• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.023 seconds

Automatic Detection of Dangerous Abandoned Objects for Protection of National Important Facilities (국가주요시설 보호를 위한 유기 위험물 자동 탐지 시스탬 프레임워크)

  • Oh, Won Jun;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.474-475
    • /
    • 2018
  • 전 세계적으로 9.11로 대표되는 자살테러, 비행기테러, 화학가스 테러 등에 의한 인명피해가 늘고 있다. 1986년 김포공항 폭발사고, 1995년 음진리교 지하철 사린가스 사건, 2001년 9.11 사건, 2003년 필리핀 공항 폭탄테러 사건 등의 큰 테러 외에도 작은 사건은 무수히 많다. 이러한 테러 사태를 미연에 방지하기 위한 지능형 영상 보안 감시 시스템이 사회적으로 연구되어왔고 도입되어 왔다. 기존의 지능형 영상 보안 시스템은 모션 디렉션 기반으로 금지구역의 침입자로 판단되는 사람을 찾는 기능 중심으로 발전해왔다. 또한 보안요원의 관찰 모니터를 통해 화면을 계속 주시하는 한계 시간의 존재와 모니터 증가에 따른 한계 시간은 더 급감하게 되는 것으로 판단되었다. 이에 본 연구를 통해 유기물 탐지의 자동화를 추구하고, 보안 요원의 감시 업무를 도와 국가 주요 시설물의 유기물 자동 탐지를 통해 테러로부터 안전하게 보호하고자 한다.

Smart Home Control with Google Assistant (구글 어시스턴트를 이용한 스마트 홈 제어)

  • Park, Myeong-Chul;Kim, Young-Dea;Cha, Sung-Ho;Tea, Mun-Gyu;Lee, Sung-Joong;Ha, Yee-Ji
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.241-242
    • /
    • 2019
  • 4차 산업 혁명에 맞춰 빠르게 발전하고 1990년대부터 등장하기 시작했던 '인텔리전트 빌딩'이 다시 주목을 받고 있다. 센서와 컴퓨터가 내장된 사물들이 인터넷으로 연결되어 각종 서비스를 제공하여 환경을 변화시키고 삶이 편해지고 있다. 그럼에도 불구하고 편리함을 추구하는 기존 기술 들은 대기업들이 주를 이루어 관리를 하게 되고 있고 유지 보수비용이 많이 들어 스마트 기기에 능숙하지 않은 부분도 있어 본 논문은 보다 기존의 IOT 기술보다 유지 보수비용의 절감과 손쉬운 접근방식을 제공한다. 본 논문인 '구글 어시스턴트를 이용한 스마트 홈 제어'는 집 전체를 제어하여 조명, 냉난방, 환기 등을 조절하고 무단 침입자를 감지하며 경고음을 알려주는 것이다. 예를 들어 집 주인이 외출을 하였는데 가스렌지의 불을 안 끄고 나왔거나 조명을 안 끄고 나왔는데 집을 다시 들어가기 어려운 상황일 때 핸드폰으로 버튼 하나만 누르면 제어가 된다. 본 논문의 목적은 집안의 화재나 전기 요금절감을 위하고 편리한 삶을 추구하고자 개발 되었다.

  • PDF

A Study on Multi-Variant Execution Environment (Multi-Variant Execution Environment 연구 동향)

  • Cho, Myunghyun;Chang, Jiwon;Nam, Kevin;Hwang, Dongil;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.275-278
    • /
    • 2020
  • C 와 C++은 비교적 자유로운 코딩 환경으로 많은 프로그래머들에게 사랑받는 프로그래밍 언어이다. 또한, 빠른 속도와 호환성 덕분에 현재 많은 IOT, 임베디드 시스템에 적용되고 있다. C 와 C++은 자유로운 환경을 가지고 있는 반면에 프로그래머의 부주의한 코딩 방식에 의해 여러 취약점을 발생시켜 공격 범위를 증가시킬 수 있다. 다음은 외부 침입자에게 공격에 필요한 좋은 소스를 제공할 수 있으므로 이러한 공격을 막기 위한 범용적인 기술이 필요하다. 본 연구에서는 다음 취약점에 대한 공격을 막을 수 있는 기술 중 하나인 Multi-Variant Execution Environment(MVEE) 기술을 소개하고 다음 기술의 핵심인 다양한 Variant 생성 방식과 기존 연구 분석을 통해 한계점을 고찰하고자 한다.

The Implementation of Day and Night Intruder Motion Detection System using Arduino Kit (아두이노 키트를 이용한 주야간 침입자 움직임 감지 시스템 구현)

  • Young-Oh Han
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.919-926
    • /
    • 2023
  • In this paper, we implemented the surveillance camera system capable of day and night shooting. To this end, it is designed to capture clear images even at night using a CMOS image sensor as well as an IR-LED. In addition, a relatively simple motion detection algorithm was proposed through color model separation. Motions can be detected by extracting only the H channel from the color model, dividing the image into blocks, and then applying the block matching method using the average color value between consecutive frames. When motions are detected during filming, an alarm sounds automatically and a day and night motion detection system is implemented that can capture and save the event screen to a PC.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Smart Wireless Intrusion Detection System Implementation for SOHO Environment (SOHO환경을 위한 스마트 무선 침입 탐지 시스템 구현)

  • Kim, Cheol-Hong;Jung, Im Y.
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.467-476
    • /
    • 2016
  • With the development of information technology, Small office Home office(SOHO) is picking up. SOHO generally uses Wi-Fi. The wireless LAN environment using 802.11 protocol is easily affected by DoS attacks. To deal with these threats, there is Wireless Intrusion Detection System(WIDS). However, legacy products of WIDS cannot be easily used by SOHO because they are expensive and require management burden. In this paper, Smart WIDS for SOHO is proposed and implemented on Raspberry Pi2. And, it provides the interface for attack detection notice to android smart phone. Smart WIDS detects Masquerading DoS and Resource Depletion DoS based on IEEE 802.11 so that we notice the attempt of cracking Pre-shared Key(PSK), Man-In-The-Middle(MITM), and service failure.

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors (이 기종간 통합 센서를 이용한 센서네트워크 환경에서의 지능형 보안감시 시스템)

  • Oh, Suk-Jun;Moon, Seung-Jin;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.551-562
    • /
    • 2013
  • Current CCTV systems, which require continuous monitoring of the screens, have the limitation to detect and respond to the crime scenes in timely manner. Therefore, in recent years, the request for more intlligent surveillance system, with a ubiquitous sensor network, is increasing in order to behave more humanly fashions. Such systems require cllective data processing of the environments based on various sensors. In this article, we suggests a new paradigm based surveillance system which integrates PSD and dual PIR sensors. The proposed system evlves from a existing indoor intrusion detection system which can only identify the intrusion event to a better inteligent system with context awareness. We have conducted the various simulations in order to prove the effectiveness of the proposed system.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.