• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.028 seconds

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.

Generation of Efficient Fuzzy Classification Rules Using Evolutionary Algorithm with Data Partition Evaluation (데이터 분할 평가 진화알고리즘을 이용한 효율적인 퍼지 분류규칙의 생성)

  • Ryu, Joung-Woo;Kim, Sung-Eun;Kim, Myung-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.32-40
    • /
    • 2008
  • Fuzzy rules are very useful and efficient to describe classification rules especially when the attribute values are continuous and fuzzy in nature. However, it is generally difficult to determine membership functions for generating efficient fuzzy classification rules. In this paper, we propose a method of automatic generation of efficient fuzzy classification rules using evolutionary algorithm. In our method we generate a set of initial membership functions for evolutionary algorithm by supervised clustering the training data set and we evolve the set of initial membership functions in order to generate fuzzy classification rules taking into consideration both classification accuracy and rule comprehensibility. To reduce time to evaluate an individual we also propose an evolutionary algorithm with data partition evaluation in which the training data set is partitioned into a number of subsets and individuals are evaluated using a randomly selected subset of data at a time instead of the whole training data set. We experimented our algorithm with the UCI learning data sets, the experiment results showed that our method was more efficient at average compared with the existing algorithms. For the evolutionary algorithm with data partition evaluation, we experimented with our method over the intrusion detection data of KDD'99 Cup, and confirmed that evaluation time was reduced by about 70%. Compared with the KDD'99 Cup winner, the accuracy was increased by 1.54% while the cost was reduced by 20.8%.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Pyriproxyfen Inhibits Hemocytic Phagocytosis of the Beet Armyworm, Spodoptera exigua (파밤나방(Spodoptera exigua)의 혈구세포 식균반응에 대한 피리프록시펜의 억제효과 Nalini Madanagopal)

  • Madanagopal, Nalini;Lee, Yong-Joon;Kim, Yong-Gyun
    • The Korean Journal of Pesticide Science
    • /
    • v.11 no.3
    • /
    • pp.164-170
    • /
    • 2007
  • The concept of innate immunity in insects which refers to the first line of host defense constitutes the humoral and cellular components which are involved in recognition and actively participate in the elimination of the intruding foreign micro- or macro-organisms. Several recent studies suggest that juvenile hormone (JH) modulates the cellular immune reactions in response to pathogen. In this study, pyriproxyfen (a JH agonist as an insect growth regulator) was tested in its any inhibitory effect on the immune reactions of the beet armyworm, Spodoptera exigua. To this end, five different hemocyte morphotypes of final instar S. exigua were identified by phase contrast microscopy. Plasmatocytes and granular cells, which constitute about 90% of the total hemocyte count, were prominently distinguished based on their basophilic/acidophilic nature using Giemsa stain. The role of pyriproxyfen on the functional ability of hemocytes was analyzed using FITC-labeled Providencia vermicola for the phagocytic potential of the hemocytes. Both granular cells and plasmatocytes exhibited phagocytosis behavior. Pyriproxyfen significantly inhibited the phagocytosis of both cell types, proposing its novel action as an immunosuppressant.

A Study of the foundations of culture established the Sosu Seowon (소수서원(紹修書院) 건립의 문화적 토대 연구 - 회헌(晦軒) 안향(安珦)의 선비정신을 중심으로 -)

  • Lee, Jeong-Hwa
    • (The)Study of the Eastern Classic
    • /
    • no.48
    • /
    • pp.41-63
    • /
    • 2012
  • This research paper is aims to study the Zhu Xi school of Neo-Confucianism culture based on the Sosu seowon. Also This research paper is to discuss study and scholars correlation the Sosu seowon. The Sosu seowon is mainly made up of the Zhu Xi school of Neo-Confucianism development. The Sosu seowon was the cradle of scholars and bureaucrats. Scholars who study of orthodox Neo-Confucianism in the our country was respected academic spirit of An Whyang in the study of orthodox Neo-Confucianism. An Whyang is symbolic existence of the Sosu seowon. He knew well the importance of learning. He was the person to represent the Sosu seowon. Toegye and Sinje are handed down to the fundamental principle brought in on the orthodox Neo-Confucianism caused by An Whyang. This research paper is to based upon on academic spirit of An Whyang in the study of orthodox Neo-Confucianism. Scholars who study of orthodox Neo-Confucianism thought that the nation's happiness made appointment to a competent person learned the orthodox Neo-Confucianism caused by An Whyang related to the Humanism education.

