• Title/Summary/Keyword: Confidential data

Search Result 151, Processing Time 0.021 seconds

Construction of Korean Space Weather Prediction Center: SCINTMON and All-Sky Camera

  • Kwak, Young-Sil;Hwang, Jung-A;Cho, Kyung-Suk;Bong, Su-Chan;Choi, Seong-Hwan;Park, Young-Deuk;Kyeong, Jae-Mann;Park, Yoon-Ho
    • Bulletin of the Korean Space Science Society
    • /
    • 2008.10a
    • /
    • pp.33.1-33.1
    • /
    • 2008
  • As a part of the construction of Korean Space Weather Prediction Center (K-SWPC), Korea Astronomy and Space Science Institute (KASI) installed a Scintillation Monitor (SCINTMON) and an All-Sky Camera to observe upper atmospheric/ionospheric phenomena. The SCINTMON is installed in KASI building in Daejeon in cooperation with Cornell university and is monitoring the ionospheric scintillations on GPS L-band signals. All-Sky Camera is installed at Mt. Bohyun in Youngcheon in cooperation with Korea Polar Research Institute. It is used to take the photograph for upper atmospheric layer through appropriate filters with specific airglow or auroral emission wavelengths and to observe upper atmospheric disturbance, propagation of gravity wave and aurora. The integrated data from the instruments including SCINTMON and All-Sky Camera will be used for giving nowcast on the space weather and making confidential forecast based on some space weather prediction models.

  • PDF

Evaluation of Sewer Capacity using Kinetic Hydraulic Model (동력학적 수리해석모델 해석을 통한 하수관거능력 평가)

  • Yang, Hae Jin;Jun, Hang Bae;Son, Dae Ik;Lee, Joon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.23 no.5
    • /
    • pp.565-572
    • /
    • 2009
  • Hydraulic modeling is widely used to simulate wastewater flow. The simulated models are used to prevent flood and many other problems associated with wastewater flow in planning or rehabilitating sewer systems. In this study, MAKESW (An engineer, South Korea), MOUSE (DHI, Denmark), and SWMM (XPSoftware, USA) are used to for hydraulic modeling of wastewater in C-city, South Korea and E-city, Iraq. These modeling tools produced different results. SWMM comparably overpredicted runoff and peak flow. In using SWMM, use of accurate data with a high confidential level, detail examination over the target basin surface, and the careful selection of a runoff model, which describes Korea's unique hydraulic characteristics are recommended. Modification of existing models through the optimization of variables cannot be achieved at this moment. Setting up an integrated modeling environment is considered to be essential to utilize modeling and further apply the results for various projects. Standardization of GIS database, the criteria for and the scope of model application, and database management systems need to be prepared to expand modeling application.

Development of Evaluation System for Aviation Mission Suitability Depending on Pilot's Alertness and Physiological Stability Level (조종사의 각성 및 생리적 안정에 근거한 비행임무적합 수준 판정 시스템의 개발)

  • Kim, Dongsoo;Lee, Wooil
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.789-796
    • /
    • 2015
  • Fighter pilot's ability to maintain both mental and physical capabilities in highly stressful situations is important for aviation safety as well as mission performance because pilot may confront frequently unexpected physical and psychological stimulation. Cumulative psychological stress and physical fatigue can be causes of mood distortion, declined alertness, and can lead to reduction of combat capability. We have investigated bio-signals and performance tests to monitor stress and fatigue levels, and developed a system to evaluate aviation mission suitability before flight. This study elucidated that stress and fatigue level of pilot can be monitored by psychomotor cognitive test(PCT) and heart rate variability(HRV), and that the best of reference for aviation mission suitability was confidential interval obtained from cumulative data of individuals. The system to evaluate aviation mission suitability was constructed with measuring part with PCT and HRV and control part with DB and algorithm.

An Analysis of the Fire Load and Ventilation Factor in Underground Commercial Space (지하상업공간의 환기계수 및 화재하중 분석)

  • Choo Yeun-Hee;Lee Ji-Hee;Hong Won-Hwa
    • Journal of the Korean housing association
    • /
    • v.17 no.2
    • /
    • pp.135-142
    • /
    • 2006
  • The purpose of this study is to obtain the fire safety for underground commercial space with analysing fire loads and ventilation factors. It was adopted the investigation method of field survey with commercial uses for more confidential data. The results of this study can be summarized as follows; 1) The ventilation factor shows $0.04{\sim}0.24m^{1/2}$ and it may develop ventilation-controlled fires which have much fire hazard more than fuel-controlled fires. 2) The highest value of fire load is $158.48kg/m^2$ and appeared in footwear shop which has the value $137.35kg/m^2$ for unfixed combustibles and $21.13kg/m^2$ for fixed combustibles. 3) The average value of burning rates which mean the velocity of fire development and the fire damage range is 0.143. Therefore it is desired to decrease the combustibles of compartment and is needed the method of dispersion arrangement of goods and storage to steel cabinet and so on.

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

URL Phishing Detection System Utilizing Catboost Machine Learning Approach

  • Fang, Lim Chian;Ayop, Zakiah;Anawar, Syarulnaziah;Othman, Nur Fadzilah;Harum, Norharyati;Abdullah, Raihana Syahirah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.297-302
    • /
    • 2021
  • The development of various phishing websites enables hackers to access confidential personal or financial data, thus, decreasing the trust in e-business. This paper compared the detection techniques utilizing URL-based features. To analyze and compare the performance of supervised machine learning classifiers, the machine learning classifiers were trained by using more than 11,005 phishing and legitimate URLs. 30 features were extracted from the URLs to detect a phishing or legitimate URL. Logistic Regression, Random Forest, and CatBoost classifiers were then analyzed and their performances were evaluated. The results yielded that CatBoost was much better classifier than Random Forest and Logistic Regression with up to 96% of detection accuracy.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.