• Title/Summary/Keyword: 이슈 탐지

Search Result 128, Processing Time 0.028 seconds

Return address stack for protecting from buffer overflow attack (버퍼오버플로우 공격 방지를 위한 리턴주소 스택)

  • Cho, Byungtae;Kim, Hyungshin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4794-4800
    • /
    • 2012
  • Many researches have been performed to resist buffer overflow attacks. However, the attack still poses one of the most important issue in system security field. It is because programmers are using library functions containing security hole and once buffer overflow vulnerability has been found, the security patches are distributed after the attacks are widely spreaded. In this paper, we propose a new cache level return address stack architecture for resisting buffer overflow attack. We implemented our hardware onto SimpleScalar simulator and verified its functionality. Our circuit can overcome the various disadvantages of previous works with small overhead.

Supercomputer's Security Issues and Defense: Survey (슈퍼컴퓨터 보안 이슈 및 대책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.215-220
    • /
    • 2013
  • The super computer calls usually as the super computer in case the computing power of the computer is 20 G flops (GFLOPS) or greater. In the past, the computer equipped with the vector processor (the instrument processing the order having the logic operation and maximum value or minimum value besides the common computer instruction) processing the scientific calculation with the super high speed was installed as the super computer. Recently, cyber attack focuses on supercomputer because if it is being infected, then it will affect hundreds of client PC. Therefore, our research paper analyzed super computer security issues and biometric countermeasure to develop the level of security on super computer.

Developing Warning Map for Risk Monitoring on Personal Information Security (개인정보보호를 위한 리스크 모니터링: 경고맵)

  • Lee, Youngjai;Shin, Sangchul;Min, Geumyoung
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.33-40
    • /
    • 2008
  • Personal information security has been as risk ever since the development of information technology increased its internet use. As personal information security is compromised there will be a rise in personal privacy conflicts and this will become an important social issue. The following research is a presentation of the warning map for risk monitoring on personal information security. First, the personal information security process is identified then defined. Second, in order to achieve the personal information security's objective, a survey was taken and the data was collected. Third, factor in the Fishbone Diagram's analysis and figure out the key indicators that include metric and threshold. Last, develop the warning map which has the matrix table composed of the process and the risk. It displays the warning based on the threshold and the value of key indicators related to risks.

  • PDF

Link Budget Analysis of Communication System for Reliable WBAN (신뢰성있는 WBAN을 위한 통신 시스템의 링크 버짓 분석)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.584-588
    • /
    • 2019
  • Wireless body area network (WBAN) is a networking technology that enables early detection of abnormal health conditions, real-time medical monitoring, and telemedicine support systems. The internet of things (IoT) for healthcare, which has become an issue recently, is one of the most promising areas for improving the quality of human life. It must meet the high QoS requirements of the medical communication system like any other communication system. Therefore, the bit error rate (BER) threshold was chosen to accommodate the QoS requirements of the WBAN communication system. In this paper, we calculated BER performance of WBAN channel using IR-UWB PPM modulation and analyzed link budget and system margin of WBAN according to various system parameters.

Draft Design of 2-Factor Authentication Technique for NFC-based Security-enriched Electronic Payment System (보안 강화를 위한 NFC 기반 전자결제 시스템의 2 팩터 인증 기술의 초안 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.77-83
    • /
    • 2016
  • Today, the great revolution in all financial industrial such as bank have been progressing through the utilization of IT technology actively, it is called the fintech. In this paper, we draw the draft design of NFC-based electronic payment and coupon system using FIDO framework to apply the 2 factor authentication technique for strength security. In detailed, we will study that the terminal device in front-end will be applied the 2 factor authentication and electric signature, and cloud-based payment gateway in back-end will be applied malicious code detection technique of distributed avoidance type.

