• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.034 seconds

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

A Method of Identifying Ownership of Personal Information exposed in Social Network Service (소셜 네트워크 서비스에 노출된 개인정보의 소유자 식별 방법)

  • Kim, Seok-Hyun;Cho, Jin-Man;Jin, Seung-Hun;Choi, Dae-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1103-1110
    • /
    • 2013
  • This paper proposes a method of identifying ownership of personal information in Social Network Service. In detail, the proposed method automatically decides whether any location information mentioned in twitter indicates the publisher's residence area. Identifying ownership of personal information is necessary part of evaluating risk of opened personal information online. The proposed method uses a set of decision rules that considers 13 features that are lexicographic and syntactic characteristics of the tweet sentences. In an experiment using real twitter data, the proposed method shows better performance (f1-score: 0.876) than the conventional document classification models such as naive bayesian that uses n-gram as a feature set.

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.

GPS Based Sensor Network Research for Prediction of Incident (GPS 기반 돌발 상황 예측을 위한 센서네트워크 연구)

  • Jung, Hui-Sok;Won, Dae-Ho;Yang, Yeon-Mo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.454-456
    • /
    • 2010
  • The demands for (a) individual vehicle has been gradually increasing recently due to increase of personal income and spare time. In 2009, the quantities of registered vehicles exceeds over 17,325,210 millions pieces, and the risks of traffic accidents and traffic jam are increasing days by days. It has some limitations to solve the problem of traffic jam by transportation facilities and causes lots of time and costs. For a possible solution, ITS(Intelligent Transport System) has been introduced, but it is an insufficient way for abrupt incidents or risks on roads. The riskiest matter on driving a vehicle is unforeseen situation. In this paper, the most efficient and economical system that communicates with a driver about unexpected accident by sensor network and GPS information, is introduced rather than a traditional method associated with lots of time and costs.

  • PDF

Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment (원격 저장소 환경에서 다중 키워드를 이용한 효율적인 검색 가능한 대칭키 암호 시스템)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.199-206
    • /
    • 2011
  • Removable Storage provides the excellent portability with light weight and small size which fits in one's hand, many users have recently turned attention to the high-capacity products. However, due to the easy of portability for Removable Storage, Removable Storage are frequently lost and stolen and then many problems have been occurred such as the leaking of private information to the public. The advent of remote storage services where data is stored throughout the network, has allowed an increasing number of users to access data. The main data of many users is stored together on remote storage, but this has the problem of disclosure by an unethical administrator or attacker. To solve this problem, the encryption of data stored on the server has become necessary, and a searchable encryption system is needed for efficient retrieval of encrypted data. However, the existing searchable encryption system has the problem of low efficiency of document insert/delete operations and multi-keyword search. In this paper, an efficient searchable encryption system is proposed.

Development of Urban Flash Flood Warning System Using X-band Dual-Polarization Radar (X-밴드 이중편파 레이더를 이용한 도시 돌발홍수 경보시스템 개발)

  • Lee, Dong-Ryul;Jang, Bong-Joo;Han, Myung-Sun;Hwang, Suk-Hwan;Noh, Huiseong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.21-21
    • /
    • 2017
  • 최근 서울, 부산, 울산 등에서 도시 돌발홍수가 빈번히 발생하고 있고 이에 따른 인명 손실 및 재산 피해가 빠르게 증가하고 있다. 그러나 집중 호우의 대부분은 저고도 대기에서 생성 및 발달되며, 소멸까지의 시간은 2-3 시간에 불과하여 기존의 우리나라 수문기상 관측시스템은 이러한 유형의 강우량 예측에 많은 어려움을 겪고 있는 실정이다. 이 문제를 해결하기 위해 기상, 재난 관련 정부 기관들이 저고도 수문기상 관측을 위한 도시형 X-밴드 레이더 네트워크 구축을 계획하고 있다. 본 연구의 목적은 그보다 선행하여 돌발성 수문기상 재해연구를 위해 한국건설기술연구원에서 도입한 X-band 이중 편파 레이더 시스템을 이용하여 보다 간단하고 정확한 재난 감시 및 예경보 시스템을 개발하는데 있다. 본 연구에서는 X-밴드 레이더 데이터로부터 추정된 정량적 강수량을 모니터링 하여 도시 지역의 돌발홍수를 자동으로 경고하는 방법을 제안한다. 또한 Google 어스 플랫폼을 사용하여 정확한 3D QPE-GIS 매칭 기법을 개발함으로써, 심각한 수문기상 현상이 발생하는 정확한 위치를 추적하고 직관적인 경보서비스를 가능케 한다. 본 연구에서 제안하는 경보시스템은 레이더 데이터 분석도구, 위험결정 도구 및 위험경고 표시 도구의 세 가지 기술로 구성된다. 제안된 돌발홍수 경보시스템은, 시뮬레이션을 통해 X-밴드 레이더 데이터로부터 정량적 강수량이 계산되며, GIS 상에서 레이더 반사도 및 강우강도가 3차원 이미지 형태로 표시된다. 그런 다음 Google 어스에서 3D 큐브 블록으로 대표되는 강수량이 동시에 누적표출 되도록 설계되었다. 또한 분석된 X-밴드 레이더 데이터로부터 지역별 누적 강수량을 업데이트 및 모니터링하고 기 설정된 돌발홍수 발생 한계치(trigger)에 도달하면 홍수경보 메시지를 표시한다. 향후, 제안된 경보시스템에 대한 기술적 도구를 개선하면서 대규모 수문기상 레이더 네트워크로 광범위한 강우를 모니터링하면 전국적인 돌발홍수 경보시스템으로 확대가 가능하다.

  • PDF

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

Development of big data-based water supply and demand analysis technique for digital new deal (디지털 뉴딜을 위한 빅데이터 기반 물수급 분석 기법 개발)

  • Kim, Jang-Gyeong;Moon, Soo-Jin;Nam, Woo-Sung;Kang, Shin-Uk;Kwon, Hyun-Han
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.76-76
    • /
    • 2021
  • 물정보 중 가뭄 정보가 상대적으로 부족한 원인은 무엇을 가뭄으로 볼 것인지 정의하기 어렵기 때문이다. 특히 우리나라와 같이 댐 및 저수지, 광역상수도 등 수자원시스템 네트워크를 기반으로 물공급이 이루어지는 경우, 개별 요소만을 고려한 기존 가뭄모니터링 및 전망은 현실적이지 못하며, 가뭄 위험도 관리 측면에서도 부족한 부분이 있다. 가뭄 현상의 경우 기상학적 영향인 강수의 부족이 가장 큰 요소로 기여하지만 실질적으로 국민에 필요한 양보다 적은 양의 물이 공급될 때 국민들은 가뭄을 체감한다. 이러한 점을 보완하기 위하여 지역별로 사용하는 수원 및 물수급 시설 등을 세분화하고, 실적기반 분석을 통해 분석대상 지역의 가뭄을 정확히 판단하기 위한 합리적인 물수급 분석 모형 개발이 필요하다. 즉, 공간분석단위를 표준유역 단위 이하의 취방류 시설물을 기준으로 구성하고, 이들 시설물의 운영정보와 수문기상 빅데이터를 연계한 물순환 모형을 구현함으로써 댐, 저수지, 하천 등 다양한 수원을 가지는 유역 내 가용 수자원량을 준실시간 개념으로 평가하는 시스템의 개발이 필요하다. 본 연구에서는 하천을 중심으로 물수급 관련 수요·공급 시설의 위치를 절점으로 부여하고 연결하는 물수급 네트워크 알고리즘을 통해 빅데이터 기반 물수급 분석 모형을 개발하였다. 주요 모니터링 지점 및 모든 이수 시설의 위치를 유역분석 기법을 통하여 점(point), 선(line), 면(shape)으로 구성된 지형공간정보의 위상(topology) 관계를 설정하여 물수급 분석의 계산순서를 선정하고, 시계열 DB를 입력하여 지점별 물수급 분석 결과를 도출하였다. 권역별 주요 수위-유량관측소 1:1 Nash 계수를 검증한 결과 저유량에서 0.8 이상의 높은 재현 성능을 보이는 것으로 나타났다. 이에 따라 본 연구에서 개발된 물수급 분석 모형은 향후 물관련 이슈 지역의 용수공급능력 평가 및 수자원장기종합계획 등 다양한 수자원 정책평가에 활용될 것으로 기대된다.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF