• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.026 seconds

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF

Design of Mobile Supervisory System that Apply Action Tracing by Image Segmentation (영상분할에 의한 동작 추적 기법을 적용한 모바일 감시 시스템의 설계)

  • 김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.282-287
    • /
    • 2002
  • This paper action tracing by techniques to do image sequence component to watch invader based on Mobile internet use. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmentalized foreground object detected and did so that can presume middle value of gouge that is abstracted to position that is specified and watch invader by analyzing action gouge. Those watch information is stored, and made Mobile client send out SMS Message about situation of watch place to server being stored to sensed serial numbers, date, Image file with recording of time.

Buried Fiber Optic Intrusion Sensor (매설형 광섬유 침입자 센서)

  • Park, Jae-Hee;Kim, Myung-Gyoo;Sohn, Byung-Ki
    • Journal of Sensor Science and Technology
    • /
    • v.5 no.6
    • /
    • pp.1-6
    • /
    • 1996
  • The feasibility of producing a practical buried fiber optic sensor with high sensitivity for detecting intruders is demonstrated. Experiments were carried out with the use of an all fiber Michelson interferometer, the sensing arm of which was buried in sand. When the sensing arm was buried 8 inches deep in sand, the pressure length product required for a half fringe shift in: the sensor output was $1.09\;kPa{\cdot}m$. The relation between the applied weight and the phase change was almost linear. Experimental results indicated that the sensitivity of the optical fiber sensor was sufficient to detect people on foot and vehicles passing over the buried fiber.

  • PDF

A Shadowing Mechanism supporting Automatic Extension of Security Scheme (보안스킴의 자동확장성을 지원하는 미행 메커니즘)

  • 장희진;김상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.45-54
    • /
    • 2001
  • It is necessary to control security management consistently and respond to an intrusion automatically in order to use the network securely in the single administrative domain. This paper presents a Shadowing Mechanism supporting a dynamic extension of security scheme and proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested technique. It is possible for security management system developed on the basis of the Shadowing Mechanism to make all network components working under the same security scheme. It enhances the accuracy of intrusion tracing and automatic response through dynamic extension of space and time for security management.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

The Diversity of Reproductive and Foraging Behaviors on Breeding Season of Eurasian Oystercatcher (Haematopus ostralegus) (검은머리물떼새의 번식행동 및 번식기 섭식행동의 다양성)

  • Yoon, Moo-Boo
    • The Korean Journal of Ecology
    • /
    • v.27 no.6 s.122
    • /
    • pp.383-390
    • /
    • 2004
  • This study was conducted in three sites, Si-Hwa Lake, Dongman and Seoman island and Janguyeop island, from march, 1999 to september, 2002. The behaviors of pre-breeding season, territorial behaviors, reproductive ecology, foraging sites and behaviors, and the competition of reproduction and foods between intraspecific or interspecific of Eurasian Oystercatcher (Haematopus ostralegus) were observed in each studying sites. The breeding of Eurasian Oystercatcher started on the middle of April in Si-Hwa Lake and on the middle of May in Dongman and Seoman island and Janguyeop island. For intension of pair bond on pre-breeding season, Eurasian Oystercatcher foraged with pair and behaved male-female chasing flight behavior. The pair foraged with male and female before copulation. If other pairs and individuals approached in feeding site of pair, this pair attacked them with piping calling and intruder chasing flight. If continuos serial behaviors were not observed, the discrimination of male-female chasing flight and intruder chasing flight was difficult. Territorial behaviors classified four types; butterfly flight, calling behavior, chasing behavior, fight behavior. The important foraging sites in Si-Hwa Lake are the land place in Daeboo island, tidal flat of Bangameori, tidal flat a front of a stationary net for catching fishes and tidal flat a front of a view station for bird watching. Eurasian Oystercatcher foraged at tidal flat on low water of the tide and foraged at feeding sites near island on flood tide in Dongman and Seoman island. Eurasian Oystercater in Janguyeop island usually foraged feeding sites near island, because water level was not different between low water of the tide and flood tide. Eurasian Oystercatcher competed on foods of intraspecific and interspecific. They chased for taking foods by force in feeding sites and drove out intruders in feeding sites. The foods interspecific competition happened with Black-tailed Gull (Larus crassirostris). Eurasian Oystercatcher was robbed of foods and attacked by Black-tailed Gull. The individual of food competition with Black-tailed Gull was low foods intake rate comparison with other feeding sites and this individual flied out other feeding sites.

