• Title/Summary/Keyword: 실시간 위협 정보 수집

Search Result 56, Processing Time 0.028 seconds

Identifying Pig Image Objects Acquired from Non-Ideal Camera Angle (비이상적 카메라 각도에서 취득된 돼지 이미지 객체식별)

  • Kim, Sung-Hoon;Zhou, Heng;Kim, Sang-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.487-489
    • /
    • 2022
  • 농축산업계는 현재 고효율의 자동화 시스템을 구축하기 위해 많은 연구들이 진행되고 있다. 가축들에 대한 실시간 건강 관리 시스템 구현을 위해 딥러닝, 인공지능 기술들을 활용한 스마트 축사개발에 박차를 가하고 있다. 가축들의 건강은 수익과 직결되는 것은 물론, 사람의 건강까지 위협할 수 있기 때문에 철저한 관리가 필요한 실정이나 여러 기술적 어려움에 부딪히고 있다. 본 연구소는 이를 해결하기 위해 다양한 변수들을 설정, 수집하여 가축들의 건강을 관측하는 기술을 개발하고 있다. 이 논문에서는 악조건에서 수집된 데이터로 우리 내 돼지를 Tracking 한 실험 결과를 소개하고자 한다.

A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System (지식기반 실시간 사이버위협 조기 예.경보시스템)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modem information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous effort and search to develop a functional state-level cyber-threat early-warning system however, the efforts have not yielded satisfying results or created plausible alternatives to date, due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting and early-warning depend on the individual experience and ability of security manager whose decision is based on the limited security data collected from ESM (Enterprise Security Management) and TMS (Threat Management System). Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is, therefore, the aim of this research to offer a conceptual design for "Knowledge-based Real-Time Cyber-Threat Early-Warning System" in order to counter increasinf threat of malicious and criminal activities in cyber suace, and promote further academic researches into developing a comprehensive real-time cyber-threat early-warning system to counter a variety of potential present and future cyber-attacks.

  • PDF

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

System for Computation of Inclination Risk of Building Based on Linear Regression Using Gyro Sensor (자이로 센서를 활용한 선형회귀 기반 건물 기울기 위험도 산출 시스템)

  • Kim, Da-Hyun;Hwang, Do-Kyung;Kim, Dong-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.61-64
    • /
    • 2021
  • 2016, 2017년 경주와 포항에서 발생한 규모 5.4 이상의 지진 당시 건물에 많은 피해가 속출함에 따라 지진 발생 시 건물 안전에 관한 관심이 증가하고 있다. 이러한 이유로 지진 등의 재난 상황 시 건물의 위험도를 신속하게 판단할 수 있는 방법론이 필요한 실정이다. 본 논문에서는 지진 등의 재난 상황 시 건물 안전에 위협이 될 수 있는 건물 기울기에 대한 위험도를 자이로 센서 데이터에 기반해 산출하는 시스템을 제안한다. 본 논문에서는건물 기울어짐 데이터를 확보함에 어려움이 있어 모의 거동 환경을 구축하여 데이터를 수집 및 분석하였다. 제안된 시스템은 자이로 센서로부터 수집된 실시간 기울기 데이터를 Mean Filter를 통해 데이터 평탄화 및 선형화를 수행 후 머신러닝 기법중 하나인 선형 회귀 알고리즘을 적용해 건물 기울기를 추정한다. 이후 국토교통부에서 고시한 건물 기울기 위험도 산출표를 바탕으로 측정된 기울기의 위험도를 산출한다. 해당 시스템은 실제 지진 등의 재난 발생 시 실시간 건물 기울기 위험 판단을 통해 신속한 재난 의사 결정에 도움이 될 것으로 기대된다.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

Supply chain attack detection technology using ELK stack and Sysmon (ELK 스택과 Sysmon을 활용한 공급망 공격 탐지 기법)

  • hyun-chang Shin;myung-ho Oh;seung-jun Gong;jong-min Kim
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.13-18
    • /
    • 2022
  • With the rapid development of IT technology, integration with existing industries has led to an increase in smart manufacturing that simplifies processes and increases productivity based on 4th industrial revolution technology. Security threats are also increasing and there are. In the case of supply chain attacks, it is difficult to detect them in advance and the scale of the damage is extremely large, so they have emerged as next-generation security threats, and research into detection technology is necessary. Therefore, in this paper, we collect, store, analyze, and visualize logs in multiple environments in real time using ELK Stack and Sysmon, which are open source-based analysis solutions, to derive information such as abnormal behavior related to supply chain attacks, and efficiently We try to provide an effective detection method.

A Study on Multi-Level Correlation Technique extended Security Alert Verification (보안경보 검증을 확장한 다단계 상호연관 분석에 관한 연구)

  • Choi, Dae-Soo;Lee, Yong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1059-1062
    • /
    • 2005
  • 보안위협은 갈수록 심각해지고 다양한 정보보호시스템들을 통합하는 통합보안관리시스템에 관한 연구 개발도 활발히 진행 중이다. 이기종 정보보호시스템에서 발생하는 다량의 경보와 이벤트를 효과적으로 수집, 통합하고 상호연관 분석할 수 있는 방법이 절실하다. 현재 연구되고 있는 상호연관분석 방법들에 대해서 조사 분류하고 각 분류별로 장단점을 분석하여 이기종 통합보안관리에 적합한 상호연관분석 방법을 제안한다. 보안 경보 검증과정과 분산화된 경보처리방법으로 실시간 상호연관분석이 가능하도록 설계하였다.

  • PDF

An Implementation of ESM with the Security Correlation Alert for Distributed Network Environment (분산 환경에서 정보보호 연관 경고 메시지를 이용한 ESM 구현)

  • 한근희;전상훈;김일곤;최진영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.199-208
    • /
    • 2004
  • In this paper, we propose and implement SIA System for filtering redundant alert messages and dividing them into four statuses. Also, we confirm that our system can find and analyze vulnerability types of network intrusion by attackers in a managed network, so that it provides very effective means for security managers to cope with security threats in real time.

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.