• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.029 seconds

Soundsource Localization and Tracking System of Intruder for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 침입자의 음원 위치 파악 및 추적 시스템)

  • Park, Jung-Hyun;Yeom, Hong-Gi;Jung, Bong-Gyu;Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.6
    • /
    • pp.786-791
    • /
    • 2007
  • In the place that its security is crucial, the necessity of system which can tract and recognize random person is getting more important. In this paper, we'd like to develop the invader tracking system which consists of the sound source tracking-sensor and the pan-tilt camera for wide-area guard. After detecting the direction of any sound with the sound source tracking-sensor at first, our system make move the pan-tilt camera to that direction and extract reference image from that camera. This reference image is compared and updated by the next captured image after some interval time. By keeping on it over again, we can realize the guard system which can tract an invader using the difference image and the result of another image processing. By linking home network security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

Addition of Oviductal Fluid to the Fertilization Medium Enhances Monospermic Penetration and Subsequent In Vitro Development of Porcine Oocytes (체외수정시 배양액내 난관액 첨가가 돼지 난포란의 수정율 및 배 발달율에 미치는 영향)

  • 김남형;문승주;임준교;구덕본;이훈택;정길생
    • Korean Journal of Animal Reproduction
    • /
    • v.20 no.1
    • /
    • pp.1-8
    • /
    • 1996
  • The objective of this study was to determine effects of oviductal fluid on the sperm penetration and subsequent in vitro development of porcine oocytes. The addition of oviductal fluid to the fertilization medium decreased sperm pen etration and the mean number of spermatozoa in penetrated eggs. The number of spermatozoa firmly bound to zona pellucida was also decreased in the presence of oviductal fluid. Chlortetracy cline (CTC) fluorescence patterns were used to determine incidence of capacitation and acrosome reaction. The proportion of capacitated a and acrosome free spermatozoa increased when spermatozoa were exposed for 1.5 and 3 h to oviductal fluid. These results suggest that the factor(s) in secretion from the oviduct reduces polyspermic fertilization and the number of spermatozoa that will penetrate porcine oocytes. The reduction of polyspermic penetration by oviductal secretions may be due to a reduced number of spermatozoa in the fertilization me-dium into an intact acrosome.

  • PDF

Design of an Intrusion Detection and Self-treatment System for IoT (사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2018
  • With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Intrusion Sensor Using Fiber-Optic Mach-Zehnder Interferometer (광섬유 마하젠더 간섭계를 이용한 침입자 감지 센서)

  • Park, Hyoung-Jun;Song, Min-Ho
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.26 no.4
    • /
    • pp.255-259
    • /
    • 2006
  • For the intruder detection, a buried fiber-optic sensor based on fiber-optic Mach-Zehnder interferometer is demonstrated. We buried the sensor arm in a styrene board and exerted pressure on it. The pressure-induced deformation speed has almost linear relationship with the output frequencies of the interference signals, and about 4.25 Hz frequency change per 0.01m/s was obtained. Also it has been shown that the amplitude of frequency component increases according to the weight of mass.

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

A Correlation-based Analysis on the Intrusion Information (상관성에 기반한 침입 정보 분석)

  • 이경희;이순구;김형식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.416-418
    • /
    • 2003
  • 기존의 침입탐지 시스템(IDS)은 침입 단계를 고려하지 않고 독립적이고 단편적인 공격 정보를 제공하기 때문에 관리자나 침입대응 시스템(intrusion response system)이 정보들을 이해하고 적당한 행동을 취하기가 매우 힘들다. 본 논문은 기존 침입 탐지시스템이 제공하는 정보들이 갖는 한계를 극복하기 위하여 모든 침입은 독립되어 존재하는 것이 아니라 서로 다른 공격의 연속으로 이루어 진다는 점에 근거하여 단편적인 공격 정보들의 상관성을 활용하기 위한 기법을 제안한다. 이미 알려진 공격 단계에 대한 상관성 정보를 그래프 형태로 표현하고 공격정보에 따라 전이하는 토큰을 이용하여 단편적인 공격들의 상관성을 분석함으로써 활용하기 용이한 분석 정보를 제공하는 것을 목표로 한다.

  • PDF

Design and Implementation of Correlation System of Intrusion Detection Alerts (침입탐지 정보의 연관성 분석시스템 설계 및 구현)

  • 이수진;이윤호;박찬일;송주민;윤현수;김도환;이은영;박응기
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.28-38
    • /
    • 2003
  • 인터넷 및 보안기술의 발달과 더불어 정보시스템에 대한 침해사고도 기하급수적으로 늘어나고 있으며, 공격기술 또한 정밀화, 분산화, 대규모화되어 가고 있다. 그러나 현재 광범위하게 사용되고 있는 침입탐지 시스템들은 그러한 인터넷상의 공격들에 대한 적절한 분석이나 효율적인 대응책은 제공해 주지 못하고, 대량의 침입탐지 정보를 생성시켜 관리자의 부담을 가중시킨다. 본 논문에서는 침입탐지 시스템이 생성하는 다수의 침입탐지 정보를 분석하고 가공하여 적시적이고 효율적인 대응에 필요한 고 수준의 정보를 생성해 내고, 나아가서는 DDoS 같은 대규모의 공격까지도 조기에 탐지해 낼 수 있는 능력을 갖춘 침입탐지 정보 연관성 분석 시스템을 제안하고 제안된 시스템의 성능 평가를 실시한다.

  • PDF

Study on the Institutional Control Period Through the Post-drilling Scenario Of Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste (중·저준위 방사성폐기물 천층처분시설에서 시추 후 거주시나리오 평가를 통한 폐쇄 후 제도적 관리기간 연구)

  • Hong, Sung-Wook;Park, Jin-Baek;Yoon, Jung-Hyun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.1
    • /
    • pp.59-68
    • /
    • 2014
  • The public's access to the disposal facilities should be restricted during the institutional control period. Even after the institutional control period, disposal facilities should be designed to protect radiologically against inadvertent human intruders. This study is to assess the effective dose equivalent to the inadvertent intruder after the institutional control period thorough the GENII. The disposal unit was allocated with different kind of radioactive waste and the effects of the radiation dose to inadvertent intruder were evaluated in accordance with the institutional control period. As a result, even though there is no institutional control period, all were satisfied with the regulatory guide, except for the disposal unit with only spent filter. However, the disposal unit with only spent filter was satisfied with the regulatory guide after the institutional control period of 300 years. But the disposal unit with spent filter mixed with dry active waste could shorten the institutional control period. So the institutional control period can be reduced through the mixing the other waste with spent filter in disposal unit. Therefore, establishing an appropriate plan for the disposal unit with spent filter and other radioactive waste will be effective for radiological safety and reduction of the institutional control period, rather than increasing the institutional control period and spending costs for the maintenance and conservation for the disposal unit with only spent filter.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF