• Title/Summary/Keyword: 방어시스템

Search Result 691, Processing Time 0.029 seconds

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

Minimum Detectable Radioactivity Concentration of Atmospheric Particulate Measurement System for Nuclear Test Monitoring (핵활동 감시를 위한 대기 입자 측정시스템의 최소검출 방사능 농도 결정)

  • Kim, Jong-Soo;Yoon, Suk-Chul;Shin, Jang-Soo;Kwack, Eun-Ho;Choi, Jong-Seo
    • Journal of Radiation Protection and Research
    • /
    • v.22 no.2
    • /
    • pp.111-117
    • /
    • 1997
  • Recently, the conclusion of Comprehensive Test Ban Treaty(CTBT) is globally constructing a network system for nuclear test monitoring. The radionuclide experts of the Conference on Disarmament recommended that the detection of nuclear debris in the atmosphere was an essential factor of nuclear test monitoring and proposed the technical requirements. Based on those requirements, atmospheric radionuclide monitoring system to detect nuclear debris generated from the nuclear explosion test was composed. The system is comprised of high volume air sampler(HVAS), filter paper presser and high purity germanium detector(HPGe). Minimum detectable concentrations(MDCs) of the key nuclides requiring in CTBT monitoring strategies are determined by considering of decay time, counting time and flow rate of the high volume air sampler for the rapid explosion and the optimum measurement condition. The results were selected $10{\pm}$2h, $20{\pm}$2h and $850{\pm}50m^3$/h as parameters, respectively. The relation between the natural air-borne radionuclide concentration of $^{212}Pb$ and MDC were calculated which gave effect in the Compton continuum baseline due to those nuclides in the gamma-ray spectroscopy. These results can be used as an actually tool in the CTBT monitoring strategies.

  • PDF

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Research for Intestinal Mucosal Immunity Induced by Salmonella enteritidis Infection (Salmonella enteritidis 감염에 의해 장내 점막에서 유도되는 면역반응에 관한 연구)

  • Lee, Kang-Hee;Lee, Se-Hui;Yang, Jin-Young
    • Journal of Life Science
    • /
    • v.32 no.1
    • /
    • pp.36-43
    • /
    • 2022
  • Mucosal immunity is a well-designed defense system that builds precise and dynamic relationships against pathogens, and the gastrointestinal tract is the most important organ with this system, acting as a guardian at the forefront of its activity. Salmonella spp. cause food poisoning, entering the body orally and mainly invading the Peyer's patches of the small intestine. Although Salmonella strains share similar mechanisms for inducing innate immunity, different serotypes may have different effects on the intestinal mucosa due to host specificities and pathogenicity. In this study, we evaluated the effects of Salmonella enteritidis infections in mouse intestine and observed significantly reduced dose-dependent survival rates in a challenge test. Flow cytometry data showed no significant differences in intestinal immune cell populations, although histology indicated increased mucin production and decreased goblet cell counts in the Salmonella-treated groups. Furthermore, Claudin expression was significantly decreased in the samples with Salmonella. To investigate the relationship between S. enteritidis infection and inflammatory response, dextran sodium sulfate (DSS) was administered after infection and the results indicate lower survival rate after DSS treatment. In conclusion, we were able to identify the optimal concentration of S. enteritidis to modulate the intestinal mucosal immunity of mice and inflammatory response.

Automation of Regression Analysis for Predicting Flatfish Production (광어 생산량 예측을 위한 회귀분석 자동화 시스템 구축)

  • Ahn, Jinhyun;Kang, Jungwoon;Kim, Mincheol;Park, So-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.128-130
    • /
    • 2021
  • This study aims to implement a Regression Analysis system for predicting the appropriate production of flatfish. Due to Korea's signing of FTAs with countries around the world and accelerating market opening, Korean flatfish farming businesses are experiencing many difficulties due to the specificity and uncertainty of the environment. In addition, there is a need for a solution to problems such as sluggish consumption and price drop due to the recent surge in imported seafood such as salmon and yellowtail and changes in people's dietary habits. in this study, Using the python module, xlwings, it was used to obtain for the production amount of flatfish and to predict the amount of flatfish to be produced later. was used to predict the amount of flatfish to be produced in the future. Therefore, based on the analysis results of this prediction of flatfish production, the flatfish aquaculture industry will be able to come up with a plan to achieve an appropriate production volume and control supply and demand, which will reduce unnecessary economic loss and promote new value creation based on data. In addition, through the data approach attempted in this study, various analysis techniques such as artificial neural networks and multiple regression analysis can be used in future research in various fields, which will become the foundation of basic data that can effectively analyze and utilize big data in various industries.

  • PDF

A Candidate Generation System based on Probabilistic Evaluation in Computer Go (확률적 평가에 기반한 컴퓨터 바둑의 후보 생성 시스템)

  • Kim, Yeong-Sang;Yu, Gi-Yeong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.2
    • /
    • pp.21-30
    • /
    • 2000
  • If there exists a model that calculates the proper candidate position whenever the game of Go is in progress, it can be used for setting up the prototype of the candidate generation algorithm without using case-based reasoning. In this paper, we analyze Go through combinatorial game theory and on the basis of probability matrix (PM) showing the difference of the territory of the black and the white. We design and implement a candidate generation system(CGS) to find the candidates at a situation in Go. CGS designed in this paper can compute Influence power, safety, probability value(PV), and PM and then generate candidate positions for a present scene, once a stone is played at a scene. The basic strategy generates five candidates for the Present scene, and then chooses one with the highest PV. CGS generates the candidate which emphasizes more defence tactics than attack ones. In the opening game of computer Go, we can know that CGS which has no pattern is somewhat superior to NEMESIS which has the Joseki pattern.

  • PDF

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

A Study on Segmentation and Priority of Tactical Considerations (METT+TC) (전술적 고려요소 (METT+TC)의 세분화 및 우선순위 결정에 관한 연구)

  • Han, Seung-Jo;Park, Joon-Hyoung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.173-181
    • /
    • 2016
  • The objective of this study is to subdivide the tactical considerations (METT+TC; Mission, Enemy, Terrain & Weather, Troops available, Time available, Civil considerations) through Delphi method and prioritize those via AHP (Analytic Hierarchy Process). Though it has been taken for granted that the tactical considerations were inevitable for decision making relating to military operations, their segmentation and priority have not been studied sufficiently in military. The data for Delphi method and AHP were based on interview with military experts and questionnaires answered by those. Six tactical considerations were segmented into 34 sub-considerations by Delphi, and Six tactical considerations and 34 sub-ones were prioritized through AHP in attack and defense aspects. If the research results will be embedded into database of automatic command and control system (e.g. ACTIS; Army Tactical Command Information System), effective decision-making process will get easier and faster.

A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti (윈도우즈 라이브러리로 위장한 Proxy DLL 악성코드 탐지기법에 대한 연구 : Winnti 사례를 중심으로)

  • Koo, JunSeok;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1385-1397
    • /
    • 2015
  • The Proxy DLL is a mechanism using a normal characteristics of Windows. Specific malware is executed via this mechanism after intrusion into a system which is targeted. If a intrusion of malware is successful, malware should be executed at least once. For execution, malware is disguised as a Windows Library. The malware of Winnti group is a good case for this. Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab. Winnti group activities was negatively over the years to target the online video game industry, in this process by making a number of malware infected the online gaming company. In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case. The experiments that are undertaken to target real malware of Winnti show reliability of detection techniques.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF