• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.031 seconds

Password System Enhancing the Security agains (타인의 관찰에서 안전한 패스워드 시스템)

  • Park Jong-Min;Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1790-1795
    • /
    • 2004
  • In this paper, the new password system called SPS(Secure Password System) in order to enhance the security of the system as well as to improve the weakness of the password which is very easy to be disclosed by other people, improving the methods which is identifying the users' legality using the computer system in the multi-users computer. SPS is adopting several strong points such as Easy Embodiment, Low Cost, and most of the good points of the traditional password system. In addition, it makes an easy introduction from the traditional password system. Above SPS has the high stable security in the practical experiments about both the literal attack of the online intruders and the exposure of Clients' password.

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

Smart Vision Sensor for Satellite Video Surveillance Sensor Network (위성 영상감시 센서망을 위한 스마트 비젼 센서)

  • Kim, Won-Ho;Im, Jae-Yoo
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.70-74
    • /
    • 2015
  • In this paper, satellite communication based video surveillance system that consisted of ultra-small aperture terminals with small-size smart vision sensor is proposed. The events such as forest fire, smoke, intruder movement are detected automatically in field and false alarms are minimized by using intelligent and high-reliable video analysis algorithms. The smart vision sensor is necessary to achieve high-confidence, high hardware endurance, seamless communication and easy maintenance requirements. To satisfy these requirements, real-time digital signal processor, camera module and satellite transceiver are integrated as a smart vision sensor-based ultra-small aperture terminal. Also, high-performance video analysis and image coding algorithms are embedded. The video analysis functions and performances were verified and confirmed practicality through computer simulation and vision sensor prototype test.

A Robust Algorithm for Moving Object Segmentation in Illumination Variation (조명변화에 강인한 에지기반의 움직임 객체 추출 기법)

  • Do, Jae-Su
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • Surveillance system with the fixed field of view generally has an identical background and is easy to extract and segment a moving object. However, it is difficult to extract the object when the gray level of the background is varied due to illumination condition in the real circumstance. In this paper we propose the segmentation algorithm to extract effectively the object in spite of the illumination change. In order to minimize the effect of illumination, the proposed algorithm is composed of three modes according to the background generation and the illuminational change. Then the object is finally obtained by using projection and the morphological operator in post-processing. A good segmentation performance is demonstrated by the simulation result.

  • PDF

External Context-Based Selective Resource Utilization Control Technique for Reducing Boot Time of Linux-Based Robot System (리눅스 기반 로봇 시스템의 부트 시간 단축을 위한 외부 컨텍스트 기반 선별적 자원 사용률 조정 기법)

  • Lee, Eunseong;Kim, Jungho;Yang, Beomjoon;Hong, Seongsoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.147-150
    • /
    • 2017
  • 지능형 로봇의 사용자 품질을 결정하는 주요 요소들 중 하나는 짧은 부트 시간이다. 로봇 시스템에서는 부팅 과정 중에 침입자인지, 자택 순찰, 개인 비서, 엔터테인먼트와 같은 다수의 응용들이 동시에 초기화되는데, 고품질의 사용자 경험을 제공하기 위해서는 사용자 응답성이 중요한 응용들이 우선적으로 초기화되어야한다. 이를 위해 리눅스 기반 로봇 시스템에서 부트 시간을 단축하기 위한 다양한 연구들이 진행되어 왔다. 하지만 이들은 단일 응용 각각에 대한 초기화 시간을 단축하는 연구들이며, 응용들 간에 CPU, 메모리, I/O와 같은 자원 경쟁에 의한 지연 요소를 고려하지 않고 있다. 본 논문에서는 응용들 간의 각종 자원경쟁들을 고려하여 사용자 응답성이 중요한 응용을 우선적으로 초기화하기 위한 외부 컨텍스트 기반 선별적 자원 사용률 조정기법을 제안한다. 이를 리눅스 기반 시스템 상에 구현하여 검증한 결과 응용의 부트 시간이 기존 대비 33.02% 단축됨을 확인했다.

  • PDF

A Study on the Moving Detection Algorithm for Mobile Intelligent Management System Based on the Cloud (클라우드 기반의 모바일 지능형 관제시스템에서의 움직임 감지 알고리즘에 관한 연구)

  • Park, Sung-Ki;Kim, Ok-Hwan
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.58-63
    • /
    • 2015
  • This study suggested the mobile intelligent management system based on the cloud service. The mobile intelligent management system are composed of cloud server, middleware and sensor networks. Each modules are controlled on mobile environment and observed operating status of each apparatus for environment. In this pater, the image-based moving detection algorithm applied in order to detect an intruder and average 12.3% are measured in moving detection experiments. it was confirmed the validity of the security device.

