• Title/Summary/Keyword: 침입방지

Search Result 284, Processing Time 0.023 seconds

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

The Study on the Effect of Passenger Coach temperature When Aircurtains Installed At Electrical Rolling Stock At Entrance Door (전동차 출입문에 에어커튼 설치시 객실 온도 변화 연구)

  • Ahn Jong-Kon;Kim Chul-Ho;Park Duk-Sin
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.489-496
    • /
    • 2004
  • The effect of airconditioning and heating system when aircurtains installed in subway electrical rolling stock at entrance door. It blocks cold/hot air of outside. It is good for health with its blocking effect against dusts exhaust fumes, odor bugs and smoke from outside. It always maintains clean and pleasant atmosphere inside. It helps you to have health with its ever-equal temperature distribution at inside. It saves lots of maintenance cost for heating/cooling (about 86$\%$) since it cuts the loss of hot air under heating as well as of cold air under air-conditionin. Customers can feel pleasant go in and out (better than before) with the door. It is an indispensable product for the employers to cut the cost. It makes customers feel pleasant near doors, since it isnt influenced by temperature difference of cold/hot air when the door opens/closes. In electrical rolling stock passenger temperature is a lot different from that the door opens/closes. One of the main aims is to create an acceptable thermal environment without draught problem. Temperature, gradients when aircurtains installed in subway electrical rolling stock at entrance door have been studied. And the temperature measured at 0.1, 0.5, 1.3, 1.7m above the floor. It has been found that temperature, with large fluctuations caused more draught influence.

  • PDF

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

Feasibility Study of Modified Durometer to Evaluate Setting Time of the Concrete (콘크리트의 응결시간 판정시 개량형 듀로미터의 사용 가능성 분석)

  • Han, Cheon-Goo;Han, Min-Cheol;Shin, Yong-Sub
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.5
    • /
    • pp.433-440
    • /
    • 2020
  • In this study, a new type of Durometer was invented by modifying the currently used Durometer with the hemisphere shaped needle to columnar shaped needle. The aim of the study is, hence, to provide the feasibility of the advanced Durometer for assessing setting time of the concrete. Generally, the finishing of concrete surface should be conducted to secure the smooth surface, improve the permeability, and prevent the plastic shrinkage cracking. Although this surface finishing work should be conducted during the plastic phase between initial and final setting, currently in practical situations, the timing of starting the finishing work was determined by the sense of the worker. To improve this situation, Kato Junji suggested to use the hemisphere and needle shaped Durometers to determine the initial and final setting time, respectively. However, in this case, there are difficulties of using two different Durometers and of occurring failure of the Durometer due to the intruded cement paste. To prove the feasibility of new typed Durometer, setting time and surface hardness were evaluated by applying for the concrete with various replacing ratios of fly-ash and coal gasification slag as an aggregate.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

A Group Key Management for Real-Time Multicasting Information Security (실시간 멀티캐스팅 정보보안을 위한 그룹키 관리)

  • Hong, Jong-Joon;Hwang, Kyo-Chul
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.809-814
    • /
    • 2003
  • The multicast transmitting the real-time data to groups may easily have many attacks from abnormal attacks because it has many links as compared to the unicast. The existing group key management architectures for preventing these problems are designed for protocols suitable for a large scale. Thus these architectures applied to a small scale routing protocols may have many overheads with key distribution and a constant core tree. Therefore this paper proposes a groups key management protocol for a secure multicast in PIM-SM multicast group communication. The proposed method divide multicast groups with RO(Rendezvous-Point), and subgroup key managers are established in each RP and can be transmitted groups keys between senders and receivers, so the security cannel is set up for secure data transfer, And this does not have needs of the data translation for group keys and the new key distribution for path change. As a result of this, the data transmission time can be reduced.

A Correction Security Framework for Reliable Internet Services (신뢰성 있는 인터넷 서비스 제공을 위한 교정 보안 프레임워크)

  • Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.779-786
    • /
    • 2003
  • We propose a correction security framework as next generation security technology to provide secure and reliable Internet services. The framework guarantees durability of the services in spite of external attack, intrusion, vulnerability for fault tolerance, and network management technology that covers the set of techniques aimed at providing rapid service recovery. The improvement technology includes system itself improvement and synamic improvement preventing faults from being re-activated, in cooperation with other systems such as vulnerability anaysis system, NMS, ESM. It is expected that our framework will be applied to global networks as well as system alone, and be able to guarantee the network survivability and reliable Internet services.

