• Title/Summary/Keyword: 관제권

Search Result 48, Processing Time 0.035 seconds

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

A Study on development of evaluation indicators on the Managed Security Service(MSS) (보안관제 업무에 대한 평가지표 개발 연구)

  • Lee, Hyundo;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1133-1143
    • /
    • 2012
  • Currently, Many Cyber Security Centers(CSC) are established and being operated in our country. But, in the absence of indicators to evaluate activities of the Managed Security Service(MSS), We can't identify the CSC's level of overall job performance. Therefore, we can't derive strengths and weaknesses from the CSC. From these reasons, The purpose of this research is to develop an objective indicator to evaluate activities of the MSS. I studied both international and domestic Information Security Management System(ISMS) as related standards(ISO/IEC 27001, G-ISMS). Moreover, I analysed the NIST Computer Security Incident Handing Guide and the Incident Management Capability Metrics(IMCM) of Carnegie Mellon Software Engineering Institute(SEI). The implications for this analysis and domestic hands-on experience are reflected in the research. So I developed 10 evaluation domains and 62 detail evaluation items. This research will contribute to our understanding the level of the CSC's job performance.

Expert-novice differences in visual information processing in air traffic control (항공관제 전문가와 훈련관제사의 시각정보처리 차이)

  • Kwon, Hyok-Jin;Ham, Seong-Soo;Kim, Hye-Jeong;Han, Jung-Won;Sohn, Young-Woo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.1
    • /
    • pp.72-82
    • /
    • 2010
  • This study investigated how air traffic controllers (ATCs) perceive the visual information on radar screen and examined quantitative and qualitative differences as a function of expertise. Little research has shown that how much information is processed by ATC visually and perceptually, how ATCs represent the information, and what difference exists between experts and novices. Participants were asked to draw representing visual information on the blank sector map after a 5-second exposure. Data were analyzed by a superimposing method to identify correctly represented information. Results showed that the expert group had much larger size of chunking and their pattern was wider and more accurate than the novice group. The practical application and methodological implications are also discussed for further research.

TRS를 이용한 선박위치 자동발신장치 적용방안에 대한 연구

  • Kim, Seok-Jae;Gwon, Gi-Saeng
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.06a
    • /
    • pp.1-3
    • /
    • 2011
  • 선박관제시스템(VMS)는 최근 선박에서 도입되어 설치된 선박자동식별장치(AIS)에 의해 많은 정보를 획득하여 처리하고 있으나 AIS가 미설치된 소형선박, 어선 및 기타선박들에 대해 지속적으로 설치를 확대하고 있다. 특히 항계 내의 선박들의 주 통신시스템인 VHF 무선전화기는 항내에 입출항 중인 모든 선박들이 사용하기 때문에 통화 교신량의 폭주로 원활한 통신이 힘들어지고 또한 선박자동식별장치의 데이터 통신채널 또한 VHF이므로 class A 선박들도 동적 데이터의 누락현상이 발생하고 class B 선박들도 지역적으로 데이터 폭주현상이 발생하는 것으로 평가되고 있는 실정이다. 따라서 연안에서 운항하고 있는 모든 선박들을 모니터링하기 위해 소형선 및 심지어 어선들까지 선박자동식별장치의 설치를 유도하고 있는 실정이므로 통신채널의 폭주현상에 따른 데이터 누락현상은 더욱 심해질 것이다. 따라서 본 연구는 주파수공용방식(TRS: Trunk Radio System)의 통신시스템을 이용한 선박위치 자동발신장치에 적용방안을 제안하고 그 활용성을 입증하고자 한다.

  • PDF

A Study On Information Security Data Collecting System For Security Monitoring Of Education Facilities (교육기관 보안관제를 위한 효율적인 정보보호 수집체계에 관한 연구)

  • KWEON, SEONG-HO;AHN, JAE-HO;YOON, SUNG-JUN
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.597-598
    • /
    • 2009
  • 최근의 국가 민간의 정보시스템을 위협하는 공격들은 점점 더 복잡해지고 정교해지고 있다. 이러한 공격들에 대응하기 위하여 범국가적으로 사이버안전센터들이 설립 운영되고 있다. 그러나 이러한 대량의 정보보호 데이터를 수집 분석 대응하는 것은 여러 가지 어려움들이 존재한다. 그 문제의 본질적인 부분은 바로 방대한 데이터의 양(量)이다. 다수의 보안관제 대상 인프라들의 모든 보안데이터를 수집 하는 것은 사실상 불가능하며, 대부분의 센터들은 네트워크 접점에 중앙관리형 보안인프라를 설치함으로써 그 해결점을 찾고 있지만, 이는 최근의 나타나고 있는 다차원적인 공격에 대응하기에는 한계가 있다. 본 논문에서는 이러한 다차원 분석시스템의 기본데이터가 되는 여러 보안정보를 효과적으로 수집할 수 있는 보안정보 수집체계를 제시하고자 한다.

A Study on the Improvement of the Subway Protective Guards System (지하철보안관제도의 활성화 방안에 관한 연구)

  • Lee, Sol-Ji;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.133-154
    • /
    • 2016
  • The Seoul subway system has one of the highest transport shares in the city of Seoul. A high number of passengers means that a high level of crimes of all kinds occur on the city's subway system. As such, Seoul Metro, created the Subway Protective Guards System in 2009, in an effort to enhance safety on the subway. But this innovative new system did not resolve problems. In fact, many citizens came to question the effectiveness of the new system, as it did not yield tangible results. This study seeks to deduce the problems and activation strategy of the Subway Protective Guards System. An in-depth study was conducted by interviewing subway protective guards who were squad leaders with five or more years of relevant work experience. Semi-structured interview analysis was utilized to evaluate their responses. Specifically, their responses were deduced to identify the strengths and weaknesses internal to the system and the opportunities and threats posed by the environment external to the system. This study presents measures to improve the system based on the aforementioned analysis. Measures for improvement focused on the following areas: the adoption of an education system in response to terror; recruitment and the possibility of becoming a permanent employee; obtaining partial judicial powers; improvement of work environment; and intensifying the promotion of the system.

  • PDF

Analysis of AIS Problems in Broad Communication Coverage (광역 통신권에서의 AIS 문제점 분석)

  • Kim, Byung-ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.430-432
    • /
    • 2013
  • AIS(Automatic Identification System) is a radionavigation equipment for exchanging safety related information between ships as well as ship and shore station, introduced by SOLAS convention and widely used especially in vessel traffic service. However, in an area of broad communication coverage of coast station, various problems may appear in receiving AIS data from ships. In this paper, AIS problems that may happen in broad communication coverage of coast station are analyzed using received data.

  • PDF

광역 VTS 도입에 관한 국제법적 검토

  • Lee, Yun-Cheol
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.46-48
    • /
    • 2007
  • VTS가 국제적으로 성공하기 위해서는 유엔해양법협약의 기본정신에 따라 IMO차원의 국제협약이 마련되어야 하며, 국내 이행입법이 도입되어 법적 실효성을 확보해야 한다. 또한 주변국가간 협력체제를 통한 광역 VTS의 도입으로 연안국의 관할권을 벗어나는 수역에서의 해양사고발생을 방지하고(사전 예방), 사고선박에 대한 해난구조체계(사후구제)를 효과적으로 운영하기 위한 국제법적 제도가 도입되어야 하므로, 이에 대한 기초검토로써의 의미를 가진다.

  • PDF

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.