• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.023 seconds

Study on the Standard Guideline of Environmental Impact Assessment Focusing on Light Pollution (빛공해 분야의 환경영향평가 지침 표준화 연구)

  • Yun, Hee-Kyung;Choi, Tae-Bong;Kim, Bu-Kyung;Kim, Hoon
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.1
    • /
    • pp.63-70
    • /
    • 2019
  • Artificial lighting is an essential part, but it causes light pollution due to unnecessary or excessive use of light. Light pollution has negative effects such as power waste, adverse health effects, destruction of the ecosystem. But currently, light pollution is managed only post-management. The purpose of this study is to standardize methods of environmental impact assessment focusing on light pollution to effectively manage and reduce the negative effect of areas that may cause light pollution in advance.

Development of Smart Door Lock with Emergency Situation Recognition to Prevent Crime in Single Household Based on Deep Learning (딥러닝 기반 1인 가구 범죄 예방을 위한 긴급 상황 인식 스마트 도어록 개발)

  • Lee, Jinsun;Han, Jieun;Yoo, Hyuna;Park, Juyeon;Kim, Hyung Hoon;Shim, Hyeon-min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.251-254
    • /
    • 2020
  • 매년 1인 가구를 대상으로 한 범죄가 증가하고 있다. 이에 따라 지문인식, 스마트키와 같은 도어록 제품들이 출시되었지만 오히려 범죄에 악용되는 사례들이 발생하였다. 본 논문에서는 얼굴인식장치(face identifier, FI)를 통해 객체를 인식하고, 원격 도어록 관리자(remote door lock manager, RDM)를 통해 잠금제어부(locking control unit, LCU)를 관리하는 긴급 상황 인식 스마트 도어록을 제안한다. 사용자의 얼굴을 얼마나 빠르고 정확하게 인식하는지 속도와 신뢰도에 대한 테스트를 진행하였고, 긴급 상황 시 사용자가 안전하게 집으로 들어갈 수 있음을 확인하였다. 본 제품을 통해 주거 침입, 스토킹 등 1인 가구 대상 범죄율과 도어록 악용 범죄율이 낮아질 것으로 사료된다.

Real-time Abnormal Behavior Analysis System Based on Pedestrian Detection and Tracking (보행자의 검출 및 추적을 기반으로 한 실시간 이상행위 분석 시스템)

  • Kim, Dohun;Park, Sanghyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.25-27
    • /
    • 2021
  • With the recent development of deep learning technology, computer vision-based AI technologies have been studied to analyze the abnormal behavior of objects in image information acquired through CCTV cameras. There are many cases where surveillance cameras are installed in dangerous areas or security areas for crime prevention and surveillance. For this reason, companies are conducting studies to determine major situations such as intrusion, roaming, falls, and assault in the surveillance camera environment. In this paper, we propose a real-time abnormal behavior analysis algorithm using object detection and tracking method.

  • PDF

Techniques for Improving Host-based Anomaly Detection Performance using Attack Event Types and Occurrence Frequencies

  • Juyeon Lee;Daeseon Choi;Seung-Hyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.89-101
    • /
    • 2023
  • In order to prevent damages caused by cyber-attacks on nations, businesses, and other entities, anomaly detection techniques for early detection of attackers have been consistently researched. Real-time reduction and false positive reduction are essential to promptly prevent external or internal intrusion attacks. In this study, we hypothesized that the type and frequency of attack events would influence the improvement of anomaly detection true positive rates and reduction of false positive rates. To validate this hypothesis, we utilized the 2015 login log dataset from the Los Alamos National Laboratory. Applying the preprocessed data to representative anomaly detection algorithms, we confirmed that using characteristics that simultaneously consider the type and frequency of attack events is highly effective in reducing false positives and execution time for anomaly detection.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

On Providing Anonymity in Ad Hoc Networks (Ad Hoc Network에서 익명성 제공에 관한 연구)

  • Kang, Seung-Seok
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.93-103
    • /
    • 2007
  • Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.

  • PDF

A Study on the Promotion of Safety Management at Construction Sites Using AIoT and Mobile Technology (AIoT와 Mobile기술을 활용한 건설현장 안전관리 활성화 방안에 관한 연구)

  • Ahn, Hyeongdo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.154-162
    • /
    • 2022
  • Purpose: The government intends to come up with measures to revitalize safety management at construction sites to shift safety management at construction sites from human capabilities to system-oriented management systems using advanced technologies AIoT and Mobile technologies. Method: The construction site safety management monitoring system using AIoT and Mobile technology conducted an experiment on the effectiveness of the construction site by applying three algorithms: virtual fence, fire monitoring, and recognition of not wearing a safety helmet. Result: The number of workers in the experiment was 215 and 7.61 virtual fence intrusion was 3.5% compared to the number of subjects and 0.16 fire detection were 0.07% compared to the subjects, and the average monthly rate of not wearing a safety helmet was 8.79, 4.05% compared to the subjects. Conclusion: It was found that the construction site safety management monitoring system using AIoT and Mobile technology has a valid effect on the construction site.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

Ecological Study on the Flora of the Wi Island (위도 식물상의 생태학적 연구)

  • Huh, Kwang Shin;Il Koo Lee
    • The Korean Journal of Ecology
    • /
    • v.4 no.3_4
    • /
    • pp.68-79
    • /
    • 1981
  • We discovered following on our surveys to the island six times in May, August (1978), in April, May, June, July (1979). There are 73 families, 158 genera, 189 species, 31 varieties over Tracheophyta Fuller & Tippo. Till early or middle age of Lee Dynasty, the island's dominant plants was evergreen broad-leaved trees, mainly consisted with Camellia japonica L. and Castanopsis cuspidata Schot, var. sieboldii Nakai but due to the population growth and increased exiles constant ground burnt off fr cultivation, the number of evergreen broad-leaved trees was decreased and that of P. densiflora S. et Z. replaced position. That is to say, the island was dominated by the flora of the subtropical zone era, but it has been complicated by flora of the temperate zone whose reproductivity is more vivid, in modern era. Recently Pinus thunbergiana Franco, Robinia pseudo-acasasia L. Amoroha fructicasia L. invaded and reserved inthe island. During a decade of the end of Japanes rule and after liberation about all of Pinus densiflora S. et Z. were cut downed, and after that, under the Forest Bureau, there have being sucessed to Pinus thunbergiana France. Camellia japonica L. other 20 species of evergreen broad-leaved trees are distributed in Island Wi, a tutelary shrine of Dae Ri, a mountain at the back of a village of Chi Do Ri and a mountain at the back of Jin Ri administrative office of a township. The special plants of the island are 1) state of Lycoris aurea Herb which of foun in a ridge between fields and forest around Jin Ri and 2) stock of Cmbidium virescens Lindly bloomed under the Pinus densiflora forest of Keun Tan Chi Do.

  • PDF