Experimental Study on Failure Characteristics of Riprap Revetments in Meandering Channel (만곡부 흐름특성을 고려한 사석호안공 붕괴 수리실험 연구)

  • Bae, Deok-Won;Kim, Hyung-Jun;Yoon, Kwang-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.696-696
    • /
    • 2012
  • 호안은 유수의 침입으로부터 제방 및 하안의 침식 피해를 방지하기 위해 제방에 설치되는 구조물이다. 침식에 의한 제방 및 호안의 대표적인 붕괴특성 중에는 만곡부, 하천 급경사, 지형의 간섭효과 등이 있다. 특히, 만곡부는 원심력, 2차류 등에 의한 수위상승 및 유속증가로 제체에 응력 집중이 발생되어 안정성 저하를 유발할 수 있다. 또한, 만곡부의 흐름 방향전환 현상은 하도내 통수능 저하를 발생시켜 홍수피해를 가중시킬 수 있다. 따라서 하천특성상 만곡부에 의해 발생할 수 있는 홍수피해 요소를 저감시킬 수 있도록 적합한 피해저감대책을 마련할 필요가 있다. 제방의 보강대책으로서 활용되고 있는 호안은 역학적인 측면에서 외력과 저항력의 크기에 따라 안정성이 평가되어야 하며 지역여건 등에 따른 만곡부의 수위상승 및 제방 침식 등을 고려한 설계가 수행되어야 한다. 국내 실무에서 적용되고 있는 호안설계방법은 하천설계기준 해설(2009)을 참고하고 있는데, 흐름현상 및 만곡부 특성 등에 대하여 경험과 이론의 양면을 고려한 설계를 수행하도록 제안하고 있다. 이는 호안 안정성에 대한 역학적 검토 방법의 한계로 비합리적 설계가 될 우려가 있다. 따라서 만곡부에 의한 유속 및 소류력 등 흐름특성을 고려한 정량적인 평가기법이 요구되는 상황이다. 본 연구에서는 수리실험을 통해 만곡에 의한 흐름영향과 수리학적 거동 및 설계요소를 파악하고자 만곡부에 사석호안공을 설치하여 흐름전환 및 유속변화에 따른 사석호안공의 이탈현상을 재현하였다. 실험수로는 곡률반경( )이 4.5 m인 만곡부가 3개소 발생하는 폭 2.3 m, 길이 25 m의 다중 사행수로 형태이다. 실험수로 우안의 1V:2H 경사면에 10, 20, 30, 40, 50 mm 사석을 크기별로 설치하여 만곡에 의한 유속변화 등 흐름현상과 호안공 이탈을 관찰하였다. 수리실험은 고정상으로 수행되었으며 정상류 흐름조건에서 공급유량별 하류단 수위 조절을 통해 만곡부내 호안 공 이탈을 발생시키는 설계인자를 도출하고자 유속과 수심을 측정하였다. 실험결과를 바탕으로 사석호안공 설계시 1차원 접근유속에 만곡 영향을 고려하여 대표유속으로 적용하는 방법의 특성을 파악하고, 사석호안공의 이탈유속과 만곡에 의한 흐름특성간의 상관관계를 분석하여 제원결정기법을 제안하였다.

  • PDF

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Improvement of Runtime Intrusion Prevention Evaluator (RIPE) (실행시간 침입 방지 평가 프로그램(RIPE)의 개선)

  • Lee, Hyungyu;Lee, Damho;Kim, Taehwan;Cho, Donghwang;Lee, Sanghoon;Kim, Hoonkyu;Pyo, Changwoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1049-1056
    • /
    • 2015
  • Runtime Intrusion Prevention Evaluator (RIPE), published in 2011, is a benchmark suite for evaluating mitigation techniques against 850 attack patterns using only buffer overflow. Since RIPE is built as a single process, defense and attack routines cannot help sharing process states and address space layouts when RIPE is tested. As a result, attack routines can access the memory space for defense routines without restriction. We separate RIPE into two independent processes of defense and attacks so that mitigations based on confidentiality such as address space layout randomization are properly evaluated. In addition, we add an execution mode to test robustness against brute force attacks. Finally, we extend RIPE by adding 38 attack forms to perform format string attacks and virtual table (vtable) hijacking attacks. The revised RIPE contributes to the diversification of attack patterns and precise evaluation of the effectiveness of mitigations.