• Title/Summary/Keyword: 실시간 보안관리

Search Result 325, Processing Time 0.024 seconds

Design and implementation of a Large-Scale Security Log Collection System based on Hadoop Ecosystem (Hadoop Ecosystem 기반 대용량 보안로그 수집 시스템 설계 및 구축)

  • Lee, Jong-Yoon;Lee, Bong-Hwan
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.461-463
    • /
    • 2014
  • 네트워크 공격이 다양해지고 빈번하게 발생함에 따라 이에 따라 해킹 공격의 유형을 파악하기 위해 다양한 보안 솔루션이 생겨났다. 그 중 하나인 통합보안관리시스템은 다양한 로그 관리와 분석을 통해 보안 정책을 세워 차후에 있을 공격에 대비할 수 있지만 기존 통합보안관리시스템은 대부분 관계형 데이터베이스의 사용으로 급격히 증가하는 데이터를 감당하지 못한다. 많은 정보를 가지는 로그데이터의 유실 방지 및 시스템 저하를 막기 위해 대용량의 로그 데이터를 처리하는 방식이 필요해짐에 따라 분산처리에 특화되어 있는 하둡 에코시스템을 이용하여 늘어나는 데이터에 따라 유연하게 대처할 수 있고 기존 NoSQL 로그 저장방식에서 나아가 로그 저장단계에서 정규화를 사용하여 처리, 저장 능력을 향상시켜 실시간 처리 및 저장, 확장성이 뛰어난 하둡 기반의 로그 수집 시스템을 제안하고자 한다.

A Study of RTLS Application using Active RFID (액티브 RFID를 활용한 RTLS 응용에 관한 연구)

  • Ahn, yoon-ae;Cho, han-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.555-556
    • /
    • 2011
  • 액티브 RFID를 기반으로 실시간 위치정보 서비스를 구현하는 모델인 RTLS는 보안, 의료, 건설, 항공, 항만, 운송, 국방, 교통, 레저 등 실시간 위치정보가 필요한 분야에 효과적으로 활용되고 있다. 이 논문에서는 RTLS 응용 시스템을 위한 지능형 위치정보 관리시스템을 제안한다. 제안 시스템은 일반적인 데이터 관리의 기능 이외에도 상황인식 시스템에서 사용되는 규칙기반 미들웨어 Jess(Java expert system shell)를 활용하는 구조를 가진다. 규칙을 이용한 추론 기능을 도입함으로써 응용 시스템의 정확성을 높일 수 있는 특징을 가진다.

  • PDF

Facility Maintenance Management System Using a Mobile Application (모바일 어플리케이션을 이용한 시설물 유지관리 시스템)

  • Joo, Young-Do
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1145-1151
    • /
    • 2012
  • Recently, the demand for mobile system is growing owing to the spread of smart phones to enable the real-time business process. This paper proposes the real-time facility maintenance management system using an android-based mobile application to apply to the facility defect/maintenance field for the apartment building complex. The proposed system model aims to develop the comprehensive management system to integrate the web and mobile system to lead to the realization of mobile office. The security measures required in the mobile system are technically analyzed and implemented on the system.

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

A study on the street security light management system using Zigbee network (지그비 통신망을 이용한 보안등 관제 시스템에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.4
    • /
    • pp.430-436
    • /
    • 2014
  • This paper relates to the study about the street security light management system. The purpose of the wireless remote management system is to manage street security lights efficiently. The system is composed of three components like light controller, CDMA gateway and web based remote management server. The zigbee solution is adopted to make local wireless network between street security lights. The CDMA network is used for the wireless communication between street security light controller and the remote control center. The gateway to interconnect zigbee network and CDMA was designed with low power 32 bits Cortex M3 micro-controller. For the data communication between the management server and the gateway, SMS and socket based TCP streaming is used. The management server sends SMS to the gateway to deliver light control and management requests, and the gateway replies with the light controllers report via TCP streaming. By using both SMS and TCP streaming communication, it was verified that simple cost effective management is possible for street security lights. We tried real test for 95 street security lights in real environment during two months and analyzed the practical possibility for mass supply.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Study on Efficient Key Management of Secret Sharing Technique in Real Time Wireless Sensor Network (실시간 유비쿼터스 센서 네트워크에서 비밀분산기법에 기반한 효율적인 키관리에 관한 연구)

  • Son Sangchul;Yoon Miyoun;Lee Kwangkyum;Shin Yongtae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.202-204
    • /
    • 2005
  • 센서 네트워크 기술은 정보를 수집하고 전송함에 있어서 사람의 개입 없이 모든 동작이 이루어진다. 이러한 센서 네트워크 환경에서는 센서 노드들의 에너지와 컴퓨팅 능력, 통신능력이 극히 제한적이기 때문에 전통적인 보안 기술을 적용하는 것은 문제점이 있다. 따라서 본 논문에서는 센서 네트워크의 물리적인 제한적 환경과 컴퓨팅 능력을 고려하여 기존의 비밀분산 기법에 기반을 둔 보안 메커니즘으로 실시간 환경에서 각 센서 노드들의 에너지 효율적인 계층적 키관리 기법에 대해 제안한다.

  • PDF

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF

Network Security Situational Awareness using Traffic Pattern-Map (트래픽 패턴-맵을 이용한 네트워크 보안 상황 인지 기술)

  • Chang Beom-Hwan;Na Jung-Chan;Jang Jong-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.397-401
    • /
    • 2006
  • 트래픽 패턴-맵(PatternMap)은 전체/세부 도메인별 보안 상황을 근원지/목적지 IP 주소 범위로 이루어진 그리드 상에 표현하여 관리자에게 네트워크 보안상황을 실시간으로 인지시키는 도구이다. 각각의 그리드는 근원지-목적지 간의 연결을 의미하며, 최다 점유를 차지하는 트래픽의 포트를 식별력을 갖는 색으로 표현한다. 이상 트래픽 현상의 검출은 가로 및 세로 열에 나타난 동일 색의 막대그래프(포트)의 개수와 그것의 합에 따라 결정되며, 그 결과로 선택된 세로 열과 가로 열을 활성화시켜 관리자에게 그 현상을 인지시킨다. 일반적으로 인터넷 웜이 발생할 경우에는 특정 근원지 열이 활성화되고, DDoS와 같은 현상은 목적지 열이 활성화되는 특징이 있다.

  • PDF

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.