• Title/Summary/Keyword: 시스템 감시 도구

Search Result 66, Processing Time 0.031 seconds

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.

Design and Implementation of Modified Web Contents Detection System (웹 컨텐츠 변경 탐지 시스템의 설계 및 구현)

  • 김영선;장덕철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.91-97
    • /
    • 2004
  • As the electronic commercial transaction is being transacted by contents which can get an illegal intrusion from the outside, we sincerely require security for them. We must consider a protection countermeasure about intrusion from protection of the passive form to protection intrusion of the active one. So the security is required against hackers illegality intrusion into the contents. As soon as the intrusion happens about the contents, the tools providing the monitor of contents are required to minimize the damage to the systems. Modified web contents detection system in this paper prevents the loss of resources and manpower required through individually monitoring on the web. Also, this paper offers rapid support of security that it analyzes the weakness of contents security of the web environment and the cause of the problem with the leakage of information. So this system has the pur pose of protecting the weakness of contents security and the leakage of information.

  • PDF

Application of Satellite Remote Sensing and Geographic Information Systems for Fisheries and Marine Information (수산.해양 정보화를 위한 RS 및 GIS 기술의 활용)

  • 윤홍주;김상우;남광우
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.1068-1075
    • /
    • 2003
  • Today, satellite remote sensing and geographic information systems plays an important role as a advanced science and technology, and becomes a superpower tool of the study and research in various fields of Earth Science. This study reviews the application of satellite remote sensing and geographic information systems for many specialists in the fields of the fishery and ocean science. In future, satellite remote sensing and geographic information systems will be greatly used to observed, monitor and predict various phenomena associated with the fisheries and oceans, in order to seek safety in a natural disaster, and menage and conserve the fisheries and resources and the oceanic environments.

Evaluating the Success Factors of Microfinance : A Case Study of Grameen Bank (마이크로파이넨스 성공요인 연구 : 그라민 은행 사례)

  • Nargis, Farhana;Lee, Sang-Ho;Kwon, Kyung-Sup
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.3
    • /
    • pp.65-73
    • /
    • 2012
  • Microfinance has been an important tool for the economic growth and poverty alleviation. But the success factors and risk factors have not been synthesized in academic literature. This article has paid attention to success factors and potential risk of the Grameen Bank. Grameen Bank methodology is almost the reverse of the conventional banking methodology. Conventional banking is based on the principle that the more you have, the more you can get. Founder of Grameen Bank, Professor Yunus pointed out that, "The least you have the highest you have the priority to receive a loan". On the basis of theoretical literature, there have been different kinds of success factors of microfinance observed in this paper. Key success factors of Grameen Bank are like these: innovation, strict administrative structure, adaptation and learning practice, incentive system. Complementary services such as business consulting and brokerage will contribute to borrowers' economic performance development.

  • PDF

Development of UAV Flight Control Software using Model-Based Development(MBD) Technology (모델기반 개발기술을 적용한 무인항공기 비행제어 소프트웨어 개발)

  • Moon, Jung-Ho;Shin, Sung-Sik;Choi, Seung-Kie;Cho, Shin-Je;Rho, Eun-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.12
    • /
    • pp.1217-1222
    • /
    • 2010
  • This paper describes the Model-Based Development(MBD) process behind the flight control software of a close-range unmanned aerial vehicle(KUS-9). An integrated development environment was created using a commercial tool(MATLAB $Simulink^{(R)}$), which was utilized to design models for linear/nonlinear simulation, flight control law, operational logic and HILS(Hardware In the Loop Simulation) system. Software requirements were validated through flight simulations and peer reviews during the design process, whereas the models were verified through the application of a DO-178B verification tool. The integrity of automatically generated C code was verified by using a separate S/W testing tool. The finished software product was embedded on two different types of hardware and real-time operating system(uC/OS-II, VxWorks) to perform HILS and flight tests. The key findings of this study are that MBD Technology enables the development of a reusable and an extensible software product and auto-code generation technology allows the production of a highly reliable flight control software under a compressed time schedule.

The SAR Chart Viewer design and Implementation in mobile web (모바일 웹에서의 SAR Chart Viewer 설계 및 구현)

  • Lim, Il-Kwon;Kim, Young-Hyuk;Lee, Jae-Gwang;Lee, Jae-Pil;Jang, Haeng-Jin;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2097-2104
    • /
    • 2013
  • Scientific and technological research data is increasing exponentially and, Kisti(Korea Institute of Science and Technology Information) built and supported GSDC(Global Science experimental Data hub Center) depending on the needs processing large data computing and storage devices. Mobile web standards-based the MUPS was built for global community and services of gsdc to spreading mobile devices rapidly. And for analyze Operational status and system resources of GSDC at n this paper researched and implemented system resource monitor method of gsdc to mobile web environment, in this paper researched and implemented system resource monitor method of gsdc to mobile web environment. Research support system of GSDC operated by scientific linux. Sysstat resource monitoring tools create a daily report through sar(system analysis report), after sadc(system activity data collector) collected system resource utilization information. In this paper, sar reports designed and implemented in mobile web to can visualize in a mobile environment. We do not depend specific OS by implementation of the mobile web. So we are available in variety mobile OS. And through provided visual graph, this system can monitor easily and more conveniently then the existing system.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

