• Title/Summary/Keyword: Access Security System

Search Result 1,037, Processing Time 0.029 seconds

Development of the Jini Surrogate-based Broadband PLC Home Controller (Jini Surrogate에 기반한 광대역 PLC 홈 제어기 개발)

  • Kim Hee-Sun;Lee Chang-Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • The home network system guarantees families a safe, economical, socially integrated and healthy life by using information appliances. And it provides a family with domestic safety, control of instruments, controllable energy and health monitoring by connecting to home appliances. This study designs the broadband PLC home controller using broadband PLC(Power Line Communication) technology which can save much cost at a network infrastructure by using the existing power line at home. The broadband PLC home controller consists of the broadband PLC module, the embedded main controller module and I/O module. The broadband PLC home controller can control various domestic appliances such as an auto door-lock, a boiler, an oven, etc., because it has various I/O specifications. In this study, selected home network middleware for the broadband PLC home controller is Jini surrogate using Jini technology designed by means of access to easily a home network system without a limitation of the devices. And a client application program is supported java servlet program to manage and monitor the broadband PLC home controller via web browser of a PC or a PDA, etc. Finally, for an application, we implemented and tested a home security system using one broadband PLC home controller.

A Study on the Web Service-Hacking Pattern Recognition System (웹서비스-해킹패턴 인지시스템에 관한 연구)

  • Lim, Chae-Gyun;Ahn, Da-Seon;Kim, Kyu-Ho;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.109-114
    • /
    • 2009
  • Recently, web 2.0 is becoming issue can provide a web based services and the technology is developing rapidly. In addition a variety of platforms on the web and SDK(Software Development Kit) is available from various aspects, web services, a trend that is rapidly growing user. But the development of security systems cannot follow the speed and These weaknesses are provided in the Web service by using illegal methods of information acquisition. Therefore, in this paper, we analyzed information for checking a variety of illegal access on Web services. Also, we designed and implemented Web Service-Hacking Pattern Recognition System for which warns the dangerous fact that as recognized hacking through comparisons the hacking patterns which have classified from the hacking method of existing system.

  • PDF

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

Exploratory Analysis of AI-based Policy Decision-making Implementation

  • SunYoung SHIN
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.203-214
    • /
    • 2024
  • This study seeks to provide implications for domestic-related policies through exploratory analysis research to support AI-based policy decision-making. The following should be considered when establishing an AI-based decision-making model in Korea. First, we need to understand the impact that the use of AI will have on policy and the service sector. The positive and negative impacts of AI use need to be better understood, guided by a public value perspective, and take into account the existence of different levels of governance and interests across public policy and service sectors. Second, reliability is essential for implementing innovative AI systems. In most organizations today, comprehensive AI model frameworks to enable and operationalize trust, accountability, and transparency are often insufficient or absent, with limited access to effective guidance, key practices, or government regulations. Third, the AI system is accountable. The OECD AI Principles set out five value-based principles for responsible management of trustworthy AI: inclusive growth, sustainable development and wellbeing, human-centered values and fairness values and fairness, transparency and explainability, robustness, security and safety, and accountability. Based on this, we need to build an AI-based decision-making system in Korea, and efforts should be made to build a system that can support policies by reflecting this. The limiting factor of this study is that it is an exploratory study of existing research data, and we would like to suggest future research plans by collecting opinions from experts in related fields. The expected effect of this study is analytical research on artificial intelligence-based decision-making systems, which will contribute to policy establishment and research in related fields.

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

Malware Classification System to Support Decision Making of App Installation on Android OS (안드로이드 OS에서 앱 설치 의사결정 지원을 위한 악성 앱 분류 시스템)

  • Ryu, Hong Ryeol;Jang, Yun;Kwon, Taekyoung
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1611-1622
    • /
    • 2015
  • Although Android systems provide a permission-based access control mechanism and demand a user to decide whether to install an app based on its permission list, many users tend to ignore this phase. Thus, an improved method is necessary for users to intuitively make informed decisions when installing a new app. In this paper, with regard to the permission-based access control system, we present a novel approach based on a machine-learning technique in order to support a user decision-making on the fly. We apply the K-NN (K-Nearest Neighbors) classification algorithm with necessary weighted modifications for malicious app classification, and use 152 Android permissions as features. Our experiment shows a superior classification result (93.5% accuracy) compared to other previous work. We expect that our method can help users make informed decisions at the installation step.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.