• Title/Summary/Keyword: 보안상황인지

Search Result 73, Processing Time 0.024 seconds

Study on security log visualization and security threat detection using RGB Palette (RGB Palette를 이용한 보안 로그 시각화 및 보안 위협 인식)

  • Lee, Dong-Gun;Kim, Huy Kang;Kim, Eunjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.61-73
    • /
    • 2015
  • In order to respond quickly to security threats that are increasing fast and variously, security control personnel needs to understand the threat of a massive amount of logs generated from security devices such as firewalls and IDS. However, due to the limitations of the information processing capability of humans, it takes a lot of time to analyze the vast amount of security logs. As a result, there is problem that the detection and response of security threats are delayed. Visualization technique is an effective way to solve this problem. This paper visualizes the security log using the RGB Palette, offering a quick and effective way to know whether the security threat is occurred. And it was applied empirically in VAST Challenge 2012 dataset.

User Recognition of Each Personal Identification Technique based on the Biometrics (생체인식기술 기반 개인인증수단에 따른 사용자 인식)

  • Yook, Moses;Kim, Hee-Yeon;Shim, Hye-Rin
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.11-19
    • /
    • 2016
  • The personal identification based on the biometrics has emerged as one of the new trend. This study attempted to explore and examine the user recognition in the use of the personal identification based on the biometrics in the respect of self-efficacy, trustiness, security, and safety alongside the effect of the recognition on the future use intention through survey. The result of this study demonstrated the effect on the use intention of the perceived trustiness and ease of the fingerprint identification, perceived ease of the iris identification and the perceived trustiness of the vein identification. The result of this study is expected to suggest direction on the application of the biometrics considering user recognition.

A Driving Information Centric Information Processing Technology Development Based on Image Processing (영상처리 기반의 운전자 중심 정보처리 기술 개발)

  • Yang, Seung-Hoon;Hong, Gwang-Soo;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.31-37
    • /
    • 2012
  • Today, the core technology of an automobile is becoming to IT-based convergence system technology. To cope with many kinds of situations and provide the convenience for drivers, various IT technologies are being integrated into automobile system. In this paper, we propose an convergence system, which is called Augmented Driving System (ADS), to provide high safety and convenience of drivers based on image information processing. From imaging sensor, the image data is acquisited and processed to give distance from the front car, lane, and traffic sign panel by the proposed methods. Also, a converged interface technology with camera for gesture recognition and microphone for speech recognition is provided. Based on this kind of system technology, car accident will be decreased although drivers could not recognize the dangerous situations, since the system can recognize situation or user context to give attention to the front view. Through the experiments, the proposed methods achieved over 90% of recognition in terms of traffic sign detection, lane detection, and distance measure from the front car.

A Study on Security Association Based on Context-Aware for Privacy Protection in U-City (U-City 환경에서의 개인정보보호 향상을 위한 상황인지기반 보안 기법 연구)

  • Lee, Jun-Gyu;Lee, Chang-Hun;Kim, Ji-Ho;Song, Oh-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1132-1134
    • /
    • 2008
  • 현재 우리나라는 미래형 첨단도시, U-City구현을 현실화 하고 있다. 유비쿼터스 기반기술이 총망라되는 U-City의 건설은 우리에게 편리하고 윤택한 삶을 약속하지만 U-City속의 수많은 유 무선 단말을 통해 수집되는 개인이나 사물, 환경에 대한 정보는 전자감시에 대한 우려와 이용자 프라이버시 침해를 유발하는 원인이 될 수 있으며 그에 심각성은 작금의 정보화 사회에 비할 수 없이 클 것으로 예상된다. 이에 본 논문에서는 U-City에서 발생할 수 있는 개인정보 침해위협을 통합적으로 살펴보고 개인정보보호 향상을 위한 보안 기법을 연구하였다.

The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties (비용편익분석 프레임워크를 통한 개인정보가치에 대한 연구: 개인적 특성, 거래 상대방 특성, 상황적 특성을 중심으로)

  • Jaehyun Park;Eunkyung Kweon;Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.155-177
    • /
    • 2017
  • The purpose of this study is to investigate those factors that are influenced when a user recognizes his/her private information value as an economic asset. The relationship among these factors will also be discussed. This research targets Internet users, and the value of their private information will be converted into economic figures. How economic value changes in relation with individual attributes, dealer's traits, and circumstantial properties will also be studied. The changes in the factors of private information value under different situations will be analyzed from an economic perspective. By using the cost-benefit analysis framework, this work hypothesizes that the user's private information value can be influenced by individual attributes and situational properties. in the business aspect, this study can help users recognize the true value of their personal information and minimize the cost resulting from private information security incidents. This work also highlights the necessity of estimating the scale of investments for protecting private information. Overall, this research will proceed under the hypothesis that the users' recognition of their private information value is influenced by the attributes of the individual, dealers, or situations.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Secure Camera Network System for Intelligent Surveillance Systems Based on Real-Time Video (실시간 영상 기반의 지능형 보안 관제 시스템을 위한 안전한 카메라 네트워크 시스템)

  • Yang, Soo-mi;Ko, Eun-kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1102-1106
    • /
    • 2015
  • To provide social security and for cooperative smart camera context awareness processing, each camera stores and exchange context data. For a specific event, measured values with other context data is stored RDB. RDB is transformed to ontology RDF file and is used for context reasoning. Interoperability between smart cameras conforms to ONVIF and constitutes intelligent surveillance system. To guarantee the confidentiality and integrity, securiy techniques are adopted. Security overhead between agents is analyzed in the prototype system implemented.

A Model Using IOT Based Railway Infrastructure Sensor Data for Recognition of Abnormal state (IOT기반 철도인프라 데이터를 활용한 이상상황 인식모델)

  • Jang, Gyu-JIn;Ahn, Tae-Ki;Kim, Young-Nam;Jung, Jae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.771-773
    • /
    • 2018
  • 인공지능(AI), 사물인터넷(IoT)등의 4차 산업기술은 철도안전의 핵심수단으로 부상하고 있으며 차량, 위험관리, 운행관리, 보안관리 등의 점진적인 적용분야 확장을 통해 철도안전에 대한 신뢰성을 향상시킬 수 있는 방안에 대한 관심이 집중되고 있다. 본 논문에서는 IoT 기반의 다양한 철도인프라 데이터를 활용하여 열차주행상태에 영향을 줄 수 있는 이상상황 인식 모델 및 열차자율주행을 위한 제어기술에 필요한 정보로 인프라 상태를 제공하는 방식을 제안한다. 철도 인프라 상황인지에 필요한 데이터는 레일온도, 선로 지정물, 승객 수, 선로 적설량을 지정하였고, 제안 인식모델의 스게노 퍼지추론 방식을 적용한 후 철도차량 운전관련 취급규정 및 취급세척을 기반으로 퍼지규칙(Fuzzy Rule)을 15개 생성하였다. 인프라데이터셋을 활용하여 제안모델의 인식률 평가에 사용하였으며 인식률 결과는 약 86%의 정확성을 보였다. 퍼지추론 기반 방식의 철도인프라 이상상태 인식모델을 철도분야에 접목시킨다면 기존의 관제기반 방식보다 효율적인 철도인프라 상황인식이 가능할 것으로 판단된다.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.