Drainage Control and Prediction of Slope Stability by GIS-based Hydrological Modeling at the Large Scale Open Pit Mine (GIS에 의한 대규모 노천광에서의 배수처리 및 사면안정 예측)

  • SunWoo, Choon;Choi, Yo-Soon;Park, Hyeong-Dong;Jung, Yong-Bok
    • Tunnel and Underground Space
    • /
    • v.17 no.5
    • /
    • pp.360-371
    • /
    • 2007
  • This paper presents an application of drainage control and slope stability by GIS-based hydrological modeling to control the surface water from an operational point of view. This study was carried out on a region of Pasir open-pit coal mine, Indonesia. A detailed topographical survey was performed at the study area to generate a reliable DEM (Digital Elevation Model). Hydrology tools implemented in ArcGIS 9.1 were used to extract the characteristics of drainage system such as flow direction, flow accumulation and catchment area from DEM. The results of hydrological modeling and spatial analysis showed that current arrangement of pumping facility is not suitable and some vulnerable places to erosion exist on the bench face due to concentrated surface runoff. Finally, some practical measures were suggested to optimize the design of drainage system and to monitor the slope stability by the surface water management at the study region during heavy rainfall.

A Study on Measurement of Penetration Depth of Steel Pipe Using the Impact-Echo Method (충격탄성파법에 의한 강관구조물 근입깊이 측정에 관한 연구)

  • Lee, Sang Hun;Kumagai, Takayuki;Endo, Takao;Han, Youn Hee
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.89-89
    • /
    • 2011
  • 도로의 가드레일 지주 근입깊이의 부족에 의한 자동차의 전락사고 이 후, 일본의 국토교통성 등의 관계자들이 그 대책 세우기에 부심해 왔으나, 기설 지주의 근입깊이를 측정할 수 있는 방법은 아직까지 알려져 있지 않으며, 현재로서는 작업의 전 과정을 비디오로 촬영하여 그 기록을 남기도록 되어있다. 그러나 그것은 상당히 비효율적인 작업으로 엄밀한 감시기능을 다하지 못하고 있으며, 감독자와 시공자의 양자로부터 계측 도구의 개발이 절실히 요구되고 있다. 일부의 초음파 측정기 업자가 가드레일 지주의 근입깊이를 측정할 수 있다고 주장하고 있으나, 시장에는 아직 나타나지 않고 있으며, 그 측정시스템의 측정여부와 성능의 검증이 이루어지지 않고 있는 상황이다. 지금까지 충격탄성파법 또는 초음파법을 이용하여, 매설된 가드레일 지주의 근입깊이를 측정한 성공사례가 정식으로 보고된 바는 없으며, 같은 강관주인 눈사태 방지책의 지주 파이프에 대한 근입깊이의 측정은 본 연구그룹의 의해 행하여진 바가 있다. 검사봉이나 해머 등으로 대상물을 두드려서 탄성파를 발생시키고, 그것을 가속도계 또는 속도계의 진동센서로 감지하여 그 파형을 분석함으로써 대상물의 치수 등을 측정하는 충격탄성파법은, 특히 콘크리트를 대상으로 공동 및 매설물 등의 탐사, 균열깊이의 측정 등에 폭 넓게 사용되고 있다. 하지만 이 측정방법을 가드레일의 지주의 근입깊이 측정에 적용할 경우, 일반적으로 행하여지는 방법, 즉 진동센서를 대상물의 상단부(캡)에 설치하는 방법으로는 접합부에 의한 탄성파의 손실과 캡의 휨 진동에 의한 노이즈 등을 해결하기가 곤란해진다. 또한 지반의 존재로 인한 진동 모드의 변화와 진동에너지의 감소 등의 문제점을 해결하지 않으면 안 된다. 본 연구는 충격탄성파법을 이용하여 지반에 설치된 눈사태 방지책이나 가드레일의 지주와 같은 강관 구조물의 근입깊이를 측정하고자 하는 연구이다. 이를 위해 진동센서를 캡이 아닌 측면부에 취부장치를 이용하여 설치함으로써 길이방향의 탄성파를 측정할 수 있도록 하고, 실제 구조물에 대해 측정을 실시하여 그 측정시스템의 성능과 유용성을 검토하고자 한다. 또한 다양한 길이의 실험용 강관 파이프를 매설하고 측정실험을 실시하여 측정시스템의 적용성에 대해서도 검토하였다. 본 연구를 통하여, 수신센서를 파이프의 측면에 선접촉하게 함으로서 종파를 감지하여 근입깊이를 포함한 파이프의 전 길이를 측정하는 본 측정시스템은 매설된 강관 구조물의 길이 측정에 기본적으로 적용 가능함을 확인할 수 있었다. 특히 오거 굴착으로 시공된 경우에는 높은 정도의 측정성능을 보여주었다. 또한 항타관입 파이프에 대해서는 지반의 영향을 고려함으로써 길이의 측정이 가능하다는 것을 확인할 수 있었다. 즉, 오거 굴착 또는 항타 관입 등 시공방법에 따라 측정결과에 대한 지반의 영향 정도가 달라지며 파형 분석 및 길이 산정시 그 영향을 고려하여야 함을 확인하였다.

  • PDF