• Title/Summary/Keyword: Access Monitoring System

Search Result 398, Processing Time 0.025 seconds

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

Prototype for the Weather Monitoring System with Web - Based Data Management - Construction and Operation

  • Kim, Jinwoo;Kim, Jin-Young;Oh, Jai-Ho;Kim, Do-Yong
    • Atmosphere
    • /
    • v.20 no.2
    • /
    • pp.153-160
    • /
    • 2010
  • In this paper, an attempt has been made to build and test self-configuring weather sensor networks and internet based observation system to gather atmospheric data. The aim is to provide integrated or real-time weather information in standard form using network data access protocol. This system was successfully developed to record weather information both digital as well as visual using sensor network and web-enabled surveillance cameras. These data were transformed by network based data access protocol to access and utilize for public domain. The competed system has been successfully utilized to monitor different types of weather. The results show that this is one of the most useful weather monitoring system.

GPS based Green Zone Access Monitoring System (GPS 기반 그린존 접근감시 시스템)

  • Jang, Jae-Myung;Lee, Hyoung-Seon;Jeong, Do-Hyeong;Song, Hyun-Ok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.612-613
    • /
    • 2016
  • Today, a variety of systems have been developed to protect women and children. However, crime rates are still rising in the Green Zone. So we need the system to protect it. In this paper, we propose a system that sends messages in real time to the Green Zone administrator when a registered offender access to the Green Zone area. The existing system is a passive data transmission through monitoring. But the proposed system when access to the Green Zone set, detects a GPS-based. Accordingly, It is expected to be able protection through to monitor in real time and manage for women and children from criminals.

  • PDF

The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking (비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

An Efficient Monitoring Method of a Network Protocol for Downloadable CAS

  • Jeong, Young-Ho;Kwon, Oh-Yung;Ahn, Chung-Hyun;Hong, Jin-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.32-35
    • /
    • 2010
  • This paper presents an efficient monitoring method of a network protocol for a downloadable conditional access system (DCAS) that can securely transmit conditional access software via a bi-directional communication channel. In order to guarantee a secure channel based on mutual authentication between a DCAS head end server and set-top boxes, DCAS messages are encrypted and digitally signed. Owing to applied cryptographic algorithms, it is impossible to get information from messages directly without additional processing. Through categorizing DCAS messages into several groups, the proposed monitoring method can efficiently parse and trace DCAS messages in real-time. In order to verify the stability and effectiveness of the proposed monitoring method, we implement a DCAS monitoring system capable of capturing and parsing all DCAS messages. The experimental results show that the proposed monitoring method is well designed.

  • PDF

The Analysis on the Upsteam band Signal in the HFC Access Network (HFC 가입자망 상향대역 신호분석에 관한 연구)

  • 장문종;김선익;이진기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.142-144
    • /
    • 2004
  • To provide more qualified data service on the HFC(Hybrid-Fiber Coaxial) access network, the channel characteristics of upstream transmission band should be carefully investigated and analysed. It will be easier to do network management if the monitoring system for noise measurement in the network is available, In this paper, noise analysis method and the frequency selection method in the upstream band for duplex transmission are suggested. And, Data aquisition device for the signal measurement Is implemented. With this network monitoring system, field test and the result from the collected data are described.

  • PDF

A Tablet PC-based Monitoring System for Oceanic Applications

  • Lee, Ji Young;Oh, Jin Seok
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.253-257
    • /
    • 2013
  • Mobile computers can process large amounts of data at high speeds, and it is feasible and easy to implement a remote monitoring system utilizing mobile computers. Because of their portability and convenience, these computers have been employed in various research areas to develop such monitoring systems. Existing monitoring system is a bit difficult to real time monitoring the scattered offshore facilities. So this paper compensate the existing system by using mobile computers such as a tablet PC-based monitoring system. Also, the scattered offshore facilities can be monitored in real-time through the tablet PC. The developed monitoring system is a fully Internet-based monitoring platform that enables one to monitor and control remote oceanic applications at any time and any place where it is possible to access the Internet. It can be applied to many oceanic applications as well as the unmanned systems and remote monitoring systems on land.

A Design of New Real Time Monitoring Embedded Controller using Boundary Scan Architecture (경계 주사 구조를 이용한 새로운 실시간 모니터링 실장 제어기 설계)

  • 박세현
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.6
    • /
    • pp.570-578
    • /
    • 2001
  • Boundary scan architecture test methodology was introduced to facilitate the testing of complex printed circuit board. The boundary scan architecture has a tremendous potential for real time monitoring of the operational status of a system without interference of normal system operation. In this paper, a new type of embedded controller for real time monitoring of the operational status of a system is proposed and designed by using boundary scan architecture. The proposed real time monitoring embedded controller consists of test access port controller and an embedded controller proposed real time monitoring embedded controller using boundary scan architecture can save the hard-wire resource and can easily interface with boundary scan architecture chip. Experimental results show that the real time monitoring using proposed embedded controller is more effective then the real time monitoring using host computer.

  • PDF