• Title/Summary/Keyword: 자동화 도구

Search Result 529, Processing Time 0.021 seconds

Design and Implementation of Tools for Security Patch Management (보안패치 관리도구의 설계 및 구현)

  • Kim, Yun-Ju;Moon, Jong-Sub
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1011-1014
    • /
    • 2005
  • 1.25 대란을 일으켰던 SQL Slammer 웜과 최근 IRCBot웜을 비롯한 다양한 악성코드들은 보안 취약점을 이용하여 전파되고 있다. 이러한 공격의 대부분은 사전에 보안패치를 적용하는 것만으로 막을 수 있기 때문에, 네트워크의 각 시스템들이 최신 패치 버전으로 업데이트 되었는지 점검하고 필요한 보안패치를 분배하는 자동화된 도구의 필요성은 강조되어 왔다. 본 논문에서는 보안패치 관리도구가 관리대상 컴퓨터의 취약점을 분석하는 방안을 제시하고, 제시한 방안을 적용한 보안패치 관리도구를 설계 및 구현하였다.

  • PDF

정보보호시스템의 보안기능 통합평가 도구

  • 이경현;박영호;조현호;김창수;노병규
    • Review of KIISC
    • /
    • v.11 no.2
    • /
    • pp.60-67
    • /
    • 2001
  • 본 연구에서는 정보보호시스템의 신분확인 기능과 데이터 무결성 기능 그리고 네트워크 취약성 평가를 수행할 수 있는 정보보호시스템의 보안기능 통합 평가 도구를 개발하였다. 개발된 도구는 독립적으로 수행되어온 평가기능들을 통합, 개선함으로써 네트워크를 통해 연결되어 있는 시스템의 안전성을 총체적으로 평가할 수 있으며, 또한 네트워크 의 보호를 목표로 개발된 침입차단시스템의 구성상의 취약성이나 IPSec이나 SSL을 적용하여 가상사설망(VPN)을 구현 한 제품들에서 제공하는 무결성을 검증하기 위한 자동화된 도구로서 활용될 수 있다.

  • PDF

A Design and Implementation of ROAD(RPC Object vulnerability Automatic Detector) (ROAD(RPC Object vulnerability Automatic Detector) 도구의 설계 및 구현)

  • Yang, Jin-Seok;Kim, Tae-Ghyoon;Kim, Hyoung-Chun;Hong, Soon-Jwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.51-59
    • /
    • 2007
  • Software testing is the process of analyzing a software item to detect the differences between existing and required conditions and to evaluate the features of the software item. A traditional testing focuses on proper functionality, not security testing. Fuzzing is a one of many software testing techniques and security testing. Fuzzing methodology has advantage that low-cost, efficiency and so on. But fuzzing has defects such as intervening experts. Also, if there is no specification, fuzzing is impossible. ROAD Tool is automated testing tool for RPC(Remote Procedure Call) based protocol and software without specification. Existing tools are semi-automated. Therefore we must modify these tools. In this paper, we design and implement ROAD tool. Also we verify utility in testing results.

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.

A Registry-Based Cross Organizational Workflow Modeling System (레지스트리 기반 기업간 워크플로우 모델링 도구의 설계 및 구현)

  • Song, Jong-Man;Oh, Dong-Keun;Chun, Jong-Mi;Oh, Se-Won;Hwang, Jae-Gak;Kim, In-Soo;Lee, Yong-Joon;Kim, Kwang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.51-54
    • /
    • 2002
  • 본 논문에서는 기업간의 비즈니스 프로세스의 자동화를 목적으로 하는 워크플로우 관리 시스템간의 상호 운영성을 지원하는 레지스트리 기반 기업간 워크플로우 모델링 도구를 설계하고 구현한다. 전자상거래를 대표하는 B2B (Business-to-Business) / B2E (Business-to-Enterprise) 환경에서 Interworkflow 메커니즘의 Cross Organizational 워크플로우 모델의 출현은 기업간 이질적인 환경에서의 조직과 시스템간의 상호운용성과 글로벌 워크플로우 관리를 가능하게 하였다. 이러한 메커니즘은 전자상거래의 발전에 많은 요소를 포함하고 있다. 본 논문에서는 Interworkflow 메커니즘의 Cross Organizational 워크플로우 모델의 연구를 통해 발전된 형태의 워크플로우 관리 시스템을 소개하고 또한 새로운 문제점을 제시한다. 또한 Interworkflow의 프로세스와 조직의 정의시 나타나는 문제점을 제시, 분석하고 이를 통해 발전된 형태의 레지스트리 기반 기업간 워크플로우 모델링 도구를 설계, 구현한다 이렇게 제시한 도구들을 통해 기업간 비즈니스 프로세스 자동화를 위한 전자상거래 워크플로우 관리 시스템 모델을 제시한다.

  • PDF

Implement of Semi-automatic Labeling Using Transcripts Text (전사텍스트를 이용한 반자동 레이블링 구현)

  • Won, Dong-Jin;Chang, Moon-soo;Kang, Sun-Mee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.585-591
    • /
    • 2015
  • In transcription for spoken language research, labeling is a work linking text-represented utterance to recorded speech. Most existing labeling tools have been working manually. Semi-automatic labeling we are proposing consists of automation module and manual adjustment module. Automation module extracts voice boundaries utilizing G.Saha's algorithm, and predicts utterance boundaries using the number and length of utterance which established utterance text. For maintaining existing manual tool's accuracy, we provide manual adjustment user interface revising the auto-labeling utterance boundaries. The implemented tool of our semi-automatic algorithm speed up to 27% than existing manual labeling tools.

Automatic Component Reconfiguration Tool Based on the Feature Configuration and GenVoca Architecture (특성 구성과 GenVoca 아키텍처에 기반한 컴포넌트 재구성 자동화 도구)

  • Choi Seung Hoon
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.125-134
    • /
    • 2004
  • Recently a lot of researches on the component-based software product lines and on applying generative programming into software product lines are being performed actively. This paper proposes an automatic component reconfiguration tool that could be applied in constructing the component-based software product lines. Our tool accepts the reuser's requirement via a feature model which is the main result of the domain engineering, and makes the feature configuration from this requirement. Then it generates the source code of the reconfigured component according to this feature configuration. To accomplish this process, the component family in our tool should have the architecture of GenVoca that is one of the most influential generative programming approaches. In addition, XSLT scripts provide the code templates for implementation elements which are the ingredients of the target component. Taking the ‘Bank Account' component family as our example, we showed that our component reconfiguration tool produced automatically the component source code that the reuser wants to create. The result of this paper would be applied extensively for creasing the productivity of building the software product lines.

  • PDF

A study on the utilizing of automation migration tool through existing system reuse of enterprise (기업의 현행 시스템 재활용을 통한 마이그레이션 자동화 도구 활용에 관한 연구)

  • Kim, Hee-Soo;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.317-327
    • /
    • 2014
  • In present company has been developed various systems for work efficiently and organized. However, each work developed Systems Environment differently by rapid IT advancement; it requires a lot of maintenance cost. Recently many companies need to do systems integration or downsizing migration to save costs for IT maintenance, but most of companies are now develop migration with built new systems by manual work or modify some part only. Also migration requires high cost. In this paper, by focusing in application on the environment of the system components, propose the recycling and utilization of automation tools, application method to reduce the migration cost.

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF