• Title/Summary/Keyword: 오형근

Search Result 53, Processing Time 0.021 seconds

A Study on Secure Base-Camp for Free-Roaming Agents (이동에이전트의 자유로운 순회를 보장하기 위한 안전한 베이스캠프에 관한 연구)

  • Park, Jongyoul;Kim, Hong Kook;Oh, Hyung-Geun;Park, Joong-Gil;Lee, Jin-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1079-1082
    • /
    • 2004
  • 이동 에이전트는 자율적으로 수행이 가능한 능동적인 객체이지만 이동 에이전트 서버에 의해서 수행되기 때문에 서버에 대한 보안상 취약점을 가진다. 이와 관련하여 다양한 연구가 진행되었고 일정한 조건 안에서 안전한 방법들이 제안되었다. 그 중에는 여러 서버를 중첩하지 않고 순회하는 조건에서 안전한 수행 결과를 보장하는 방법이 있다 [10,11]. 이 방법은 신뢰 서버를 기점으로 에이전트가 자유롭게 순회를 하고 그 결과를 체인화하여 저장하는 방법이다. 본 논문에서 중첩된 순회를 가능하게 하며, 중요한 의사 결정을 안전하게 수행할 수 있는 이동 에이전트를 위한 베이스캠프를 제안한다.

  • PDF

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

The Scheme for Generate to Active Response Policy in Intrusion Detection System (침입 탐지 도구에서 능동 대응 정책 생성 방안)

  • Lee Jaw-Kwang;Paek Seung-Hyun;Oh Hyung-Geun;Park Eung-Ki;Kim Bong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.151-159
    • /
    • 2006
  • This paper studied active response policy generation scheme in intrusion detection system. We considered seven requirements of intrusion detection system for active response with components as the preceding study We presented the scheme which I can generate signature with a base with integrate one model with NIDS and ADS. We studied detection of the Unknown Attack which was active, and studied scheme for generated to be able to do signature automatically through Unknown Attack detection.

  • PDF

Tibial Axis-Talar Ratio Measured on Standing Ankle Lateral Radiographs (족관절 기립 측면 사진에서 측정한 경골축-거골비)

  • Oh, Hyoung-Keun;Suh, Jin-Soo
    • Journal of Korean Foot and Ankle Society
    • /
    • v.10 no.2
    • /
    • pp.140-143
    • /
    • 2006
  • Purpose: To present tibial axis-talar ratio and tibia-ankle surface angle in lateral measured on standing ankle lateral radiographs of adults who did not have specific ankle pathology. Materials and Methods: On Fifty-six radiographs without ankle osteoarthritis and malalignment, radiographic measures were performed with use of a custom dizitizing program based on $PV-WAVE^{(R)}$. AP ankle alignment was quantified by tibia axis-talar ratio (TTR) and tibia ankle surface angle in lateral (TLS angle). The data was compared with previously reported american data and analyzed using a t-test. Results: The average TTR and TLS angle of our series were $33.9{\pm}3.3%$, and no significant difference compared with reported american adults (p=0.152). Conclusion: The T-T ratio and TLS angle measured on standing ankle lateral radiographs of our series were $33.9{\pm}3.3%$ and $80.4{\pm}3.3^{\circ}$. This measures appear to be a useful measure for determining AP ankle alignment.

  • PDF

WISEMAN(Weapon system information Integration for System Engineering and Management) - An Information Integration System for System Engineering (효과적인 시스템엔지니어링 추진을 위한 정보통합시스템(WISEMAN) 개발 및 적용사례)

  • Park, Sam Joon;Oh, Hyung Geun;Kim, Hyung Joon;Han, Sang Chul;Kim, Jong Bok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.11-20
    • /
    • 2006
  • For systematic and effective achievement of Military R&D(Research and Development) processes and activities, information system which supports the concept of Systems Engineering is necessary. WISEMAN(Weapon System Information Integration for System Engineering and Management) is an information integration system, which can provide various kinds of interrelated application functions and assist the collaboration and concurrent engineering activities for weapon system R&D processes and activities. WISEMAN can manage the design information and configuration data of the target development products. It takes charge of the processes and histories about the product data, makes to share all the design information, and provides important application functions for R&D processes such as requirement management, product structure management, parts Management, documents and CAD drawing management, design change management, TDP(Technical Data Package) management etc., and in conjunction with these functions WISEMAN controls various effectivities of system configurations based on baselines and model information. WISEMAN has been used by ADD and Rotem Co. since developed.