A study on Keup-ahm Min Sah-pyeong's Realization of Reality (급암(及庵) 민사평(閔思平)의 현실인식)

  • Jeong, Seong-sik
    • (The)Study of the Eastern Classic
    • /
    • no.69
    • /
    • pp.509-530
    • /
    • 2017
  • The purpose f this thesis is to examine the reality of Min Sha-pyeong, which led to life in the end of the Koryo Dynasty. Min Sha-pyeong was able to conduct academic exchanges through active negotiations with various scholars at the time. After passing the civil service exam at the age of 21, Min Sha-pyeong acted in various positions and remained loyal to the government. Min Sha-pyeong, who frequently met with Lee Je-hyun, Baek Mun-bo and Lee-saek, exchanged opinions. Sometimes Baek Mun-bo gathered together and always joined him when drinking. Lee-saek was convinced that his poetry would continue to inspire. The time when Min Sha-pyeong was active very confusing at home and abroad. In the end of the Koryo Dynasty, the national operating system was unstable due to the poor land and the suffering of the afflicted people, who suffered from frequent in vasions of Japan. At the time, the corruption and the suffering of the people were serious. Min Sha-pyeong refers to the reality of the people who love the people, reflecting the lives of the people living in poverty. Min Sha-pyeong thinks life without loyality is not a normal life. If I had a desire, I realized that the riches of wealth would wane someday. Min Sha-pyeong hoped that he would be relieved of his sympathy and would be relieved of their position in sympathy ith the people. Here, youy can see the reality of the people in Min Sha-pyeong is clearly revealed.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Morphological Traits of Selected Chestnut Races and its Propagation Studies (밤나무 우량품종(優良品種)의 형태학적(形態學的) 특징(特徵)과 증식(增殖)에 관(關)한 연구(硏究))

  • Yim, Kyong-Bin;Kwon, Ki-Won
    • Journal of Korean Society of Forest Science
    • /
    • v.22 no.1
    • /
    • pp.49-62
    • /
    • 1974
  • 1. In the comparison of survival ratio among three different methods(bark graft, veneer graft, root graft), bark graft showed the highest survival ratio and root graft was the lowest. It was shown to be significant at the level of 5% in the analysis of variance for the results. It was able to be supposed that one of the main causes for the results was the different amounts of ferric tannic acid which was formated owing to the reaction of grafting knife with tannic acid oozing from cutting faces of the tree. In juvenile tissue graft, the survival ratio of inverted radicle graft was a little higher than that of juvenile stem graft, but there was no significant difference between two methods in analysis of variance. 2. The most hairs of chestnut tree leaves were recognized as stellates on the most part of leaves except for venation. The number of rays in the stellates was ranged from 4 to 8 generally. It was shown to be highly significant differences at the level of 1% among the each race growing at the similar environmental condition in the length of ray and the distributed ratio of the stellates having different ray number. 3. Excepting for the basal width of serration there were no significant differences between $Imakita_1$, $Imakita_2$ as well as between $Teteuchi_1$, $Teteuchi_2$ at the each point of experimental items in this study. Such results made this study more useful. 4. Among the races that were growing in the similar environmental condition, there were highly significant differences at the level of 1% in the length and the width of serration. 5. The rolling of hair, the angle of serration from the leaf margin, the existence of lateral vein in the serration, the intrusion of main vein into the serration and the width of main vein were observed to be somewhat useful as the subsidiary methods for the identification of chestnut races.

  • PDF