• 제목/요약/키워드: network protection system

검색결과 546건 처리시간 0.027초

철도 고압배전계통의 보호시스템 최적화 방안 연구 (Optimization of protection System on the Railway High Voltage power System)

  • 조웅기;창상훈;한성호;김왕곤
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2002년도 추계학술대회 논문집(II)
    • /
    • pp.989-994
    • /
    • 2002
  • In case the fault occurs in railway high voltage power supply network, protective relaying system must selectively detect 1 wire ground fault of grounding or non-grounding system. And this study presents railway high voltage power supply system model using PSCAD/EMTDC Vet 3.08 for circuit analysis and fault studies. In this paper, we propose protection method of non-grounding system of railway high voltage power supply system. The result shows its usefulness.

  • PDF

파일시스템 이미지 백업을 이용한 침입대응 및 파일복구 시스템 (Intrusion Response and Recovery System Using a File System Image Backup)

  • 이재광;임정목
    • 한국콘텐츠학회논문지
    • /
    • 제5권5호
    • /
    • pp.182-190
    • /
    • 2005
  • 컴퓨터와 인터넷의 보급이 일반화되면서, 현재 인터넷으로부터 기업이나 국가 조직 내부의 정보나 자원을 보호하기 위해 여러 가지 정보보호시스템을 비롯한 보안 네트워크를 구성하여 네트워크 및 시스템을 운영하고 있다. 그러나 인터넷과 같은 개방형 네트워크 환경에서 외부의 침입에 대한 가능성은 증대되고 있다. 현재 많은 보안 시스템들이 개발되고 있지만, 대부분 커널 레벨이 아닌 응용 레벨에서 구현되고 있다. 또한 다수의 파일 보호 시스템들이 개발되어 있지만, 사용상의 불편함 등으로 인해 널리 사용되지는 않고 있다. 본 논문에서는 적재 가능한 커널 모듈(LKM) 메커니즘을 사용하여 리눅스 상에서 파일 보호 기능을 제공하는 커널 모듈을 구현하였다. 주기적인 파일시스템에 대한 이미지 백업을 통하여, 침입으로 인한 손상이 발생한 경우 쉽게 손상된 파일 시스템을 복구한다.

  • PDF

네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘 (Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment)

  • 장은겸;이범석
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.215-219
    • /
    • 2022
  • Bankruptcy is one of the major areas that have attracted the interest of many researchers in the American system, particularly in terms of the laws that oversee it. It provides a plan of reorganization that enables the debtor or the proprietor to discharge liabilities to the creditors through dividing the assets to settle debts. This activity is carried out under supervision to fairly protect the interests of the creditors. Bankruptcy protection systems are dynamic and complex in nature, in line with the economic sector, ensuring the protection of affected individuals from falling into huge losses. Some bankruptcy procedures give the debtor the opportunity to stay in operation or business activity and benefit from revenues until the debt is settled. This law allows some debtors to be relived from any financial burden after the distribution of assets, even if the debt is not paid in full. In light of the above information, this research paper seeks to explore the nature of the complexity of bankruptcy protection laws, their characteristics, and the justice system that regulate them. It also sheds more light on the decision-making powers on bankruptcy cases. There are specialized courts that cover bankruptcy cases located in district courts in every state.

CC와 ISO 표준에 따른 침입방지시스템의 융합 성능평가 모델 (Convergence Performance Evaluation Model for Intrusion Protection System based on CC and ISO Standard)

  • 이하용;양효식
    • 디지털융복합연구
    • /
    • 제13권5호
    • /
    • pp.251-257
    • /
    • 2015
  • 침입방지시스템은 네트워크에서 공격 서명을 찾아내어 자동으로 조치를 취하여 비정상적인 트래픽을 중단시키는 보안시스템이다. 수동적인 방어를 하는 침입차단시스템이나 침입탐지시스템과 달리 침입경고 이전에 침입을 중단시키는 개념의 솔루션이다. 침입방지시스템의 보안성 성능은 보안감사, 사용자 데이터 보호, 보안 인증 등에 좌우되며 성능은 탐지시간, 처리량, 공격차단 성능 등에 좌우된다. 본 연구에서는 이러한 침입방지시스템의 보안성 성능평가를 위한 모델을 구축하기 위해 CC(Common Criteria : ISO/IEC 15408)와 소프트웨어 제품평가에 관한 ISO 국제표준을 근간으로 하여 융합 성능평가 모델을 구성하였다.

Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms

  • AlJeraisy, Lulwa Abdulmajeed;Alsultan, Arwa
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.367-372
    • /
    • 2022
  • In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has the biggest proportion of the overall market share when compared to other platforms including Windows, iOS, and Blackberry. This research will discuss the Android security features, vulnerabilities and threats, in addition to some existing protection mechanisms.

유비쿼터스 시스템을 이용한 소방설비 (Fire Protection equipment for Ubiquitous System)

  • 김남오;민완기;김병철;신석두;강원찬
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 전문대학교육위원
    • /
    • pp.139-144
    • /
    • 2005
  • In this paper, We are going to propose the fire protection system with using CAN(Controller Area Network). The larger, higher and deeper buildings are, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct embedded system based on CAN communication that is capable of N:N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put off it by using available system, this is major factor that reduces damage of our wealth, therefore in this studies We would like to design more stable system than current system. this system that is based on CAN communication which is available N:N communication constructs and is designed to compensate for each fault so that our aim is to reduce the line of system and cost of installation and to suppose future type fire protection system. We are simulated by NIST FDS(Fire Dynamics Simulator) to prove the efficiency of this system.

  • PDF

침입 탐지 시스템을 위한 효율적인 룰 보호 기법 (A Scheme for Protecting Security Rules in Intrusion Detection System)

  • 손재민;김현성;부기동
    • 한국산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.8-16
    • /
    • 2003
  • 본 논문에서는 기존의 네트워크 기반의 침입탐지 시스템인 Snort에 존재하는 취약성을 해결하기 위한 방법을 제안한다. 현재 룰 기반의 침입탐지 시스템인 Snort에서는 룰 자체를 보호하기 위한 방법을 제공하지 못한다. 이러한 문제를 해결하기 위해서 본 논문에서는 해쉬함수를 이용하여 룰 자체에 대한 보호를 제공할 수 있는 기법을 제안한다. 이러한 기법을 통하여 룰 자체에 대한 무결성과 기밀성을 제공할 수 있을 것이다.

  • PDF

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

전기철도 AT급전방식 보호시스템 최적구성 방안 연구 (A Study on the Protection System for AT Feeding on the Electric Railway)

  • 창상훈;이형수;홍재승;김정훈
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 1999년도 추계학술대회 논문집
    • /
    • pp.344-351
    • /
    • 1999
  • The safe operation of electro railways is greatly dependant on its protective systems. The system so-called Fault Protection Wire(FW) is now widely adapted to protect in AT feeding systems. It is connected between the feeder and trolley circuit to return the fault current to autotransfonmers at substation. This paper computed the distribution of fault currents at FW in the system and also evaluated the safety from electric shock when ground fault or flashover occur in the feeding system. The results show FW is useful to protect power supply network from fault in electric railways

  • PDF