Robust Bidirectional Verification Scheme for Detecting Sinkhole Attacks in INSENS of Sensor Networks (센서 네트워크의 INSENS에서 싱크홀 공격을 탐지하기 위한 강인한 양방향 인증 기법)

  • Song, Kyu-hyun;Cho, Tae-ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.77-80
    • /
    • 2015
  • 무선통신을 기반으로 하는 WSN은 통신의 특성상 네트워크보안에 취약점을 가진다. 무선통신의 취약점은 누구나 네트워크에 접근이 가능하다는 것이다. 이에 따라 침입에 강인한 무선 센서 네트워크인 INtrusion-tolerant routing protocol for wireless SEnsor NetworkS(INSENS)가 제안됨으로써 WSN의 초기 라우팅 설정 시 침입하는 공격자를 사전에 차단할 수 있게 되었다. 그러나 라우팅 설정 후에 노드가 공격자에 의해 훼손당하게 된다면, 노드의 주요정보를 이용해 공격자는 또다시 라우팅 공격이 가능해진다. 본 논문에서는 공격자에 의해 훼손된 노드가 라우팅 공격 중 대표적인 공격인 싱크홀 공격 메시지를 방송하였을 때, 페어와이즈 키를 통해 효과적으로 공격메시지를 차단하는 양방향인증기법을 제안한다. 이로써 INSENS에서 발생하는 싱크홀 공격을 차단함으로써 WSN의 보안 강화에 기여한다.

  • PDF

Simple Password verifier-based Key Agreement Protocol (간단한 패스워드 검증자 기반의 키 교환 프로토콜)

  • 이성운;김우헌;김현성;유기영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.299-302
    • /
    • 2003
  • 본 논문에서는 패스워드 검증자(verifier) 기반의 인증 및 키 교환 프로토콜을 제안한다. 제안한 프로토콜은 패스워드 기반 프로토콜들의 가장 큰 문제점인 패스워드 추측공격과 중간 침입자 공격, 그리고 Denning-Sacco 공격에 안전하며, 완전한 전방향 보안성을 제공할 수 있다. 그리고 패스워드 검증자를 기반으로 하기 때문에 서버의 패스워드 파일의 노출에도 안전하다. 제안된 프로토콜의 안전성은 이산대수 문제와 Diffie-Hellman 문제의 어려움, 그리고 해쉬 함수의 암호학적 강도에 기반을 두고 있다. 또한 제안한 프로토콜은 구조가 간단하고 병렬 처리가 가능하기 때문에 안전하다고 알려진 기존의 프로토콜들과 비교하여 효율적이다.

  • PDF

A Study on Attacker trace techniques applying 2-MAC authentication packet in Distribution Network (분산 네트워크 환경에서 2-MAC 인증 패킷을 이용한 공격자 추적기법)

  • 서대희;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.326-329
    • /
    • 2003
  • 최근 인터넷을 대상으로 한 사이버 공격의 공격 경향은 분산 환경에서 다수 공격자의 대규모 분산 서비스 거부 공격(DoS)의 출현 및 해외 해커들의 국내 전산망을 우회 루트로 활용한 사례의 증가 등 고도화된 불법 행위가 점차 범죄의 강력한 수단으로 이용되는 추세에 있다. 본 논문은 기존 네트워크에서 해당 네트워크의 침입자의 트래픽 차단 방법의 취약점을 보완하여 2-MAC 인증 패킷을 이용한 효율적인 공격자 추적기법을 제안하였다. 제안된 방식은 기존 시스템에서의 NIC(Network Interface Card)의 물리적 주소인 MAC(Media Access Control)과 메시지 인증코드(MAC: Message Authentication Code)를 이용한 방식을 제안하였다.

  • PDF

Design of False Alerts Reducing Model Using Fuzzy Technique for Intrusion Detection System (퍼지기법을 이용한 침입 탐지 시스템 오류경고메시지 축소 모델 설계)

  • Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.794-798
    • /
    • 2007
  • As the development of information technology and thus the growth of security incidents, so implement are coming out for defense the intrusion about the system. However the error detection program has got a difficulty to find out the intrusions because that has become so many false alert messages. In this study is how to reduce the messages for the false alerts which come from the internal of the network and using the Fuzzy techniques for reduce the uncertainty of the judge. Therefore it makes the model which can decrease false alert message for better detection.

  • PDF