people and computers, is used in many application fields such as robot learning, object counting, and surveillance systems. In particular, in the field of security systems, cameras are used to recognize and track people to automatically detect illegal activities. The importance of developing a surveillance system, that can detect, is increasing day by day.

A Study of Institutional Improvements for Responding to Electric Vehicle Fires: Focusing on the Case of Seoul (전기자동차 화재 대응을 위한 제도적 개선 방안 연구: 서울시 사례를 중심으로)

  • Nam-Kwun Park;Seung-Hee Ham
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.32-39
    • /
    • 2024
  • Purpose and Method: This study aims to suggest institutional improvements to enhance the response to electric vehicle fires. To this end, we examined the prevalence of electric vehicles, fires, and related legal systems in Seoul. Results: The top-level laws and ordinances related to electric vehicles are centered on distribution policies, so there is no practical fire response plan for electric vehicle fires. In order to apply the same regulations to each local government, it is necessary to set standards and establish a system for firefighting and safety facilities in higher laws. Conclusion: Establishing standards for the installation of fire and safety facilities that take into account the characteristics of electric vehicle fires and improving related systems will ultimately lead to an increase in the penetration rate of electric vehicles.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

Instruction-corruption-less Binary Modification Mechanism for Static Stack Protections (이진 조작을 통한 정적 스택 보호 시 발생하는 명령어 밀림현상 방지 기법)

  • Lee, Young-Rim;Kim, Young-Pil;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.71-75
    • /
    • 2008
  • Many sensor operating systems have memory limitation constraint; therefore, stack memory areas of threads resides in a single memory space. Because most target platforms do not have hardware MMY (Memory Management Unit), it is difficult to protect each stack area. The method to solve this problem is to exchange original stack handling instructions in binary code for wrapper routines to protect stack area. In this exchanging phase, instruction corruption problem occurs due to difference of each instruction length between stack handling instructions and branch instructions. In this paper, we propose the algorithm to call a target routine without instruction corruption problem. This algorithm can reach a target routine by repeating branch instructions to have a short range. Our solution makes it easy to apply security patch and maintain upgrade of software of sensor node.

A Study on the Safety Management Measures Efficient Chemical Substances (화학물질의 효율적 안전관리 방안에 관한 연구)

  • Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.3
    • /
    • pp.37-50
    • /
    • 2013
  • It is not an exaggeration to say that modern chemicals take a leading place in our life, and people live with the chemicals, having a huge impact on their daily life. The chemical industry in South Korea, ranked seventh in the world, is one of the key industries that are forming greater part of Korean economy. The actual state of the chemical industries, however, is that over 14 tons of hazardous chemicals are being discharged annually and threaten people's lives with a lack of knowledge of its potential danger. In this way, not only beneficial to us, some of these substances, All chemicals, but also present a threat fundamentally our living environment to hazards to human health and the environment, accidents such chemicals, unlike accidents general understanding the scale of damage and propagation velocity has a complex very difficult risk profile, that can occur during deployment of an accident type is also very diverse. Is the actual situation of public concern against harmful chemicals management's is amplified by the chemical accident in the wake such accidents, government and corporate and reactive system and management system prior to the chemical accident the need for communication to exchange ideas with each other between residents, providing information is important. Therefore, the government departments and corporations, which manage variety of chemicals, ought to contribute toward a development of national security by rigid control over the Hazardous chemicals.

A study of the methodology for the long-term preservation of electronic records : focus on the preservation concept (전자기록물의 장기보존을 위한 방안 연구 : 개념을 중심으로)

  • Nam, Sung-Un;Yoon, Dai-Hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.2
    • /
    • pp.101-119
    • /
    • 2001
  • In this paper we explain the definition and component of electronic records, and reestablish the principle of the preservation. Also we discuss the conceptual approaches and requirements for long-term preservation in an electronic environment. The preservation in digital environment is to protect itself of record identity with the reliability and authenticity, and to ensure the accessibility of records. It needs to be periodical migration along with digital environment change for the long-term preservation of the electronic records. and to select software independent standard format. to ensure the integrity of electronic records along with this preservation strategy, process and relative information required for digital preservation are to record in the form of metadata. The preservation system is separated into four functional entities ; registration process, preservation process, access process, main record management system. Also, this article is conceptually to introduce the selection criteria of storage media, the security provision for the archive collections and the disaster recovery which apply to the digital archives.

Monitoring on Crop Condition using Remote Sensing and Model (원격탐사와 모델을 이용한 작황 모니터링)

  • Lee, Kyung-do;Park, Chan-won;Na, Sang-il;Jung, Myung-Pyo;Kim, Junhwan
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_2
    • /
    • pp.617-620
    • /
    • 2017
  • The periodic monitoring of crop conditions and timely estimation of crop yield are of great importance for supporting agricultural decision-makings, as well as for effectively coping with food security issues. Remote sensing has been regarded as one of effective tools for crop condition monitoring and crop type classification. Since 2010, RDA (Rural Development Administration) has been developing technology for monitoring on crop condition using remote sensing and model. These special papers address recent state-of-the-art of remote sensing and geospatial technologies for providing operational agricultural information, such as, crop yield estimation methods using remote sensing data and process-oriented model, crop classification algorithm, monitoring and prediction of weather and climate based on remote sensing data,system design and architecture of crop monitoring system, history on rice yield forecasting method.

Implementation Method of Insurance Object GIS DB for the Storm and Flood Hazard Risks Premium Rate Mapping (풍수해보험 관리지도를 위한 보험 목적물 GIS DB 구축)

  • Lee, Jun-Seok;Lee, In-Su
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.87-100
    • /
    • 2015
  • Currently, Korea government has strongly recommended the storm and flood insurance system to reduce the damage caused by natural disasters. The storm and flood insurance operated by private insurance company is the type of policy insurance. and is supervised by Minister of Public Safety and Security. It is the advanced disaster management system which is able to protect the public interests through unexpected natural disaster by assisting some part of the insurance premium from a central or local government. The main purpose of the present investigation is to build the insurance object GIS DB which should be necessary to calculate the premium rate in the map for storm and flood insurance, and also, to perform GIS analysis. The service model in this study is aimed to general single house, apartment and green house. The service management plan targeting the whole country has been investigated in terms of building DB and service operation.

A Secure Authentication Model Using Two Passwords in Client Server Systems (클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델)

  • Lee, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1350-1355
    • /
    • 2011
  • It is very important issues to protect many system resources using authorized client authentication in distributed client server systems. So it is not enough to prevent unauthorized opponents from attacking our systems that client authentication is performed using only the client's identifier and password. In this paper, we propose a secure authentication database modeling with two authentication keys such as a client authentication key and a server authentication key. The proposed authentication model can be used making high quality of computer security using two authentication keys during transaction processing. The two authentication keys are created by client and server, and are used in every request transaction without user's extra input. Using the proposed authentication keys, we can detect intrusion during authorized client's transaction processing because we can know intrusion immediately through comparing stored authentication keys in client server systems when hackers attack our network or computer systems.