• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.024 seconds

Object Image-based Intelligent Alarming/Monitoring System over theWired and Wireless Communication Network (유무선 통신 네트워크에서의 오브젝트 이미지 기반의 지능형 경보/모니터렁 시스템)

  • 강영상;김창화
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04b
    • /
    • pp.148-150
    • /
    • 2002
  • 침입자. 화재. 폭발이나 기계 이상과 같은 인적, 물적 재산에 피해를 입힐 수 있는 대부분의 응급 상황은 시각적으로 인식 가능하다. 따라서 사고가 발생하기 이전에 사고의 발생 가능성을 관계자에게 신속히 전달하여 인적, 물적 피해를 입지 않게 또는 최소화할 수 있게 대처하는 것이 필요하다. 이미지 기반의 지능형 경보/모니터링 시스템을 개발하여 자동적으로 비정상 상태를 인식하고 이를 관계된 사람들에게 인터넷과 전화, PCS, PDA로 신속하게 전달하는 유무선 통신 네트워크에서의 오브젝트 이미지 기반의 지능형 경보/모니터링 시스템을 구현하였다. 이 논문에서는 이미지 기반의 지능형 경보/모니터링 시스템의 구성에 대하여 설명하고 각 구성 요소의 기능에 대해서 설명한다

  • PDF

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Trust Based False-Positive Reduction Scheme against DoS Attacks (Trust 기반의 DoS 공격에 대한 False-Positive 감소 기법)

  • 박종경;이태근;강용혁;엄영익
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.697-699
    • /
    • 2003
  • 최근의 네트워크 공격의 주류는 DoS (denial-of-service)와 DDoS (distributed DoS) 공격이다. 이러한 공격들은 공격자가 침입 대상 시스템의 자원을 완전히 소모시켜서 시스템이 정상적인 서비스를 할 수 없도록 하는 것이다. 각 시스템의 관리자들은 이러한 침입이나 공격을 막기 위한 방편 중에 하나로 IDS(Intrusion detection system)를 사용하고 있다. 그러나 IDS의 높은 false-positive(정상적인 사용을 공격으로 잘못 판단하는 경우)의 발생빈도는 심각한 문제점 중의 하나는 이다. 이런 false-positive의 발생빈도를 줄이고자 본 논문에서는 한번의 판단만으로 연결(connection)을 차단시키지 않고, trust라는 개념을 도입하여 trust의 값에 따라서 사용자에게 차등 서비스를 제공하는 기법을 제안한다. 즉, trust를 이용하는 기법은 각 사용자를 한번에 공격자인지 일반 사용자인지 결정하지 않고, 한 번 더 검사하여 false-positive의 발생빈도를 감소시키는 기법이다.

  • PDF

Design of Intrusion Detection and Audit Trail System using Network Events (전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계)

  • Kim, Ki-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2342-2353
    • /
    • 1997
  • According to the outstanding development of information industry, a study of firewall is progressing as one of methods to cope with threat and loss of the data through computer network. For the secure network, this paper proposes the method diminishing threat and loss of the network using the correlation firewall with network audit trail system. Also, this paper suggests not only the audit analyzer execution model but also the type of databases used in audit analyzer to analyze the audit data. Network audit trail system has the function of identifing and analyzing of all intruder actions using audit records created by users.

  • PDF

Design and Implementation of an Advanced Cattle Shed Management System using a Infrared Wireless Sensor nodes and Surveillance Camera (적외선 무선 센서 노드 및 무인감시카메라를 이용한 선진화된 축사 관리 시스템의 설계 및 구현)

  • Yoon, Min;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.22-34
    • /
    • 2012
  • In this paper, we design and implement an advanced cattle shed management system using a infrared wireless sensor nodes and surveillance camera. Our system provides three main capabilities, such as 24-hours cattle shed monitoring, trespassing detection, automatic control of cattle shed. For this, our system can monitor cattle shed as well as the condition of cows/bulls for 24 hours per day by using surveillance cameras. Our system also can detect intruders inside the cattle shed by using infrared wireless sensor nodes. In addition, our system can control the power of electric equipments in the cattle shed by using a power controller. Finally, we combine the three components into a system by using a smartphone application program and verify the effectiveness of our system by a testbed.

A Suitability Evaluation Method for Quantitative Assessment of Intrusion Tolerant System using AHP-Fuzzy Integral (AHP-퍼지적분을 이용한 침입감내 시스템 도입 적절성 평가를 위한 정량적 평가방법 연구)

  • Yu, Kwang-Jin;Lee, Jae-Wook;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.87-93
    • /
    • 2009
  • Intrusion tolerant system enables essential services to maintain for a period of time under system failure, malicious attacks and is gaining more importance in national defense, communication infrastructure, and financial sector. However, few objective evaluation criteria for companies and agencies to introduce an appropriate system are available. This paper proposes a suitability evaluation method, using Analytic hierarchy process and fuzzy integral, for intrusion tolerant system, along with evaluation criteria which considers the characteristics and costs of systems in addition to other factors.

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

Research on the Security of Infrastructures Using fiber Optic ROTDR Sensor (광섬유 ROTDR센서를 이용한 사회기반시설물의 보안에 관한 연구)

  • Park, Hyung-Jun;Koh, Kwang-Nak;Kwon, Il-Bum
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.2
    • /
    • pp.140-147
    • /
    • 2003
  • A detection technique is studied to determine the location and the weight of an intruder into infrastructure using fiber optic ROTDR (Rayleigh optical time domain reflectometry) sensor. Fiber optic sensing plates buried in sand are prepared to measure the intruder effects. The signal of ROTDR was analyzed to confirm the detection performance. The constructed ROTDR system could be used up to 12km at the pulse width of 30ns. The location error was less than 3m and the weight could be detected into three levels of grade, such as 20kgf, 40kgf and 60kgf.

Implementation of file Access Control Module Using on Windows XP (윈도우 XP 기반의 파일 정책 모듈 설계 및 구현)

  • 성경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1204-1211
    • /
    • 2004
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.