• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.028 seconds

A study on the security policy improvement using the big data (빅데이터를 이용한 보안정책 개선에 관한 연구)

  • Kim, Song-Young;Kim, Joseph;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.969-976
    • /
    • 2013
  • The information protection systems of company are intended to detect all weak points, intrusion, document drain. All actions of people in company are recorded and can check persistently. On the other hand, what analyze security log generated by these systems becomes more difficult. Most staff who manages the security systems, and analyze log is more incomprehensible than a user or a person of drain for an information distribution process of the work-site operations and the management procedure of the critical information. Such a reality say the serious nature of the internal information leakage that can be brought up more. While the research on the big data proceeds actively recently, the successful cases are being announced in the various areas. This research is going to present the improved big data processing technology and case of the security field.

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

A Study on the Analysis and Countermeasures of Security Vulnerabilities in Drone (드론의 보안 취약점 분석 및 대응방안 연구)

  • Son, Chung-Ho;Sim, Jaebum;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.355-358
    • /
    • 2016
  • Recently, As the interest of the drone has increased the fields such as broadcasting, disaster site and leisure which uses the drone has been constantly expanded. However, an invasion of a person's privacy and a threat of hacking attack also have increased as population of drone. High-resolution cameras mounted on drones can take a photo or real-time video anytime and anywhere. It causes the invasion of privacy from private houses, buildings, and hotels. In this paper, we perform a security vulnerability assessment tests on the camera's from common commercial drones and we propose the countermeasures to protect the drones against unauthorized attacker who attempts to access the drone's camera from internal or external. Through this research, we expect the Aviation Act and legislation accept the concept of security and provide the polices such as drones equipped with security devices from the production stage to promote drone industry.

  • PDF

Design of Access Security System in conjunction with SNS Service based on the Physical Computing (피지컬 컴퓨팅 기반에서의 SNS 서비스를 연계한 출입 보안 시스템 설계)

  • Kim, Heewan;Jung, Gillyoung
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.93-101
    • /
    • 2015
  • Today, various access security technology appeared in this society as a result of the informatization and automation. Most building, floor, or door security certification system for the office units are installed, but there are many inconvenient matters. In order to minimises this, we used the face recognition function via the camera, and various sensors. In this paper, I designed the access security system through physical computing which Arduino offered, facial recognition program, and Twitter. Check that the personal information stored in the individual RFID tag is matched to the personal information stored on the existing server. Face recognition program input the face using a camera, and allow to confirm the identity. The system's abnormal or when the unauthenticated person is to penetrate, the system transmits the Twitter status message to the manager. It was designed continuously to monitor the status in real time in this way.

A Design of RSIDS using Rough Set Theory and Support Vector Machine Algorithm (Rough Set Theory와 Support Vector Machine 알고리즘을 이용한 RSIDS 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.179-185
    • /
    • 2012
  • This paper proposes a design of RSIDS(RST and SVM based Intrusion Detection System) using RST(Rough Set Theory) and SVM(Support Vector Machine) algorithm. The RSIDS consists of PrePro(PreProcessing) module, RRG(RST based Rule Generation) module, and SAD(SVM based Attack Detection) module. The PrePro module changes the collected information to the data format of RSIDS. The RRG module analyzes attack data, generates the rules of attacks, extracts attack information from the massive data by using these rules, and transfers the extracted attack information to the SAD module. The SAD module detects the attacks by using it, which the SAD module notifies to a manager. Therefore, compared to the existing SVM, the RSIDS improved average ADR(Attack Detection Ratio) from 77.71% to 85.28%, and reduced average FPR(False Positive ratio) from 13.25% to 9.87%. Thus, the RSIDS is estimated to have been improved, compared to the existing SVM.

Recent Update in Fecal Microbiota Transplantation (Fecal Microbiota Transplantation의 최근 동향)

  • Kim, Haejin;Kang, Kyungmin;Kim, Sujin;Im, Eunok
    • Korean Journal of Microbiology
    • /
    • v.50 no.4
    • /
    • pp.265-274
    • /
    • 2014
  • Gut microbiota is a group of microorganisms that resides in the intestine and serves many important functions in human health. Using 16S ribosomal RNA sequencing analysis, a wide variety of bacteria in human gastrointestinal tract has been identified along with intriguing findings that there is a different bacterial composition among individuals. Fecal microbiota transplantation (FMT) is a procedure of stool transplantation from healthy donors to patients suffering from various diseases. Specifically, FMT is able to alter the composition of gut microbiota of recipients and therefore could be an effective treatment for the patients with gastrointestinal diseases including recurrent Clostridium difficile infection, inflammatory bowel disease, and irritable bowel syndrome. Here we review a list of human diseases related to gut microbiota disturbance and the case studies of FMT. We also summarize medicines and diagnostic tools that are under development. Therefore, gut microbiota can be a next generation's biotherapy for promotion of health and treatment of chronic diseases.

A Group Key Management for Real-Time Multicasting Information Security (실시간 멀티캐스팅 정보보안을 위한 그룹키 관리)

  • Hong, Jong-Joon;Hwang, Kyo-Chul
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.809-814
    • /
    • 2003
  • The multicast transmitting the real-time data to groups may easily have many attacks from abnormal attacks because it has many links as compared to the unicast. The existing group key management architectures for preventing these problems are designed for protocols suitable for a large scale. Thus these architectures applied to a small scale routing protocols may have many overheads with key distribution and a constant core tree. Therefore this paper proposes a groups key management protocol for a secure multicast in PIM-SM multicast group communication. The proposed method divide multicast groups with RO(Rendezvous-Point), and subgroup key managers are established in each RP and can be transmitted groups keys between senders and receivers, so the security cannel is set up for secure data transfer, And this does not have needs of the data translation for group keys and the new key distribution for path change. As a result of this, the data transmission time can be reduced.

Cortical Granule Distribution During In Vitro Maturation and Fertilization of Porcine Oocytes (돼지난자의 체외성숙 및 수정시 일어나는 표층과립막세포의 분포변화에 관한 연구)

  • 송상진;권중균;도정태;김남형;이훈택;정길생
    • Korean Journal of Animal Reproduction
    • /
    • v.20 no.3
    • /
    • pp.343-351
    • /
    • 1996
  • The objectives of this study are to determine cortical granule distribution during in vitro maturation, parthenogenetic activation and in vitro fertilization of oocytes, and to investigate effects of microfilament inhibitor on the cortical granule distribution during in vitro maturation and fertilization of oocytes in the pig, The corti-cal granule distribution were imaged with fluor-escent labeled lectin under laser scanning confocal microscope or detected by transmission electron microscope. At germinal vesicle stage, cortical granule organelles were located around the cell cortex and were present as a relatively thick area on the oolema. Microfilaments were also observed in a thick uniform area around the cell cortex. Following germinal vesicle break down,microfilaments concentrated to the condensed chromatin and cortical granules were observed in the cortex. Treatment with cytochalasin B inhibited microfilament polymerization and prevented movement of cortical granules to the cortex. Cortical granule exudate following sperm penetration was evenly distributed in the entire perivitelline space. Therefore, these results suggested that the microfilament assembly is involved in the distribution, movement and exocytosis of cortical granules during maturation and fertilization of porcine oocytes. (Key words cortical granule, porcine, maturation, fertilization).

  • PDF

Bioinvasion and Distribution Pattern of Verbesina alternifolia in Korea (외래잡초 나래가막사리(Verbesina alternifolia)의 생물학적 침입 및 분포유형)

  • Kil, Ji-Hyon;Lee, Chang-Woo;Kim, Young-Ha;Kim, Jong-Min;Hwang, Sun-Min
    • Korean Journal of Weed Science
    • /
    • v.31 no.1
    • /
    • pp.24-33
    • /
    • 2011
  • Wingstem, Verbesina alternifolia of North America origin, was introduced in 1981 into the Korea terrestrial ecosystem. It scattered in a number of places with limited population size in most cases. Its population has spread into the forest at the Chiaksan National Park and occupied the natural vegetation. Distributions of wingstem were the most popular along the 12 road sites, especially in Route 453, Seohwa-myeon, Inje-gun, Gangwon-do and in Route 31, Yeongyang-gun, Gyeongsangbuk-do with 60% coverage of wingstem. It was also distributed in the 5 forest sites and 5 riversides. Despite of its attractive yellow flower, it is recommended to limit cultivation in the nature reserve or other ecosystem of conservation value.

Strain Ageing in Zircaloy-4

  • Rheem, Karp-Soon;Park, Won-Koo
    • Nuclear Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.19-27
    • /
    • 1976
  • The strain ageing behaviour of Zircaloy-4 has been studied in the temperature range 175$^{\circ}C$ to 575$^{\circ}C$ for both quenched and annealed specimens. The strain ageing in quenched Zircaloy-4 was found in the temperature range 175$^{\circ}C$ to 50$0^{\circ}C$ and its Peak occured at 3$25^{\circ}C$ while the strain ageing in annealed specimens occured in the temperature range 175-575$^{\circ}C$, showing two peaks, one at 323$^{\circ}C$ and a higher one at 45$0^{\circ}C$. The peak at 3$25^{\circ}C$ in both quenched and annealed specimens is considered to be due to the segregation of interstitial oxygen atoms to cell walls during ageing. The peak at 45$0^{\circ}C$ in annealed specimens is considered to he due to the interaction of dislocations with Fe atoms. It has been found that strain ageing stress at ~30$0^{\circ}C$ in zirconium alloys is proportional to the square root of oxygen content.

  • PDF