  • PDF

A Study on the Reformation of Certified Fire Fighting Specialists - Focused on Fire Protection System Managers - (소방전문자격사제도의 개선에 관한 연구 - 소방시설관리사를 중심으로 -)

  • Oh, Hyeong-Geun
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.4 s.23
    • /
    • pp.21-28
    • /
    • 2006
  • This research analyzed the operational status of fire protection system managers who execute self inspection of the fire equipment in the specific fire protection facilities and presented the improvement scheme. Being made up inquiry for job environment, institutional environment, and operational environment for the subject of fire protection system managers who execute self inspection to complement the fire equipment inspection by city public fire protection service, the issues of the operational status of the institution of fire protection system managers were positively understood. The research result showed the conflict among building owner, fire equipment inspector, and fire protection system manager was existed due to the legal and institutional inertia to the self inspection, so it is judged that mutual complementary and cooperative relation should be established.

An Empirical Study of Security for API in Windows Systems (윈도우즈에서 제공되는 기본 API에 대한 안전성 고찰)

  • Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we test for security targeting on APIs of Windows as that is used by many people worldwide. In order to test APIs in DLL fils of Windows OS, we propose Automated Windows API Fuzz Testing(AWAFT) that can execute fuzz testing automatically and implemented the practical tool for AWAFT. AWAFT focuses on buffer overflows and parsing errors of function parameters. Using the tool, we found 177 errors in the system folder of Windows XP SP2. Therefore, AWAFT is useful for security testing of Windows APIs. AWAFT can be applied to libraries of third party software in Windows OS for the security.

Effect of Ethanol Intake on the Concentration of Minerals in Broiler Chicks (알콜섭취가 성장기닭의 장기중 무기질농도에 미치는 영향)

  • Oh, Hyong-Kun;Koh, Jin-Bog;Kim, Jae-Young;Ko, Yong-Du
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.17 no.2
    • /
    • pp.77-84
    • /
    • 1988
  • The effect of chronic ethanol consumption on the concentration of minerals in tissues and serum was studied in growing broiler chicks. Four different groups of the chicks were fed mixtures of 0(control), 1,2 and 3% ethanol and water respectively for 7 weeks. Body weight gain in 1% ethanol group and liver weight in 3% ethanol group were significantly higher than those of control. Mg, K, Mn, and Zn concentrations in liver were higher in ethanol groups than those in control. In ethanol groups, femoral muscle Mg level was increased while its Na concentration was decreased. The concentrations of Ca, Mg and Na in serum were higher in 3% ethanol group than those in control, 1 or 2% ethanol groups. In femur, Zn and Fe levels in 1% ethanol group and Mn concentration in 2 or 3% ethanol groups were increased. But its weight, length, and ash content were not affected by ethanol intake.

  • PDF

A Study on DRM Model Using Electronic Cash System (전자화폐 시스템을 적용한 DRM 모델에 관한 연구)

  • Lee, Deok-Gyu;Oh, Hyung-Geun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1107-1119
    • /
    • 2004
  • There is Electronic-cash system as important payment means in Electronic-commerce and the requirement of electronic cash is independence, transferability, divisibility etc. This is important requirement in DRM to provide contents as a same requirement to contents. Because contents itself can see that requirement of Electronic-cash can be transferred the control of to contents requirement as monetary concept. Can apply equally in reproduction and copy for contents, anonymity user's access etc, and several relations. In this paper, wish to put by value that is equal about Electronic-cash and contents, and apply concept of Electronic-cash through this and present DRM model after examine requirement of Electronic-cash and DRM's requirement. Concept used in this paper left copy use authority to use hierarchic tree structure and endowed anonymity for contents and anonymity about user for anonymous user. Finally, examines and compares and analyzes proposed existing methods.

  • PDF

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.