• Title/Summary/Keyword: 침입성

Search Result 1,050, Processing Time 0.024 seconds

The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices (스마트그리드 기기 보안 침해사고 대응을 위한 원격 증거 수집 시스템 설계)

  • Kang, SeongKu;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.49-60
    • /
    • 2015
  • Smart Grid devices are the major components of the Smart Grid. They collect and process a variety informations relating power services and support intelligent power services by exchanging informations with other SG devices or systems. However, If a SG device is attacked, the device can provide attack route to attacker and attacker can attack other SG devices or systems using the route. It may cause problem in power services. So, when cyber incident is happened, we need to acquire and examine digital evidence of SG device quickly to secure availability of SG. In this paper, we designed remote evidence acquisition system to acquire digital evidences from SG devices to response quickly to incidents of SG devices. To achieve this, we analyzed operating environment of SG devices and thought remote digital evidence acquisition system of SG devices will be more effective than remote digital evidence acquisition system targeted general IT devices. So, we introduce design method for SG devices remote evidence acquisition system considered operating environment of SG devices.

A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment (PKI환경에서 ElGamal 방식의 ECC를 이용한 안전한 메신저 설계에 관한 연구)

  • Park Su-Young;Choi Kwang-Mi;Jung Choi-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1443-1448
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

A case of pyomyositis due to Mycobacterium tuberculosis (17개월 여아에서 발견된 근육내 결핵 1례)

  • Bae, Yun-Jin;Choi, Jin-Sung;Lee, Young Ah;Kim, Sung-Soo;Rha, Seo-Hee;Jung, Jin-A
    • Clinical and Experimental Pediatrics
    • /
    • v.49 no.10
    • /
    • pp.1116-1119
    • /
    • 2006
  • Pyomyositis is a primary bacterial infection of the skeletal muscles. Although infection can affect any skeletal muscle, the large muscle groups such as the quadriceps or gluteal muscles are most often the focus of this disease, and most commonly the inflammation is focal, involving a single muscle. The mechanism of pyomyositis is poorly understood. The local mechanical trauma at the time of an incidental bacteremia is frequently postulated as a mechanism that could explain the high incidence of the disease in tropical areas and its male preponderance. Staphylococcus aureus is the most common organism responsible for pyomyositis. Mycobacterium tuberculosis primarily affects the lungs, and the prevalence of active pulmonary tuberculosis co-existing with musculoskeletal tuberculosis has been about 30 percent. We report here on a case of an otherwise healthy 17-month-old girl, who had tuberculous pyomyositis at the upper arm after the hepatitis A vaccination with no evidence of any coexistent active tuberculosis.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Design of Automatic Inspection System for Maintenance of Unmanned Monitoring Facility (무인감시설비 유지보수를 위한 자동점검시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.515-517
    • /
    • 2018
  • Access to public facilities such as substations, dams and railway facilities is strictly controlled, and unmanned surveillance equipment has been introduced and operated recently due to the development of IT technology and the government's cost reduction policy. However, if an unmanned surveillance system is broken, surveillance space, information leakage caused by intruders, and damage to facilities may occur. Also, it is necessary to check periodical visit by the manager in order to check the surveillance facilities, which causes additional management costs. In order to solve this problem, we designed a system to check the operation status of the unmanned monitoring facility in real time, attempt to recover automatically when a problem occurs, and notify the administrator of the problem. The designed system consists of an NVR that receives and judges information such as image, sound, and lighting condition, and a control device that detects and restores the state of the unmanned monitoring facility. The system proposed in this paper is expected to contribute to the improvement of the economic efficiency due to the minimization of surveillance space due to the failure of the unmanned monitoring facility and the reduction of the inspection cost.

  • PDF

Efficient Regular Expression Matching Using FPGA (FPGA를 이용한 효율적 정규표현매칭)

  • Lee, Jang-Haeng;Lee, Seong-Won;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.583-588
    • /
    • 2009
  • Network intrusion detection system (NIDS) monitors all incoming packets in the network and detects packets that are malicious to internal system. The NIDS should also have ability to update detection rules because new attack patterns are unpredictable. Incorporating FPGAs into the NIDS is one of the best solutions that can provide both high performance and high flexibility comparing with other approaches such as software solutions. In this paper we propose and design a novel approach, prefix sharing parallel pattern matcher, that can not only minimize additional resources but also maximize the processing performance. Experimental results showed that the throughput for 16-bit input is twice larger than for 8-bit input but the used LEs/Char in FPGA increases only 1.07 times.

Performance Evaluation System for Construction Environment of the Unified Waterproofing-Root Resistance Membrane layer of the Green Roof System (인공지반 녹화용 방수방근 복합공법의 시공환경을 고려한 성능평가 시스템 연구)

  • Park, Chang-Hwa;Oh, Sang-Keun;Lim, Nam-Gi
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.2
    • /
    • pp.189-199
    • /
    • 2011
  • Installation of a proper root barrier in a green roof system is very important in order to protect the concrete slab of roof and the root penetration in the waterproofing layer. To select the proper root barrier materials and methods, it is necessary to understand the environmental conditions affecting the waterproofing-root barrier system in green roof construction site. Therefore, we suggested as the environmental performance indexes four kinds of performance requirements; root penetration, chemical attack by chemical agent or fertilizer, load impact by soil depth and size of plant, and water pressure. The related four test methods were suggested for the inspection of these performance indexes. In this research, we could suggest for kinds of test methods as standard test methods to evaluate the environmental performance of waterproofing-root barrier for greening roof system.

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

Modeling the Effects of Periodic Intrusions of Outer Water on the Variation in the Phytoplankton Biomass and Productivity in a Small Embayment (작은 만에서 식물플랑크톤 생체량과 생산력 변화에 대한 외부 물의 정기적인 침입 효과의 모델링)

  • Ougiyama, Shu;Koizumi, Tsuneyoshi;Takeoka, Hidetaka;Yuichi, Hayami
    • Korean Journal of Ecology and Environment
    • /
    • v.37 no.4 s.109
    • /
    • pp.455-461
    • /
    • 2004
  • Effects of the different strengths and intervals of the periodic outer water intrusions (kyuchos and bottom intrusions) on the dynamics of phytoplankton biomass in a small embayment were examined with a simple numerical model. Environmental conditions of Kitanada Bay in the Bungo Channel were applied to the model. As the interval of the intrusion became longer and the amplitude became smaller, phytoplankton biomass In the bay became higher. On the other hand, as the interval became shorter and the amplitude became larger, the growth rate of the phytoplankton became higher. It suggested that when the intrusion was weaker, water exchange of the bay decreased and the phytoplankton in the bay accumulated at a high density, When water exchange was improved by active intrusions, availability of light would become more efficient and the growth rate of the phytoplankton was enhanced.