Mutual Localization of swarm robot using Particle Filter (Particle filter를 이용한 군집로봇의 상호위치인식)

  • Jung, Kwang-Min;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.298-303
    • /
    • 2010
  • robots determine the location of the other robot using wireless sensors. Use it to decide how to move his. And go to any location, will make shape of column and line, circle. In this paper, we discuss problem in circle formation enclosing target which moves. It is method about enclosed invader in circle formation based on mutual localization of swarm robot without infrastructure. Therefore, use trilateration that do not need to know the value of the coordinates of reference points. So, Specify enclosed point for the number of robots base on between the relative position of the robot in the coordinate system. And particle filter is proposed to improve the accuracy of the location.

An Availability Analysis of Primary-Backup Web Switch Considering Service Level Agreement (SLA 를 고려한 주-백업 웹 스위치의 가용도 분석)

  • Kang, Chang-Hoon;Park, Kie-Jin;Kim, Sung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1745-1748
    • /
    • 2005
  • 클러스터 기반 웹 시스템에서 클라이언트의 계층별 요청 형태에 따라 차별화된 서비스를 제공하려는 시도가 활발하다. 서비스 제공자와 클라이언트간의 서비스 계약 조건(SLA: Service Level Agreement)을 만족시키기 위해, 웹 스위치 단계에서 클라이언트의 서비스 요청의 내용을 파악한 후 동적으로 서버에 요청처리 작업을 할당함으로써, 클라이언트 계층별 SLA 의 제공이 가능하다. 하지만, 모든 클라이언트의 요청은 웹 스위치를 통하여 각 서버에 분배되기 때문에, 웹 스위치가 내부적 결함이나 외부의 침입에 의해 정상적인 서비스를 제공하지 못하는 경우, 웹 시스템 서비스의 다운을 초래 할 가능성이 높다. 본 논문에서는, 웹 스위치의 내부적인 결함은 물론 외부의 악의적인 공격(예, 침입, 바이러스)으로 인하여 웹 스위치에 문제가 발생하는 경우 대기하고 있는 백업(backup) 웹 스위치로 대치하여 서비스를 계속 수행함으로써, SLA 가 고려된 웹 시스템의 가용도(Availability)를 높일 수 있는 구조를 제안하였고, 마코브(Marcov) 분석 및 실험을 통해 시스템 가용도와 SLA 척도를 정량적으로 평가하였다.

  • PDF

A Conservative Safety Study on Low-Level Radioactive Waste Repository Using Radionuclide Release Source Term Model (선원항 모델을 사용한 저준위 방사성폐기물 처분장의 보수적인 안전성고찰)

  • Kim, Chang-Lak;Lee, Myung-Chan;Cho, Chan-Hee
    • Nuclear Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.63-70
    • /
    • 1993
  • A simplified safety assessment is carried out on rock-cavern type disposal of LLW using the analytical repository source term (REPS) model. For reliable prediction of the leach rates for various radionuclides, degradation of concrete structures, corrosion rate of waste container, degree of corrosion on the container surface, and the characteristics of radionuclides are considered in the REPS model. The results of preliminary assessment show that Cs-137, Ni-63, and Sr-90 are dominant. For the parametric uncertainty and sensitivity analysis, Latin hypercube sampling technique and rank correlation technique are applied. The results of the potential public health impacts show that radiological dose to intruder in the worst case scenario will be negligible and that more attention should be given to near-field performance.

  • PDF

Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6 (MIPv6의 안전한 바인딩 갱신을 위한 프로토콜 비교 분석)

  • Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.755-762
    • /
    • 2003
  • For the route optimization in the MIPv6, MN(Mobile Node) sends CN(Correspondent Node) a binding update message to notify the binding of is HoA(Home Address) with its new CoA(Care-of Address). However, unautenticated binding updates expose the involved MN and CM to various sucurity attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols, and the performance of packet exchanges and cryptographic operations. Then, we analyze the four typical binding update protocols based on the presented criterions. In addition, we propose some improvement tips for secure binding updates.