A Study on Convergence Security of National Infrastructure (국가 인프라 시설의 융합보안 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.341-342
    • /
    • 2017
  • Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

Event Detection System Using Twitter Data (트위터를 이용한 이벤트 감지 시스템)

  • Park, Tae Soo;Jeong, Ok-Ran
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.153-158
    • /
    • 2016
  • As the number of social network users increases, the information on event such as social issues and disasters receiving attention in each region is promptly posted by the bucket through social media site in real time, and its social ripple effect becomes huge. This study proposes a detection method of events that draw attention from users in specific region at specific time by using twitter data with regional information. In order to collect Twitter data, we use Twitter Streaming API. After collecting data, We implemented event detection system by analyze the frequency of a keyword which contained in a twit in a particular time and clustering the keywords that describes same event by exploiting keywords' co-occurrence graph. Finally, we evaluates the validity of our method through experiments.

Big data-based real-time drug side-effect risk assessment model (빅데이터 기반 실시간 의약품 부작용 위험도 평가 모델)

  • Lee, Chae-Eun;Bae, Eun-Ji;Yoon, Sook-Young;Lim, Su-Yeon;Kim, Yong-Min;Kim, Woong-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.754-757
    • /
    • 2019
  • 대한민국 인구의 고령화는 점점 더 심화되며 노인 환자의 수도 증가하는 추세이다. 노인환자들은 의약품 부작용 위험도가 높기 때문에 노인에게 부적절한 약물과 처방 이후의 부작용 발생 현황에 대한 통계적인 분석이 필요하다고 판단하였다. 의약품 부작용관련 문헌 정보와 실제 병원의 전자 의무 기록을 이용해 데이터 베이스를 구축하고 Python 을 사용해 부작용 탐지 알고리즘을 설계했다. 노인 환자가 특정 약품을 투약한 이후에 그 약품에 부작용에 해당하는 진단을 받는다면 부작용이 발생한 것으로 판단한다. 알고리즘을 기반으로 사용자들이 쉽게 접근할 수 있도록 웹을 구축했다. d3.js 를 통해 직관적으로 부작용 확률을 확인할 수 있도록 구현했고 새로운 진단 또는 처방을 입력하여 실시간으로 확률에 반영하였다. 실시간으로 데이터를 확인할 수 있기 때문에 부작용 이슈에 신속하게 예방 및 대응이 가능할 것으로 기대된다.

A Study on Dynamic Triggering mechanism for Lawful Interception via a SIP / IMS Service Mobility detection (SIP/IMS Service Mobility 탐지를 통한 Lawful Interception Dynamic Triggering 기법에 관한 연구)

  • Lee, Myoungrak;Lee, Jung-Been;Han, Youngsub
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.606-609
    • /
    • 2015
  • Lawful Interception (LI)이란 합법적인 형태의 통신내용 및 관련 정보의 수집활동을 말한다. 최근의 4G LTE 기반의 이 기종 통신망에서의 합법적 감청은 전통적인 유선 및 3G 네트워크 중심의 감청기법 이외의 새로운 기법과 표준이 필요한 실정이다. 특히, LTE와 같이 User Equipment (UE)가 네트워크상에서 핸드오버를 통해 자유롭게 이동하거나, 3G와 같은 이 기종 망에서의 연결을 포함한 다른 사업자의 새로운 지역에서의 네트워크 연결이 보장되는 형태의 환경에서의 연속적 감청을 보장하는 것은 합법적 감청분야의 중요한 이슈중의 하나이다. 따라서, 본 논문에서는 국내의 4G-LTE망을 중심으로 기존의 3G 망을 자유롭게 이동하는 네트워크 도메인과 IMS/SIP 기반의 서버의 연속성을 보장하는 서비스 도메인 영역에서의 합법적 감청 기법을 제안한다. 본 논문에서 제안하는 기법은 이 기종 무선망과 유선망이 혼재된 네트워크에서의 IMS/SIP 기반 서비스의 이동성을 감지하여 합법적 감청의 연속성을 보장하기 위한 기법을 포함하고 있다.

A Study on Convergence Security of Power Generation Control System (발전 제어시스템의 융합보안 연구)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.93-98
    • /
    • 2018
  • Korea Hydro & Nuclear Power Co., Ltd., Korea Electric Power Corporation, and Korea South-East Power Corporation are major infrastructure facilities of power supplying countries. If a malicious hacking attack occurs, the damage is beyond the imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social big problems. In this paper, we propose a strategy and countermeasures for stabilization of various power generation control systems by analyzing the environment and the current status of power generation control system for convergence security research, which is becoming a hot issue. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF