• 제목/요약/키워드: Control System Security

검색결과 1,725건 처리시간 0.029초

The Specification and Verification Using SPSL about NTFS's Multiuser Privileges (SPSL을 이용한 NTFS 다중 사용 권한에 대한 명세 및 검증)

  • ;;;;;;Dmitry Zegzhda
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (1)
    • /
    • pp.631-633
    • /
    • 2003
  • 시스템의 안전성을 평가하기 위해 프롤로그 기반의 명세 언어인 SPSL을 사용하여 보안 모델을 정형적으로 설계하였다. 보안 모델은 시스템의 3가지 컴포넌트, 시스템 보안 상태(system security states), 접근 통제 규칙(access control rules), 그리고 보안 기준(security criteria)으로 구성된다. 본 논문에서는 NTFS의 다중 사용 권한에 대한 보안 모델을 만들어서 3가지 컴포넌트를 명세하고 안전성 문제 해결 도구인 SPR[1]을 이용하여 검증하였다.

  • PDF

Security Access Control of Home System Through Authentication Server and Web Server (인증서버와 웹서버를 통한 홈 시스템의 보안 접근 제어)

  • Lee, Gang-Sik;Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 한국산학기술학회 2011년도 추계학술논문집 2부
    • /
    • pp.558-561
    • /
    • 2011
  • 본 논문은 임베디드 타겟 보드의 시스템을 활용하여 웹서버를 운용하고, 웹페이지를 통해 임베디드타겟 보드 내의 신호를 제어할 수 있도록 제작한 신호 감지 시스템을 통해 제어 신호를 받아 실제 작동여부를 확인할 수 있는 조형물을 구성하였다. 또한, Linux 커널을 컴파일하여 포팅한 임베디스 시스템과 Linux OS기반의 인증 서버를 구축하여 안전한 홈 시스템의 보안접근 제어가 가능하도록 하였다.

  • PDF

Natural Language Interface to an Intrusion Detection System

  • Collier, T.;Itoh, Masahiko
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.31.1-31
    • /
    • 2001
  • Computer security is a very important issue these days. Computer viruses, worms, Trojan horses, and cracking are prevalent and causing serious damages. There are also many ways developed to defend against such attacks including cryptography and firewalls. However, it is not possible to guarantee complete security of computer systems or networks. Recently much attention has been directed to ways to detect intrusions and recover from damages. Although there have been a lot of research efforts to develop efficient intrusion detection systems, little has been done to facilitate the interaction between intrusion detection systems and users ...

  • PDF

The MS Card Data Transfer System using Bluetooth Protocol (블루투스를 이용한 마그네틱 카드 정보 전송 시스템)

  • 강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2003년도 춘계종합학술대회
    • /
    • pp.435-438
    • /
    • 2003
  • The MS card data transfer system using blue-tooth protocol ran communicate the MS card data wirelessly and does not take an extra communication expense which is a weakness point of existing wireless communication system. This Blue-tooth system, which has excellent security and no extra communication expense, can efficiently communicate data of the place ,where can be solved with small scale wireless network, such as the theme-park or gasoline-station. Existing wireless communication system compose network using wireless-LAN protocol which has extra communication expense, or with RF protocol which has poor security. But this system suitable for LAN because it has not extra communication expense and it has excellent security cause frequency-hopping of Blue-tooth protocol. The MS card data transfer system using blue-tooth protocol has low power, high performance RISC processor and large scale 16-gray graphic LCD which is suitable for portable unit. The MS card data transfer system can efficiently control depot for a long time because it has low power, excellent security and no extra communication expense.

  • PDF

Analysis of Reduction Effect of Inter-Floor Noise Using Active Noise Control (ANC) Technique (능동소음제어 기술을 이용한 층간소음 저감효과 분석)

  • Hojin, Kim;Joong-Kwan Kim;Junhwan Kim;Hyunsuk Kim;Hyuk Wee
    • Journal of Korean Society of Disaster and Security
    • /
    • 제16권3호
    • /
    • pp.45-56
    • /
    • 2023
  • In this study, the application of ANC (Active Noise Control) technology to address inter-floor noise was explored. To achieve this, an ANC system was developed to manage the heavy impact sound within the frequency range of 40 to 500 Hz. The ANC system utilized an adaptive filter employing a feedforward approach based on the Fx-LMS algorithm. To set up the ANC system, a comprehensive analysis of various variables within the system was performed using computational simulations. This process enabled the identification of optimal filter settings and system configuration arrangements. In addition, the ANC system was implemented in the inter-floor noise test room at the Korea Conformity Laboratories (KCL). Through a certified standard testing procedure, it was confirmed that the ANC system led to a 4 dB reduction in inter-floor noise when the system was activated compared to when it was turned off. The results of this study indicate that the developed ANC system has an effect significant enough to elevate the rating criteria by one level for heavy impact sound.

An User Authorization Mechanism using an Attribute Certificate in the IPSec-VPN System (IPSec-VPN 시스템에서의 속성 인증서를 이용한 사용자 접근 제어 방안)

  • 강명희;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제14권5호
    • /
    • pp.11-21
    • /
    • 2004
  • To authorize IPSec-VPN Client in Client-to-Gateway type of the IPSec-VPN system, it can be normally used with ID/Password verification method or the implicit authorization method that regards implicitly IPSec-VPN gateway as authorized one in case that the IPSec-VPN client is authenticated. However, it is necessary for the Client-to-Gateway type of the IPSec-VPN system to have a more effective user authorization mechanism because the ID/Password verification method is not easy to transfer the ID/Password information and the implicit authorization method has the vulnerability of security. This paper proposes an effective user authorization mechanism using an attribute certificate and designs a user authorization engine. In addition, it is implemented in this study. The user authorization mechanism for the IPSec-VPN system proposed in this study is easy to implement the existing IPSec-VPN system. Moreover, it has merit to guarantee the interoperability with other IPSec-VPN systems. Furthermore, the user authorization engine designed and implemented in this paper will provide not only DAC(Discretional Access Control) and RBAC(Role-Based Access Control) using an attribute certificate, but also the function of SSO(Single-Sign-On).

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • 제23권3호
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment (안전한 클라우드 환경을 위한 클라우드 데이터 관리 시스템에 적용 가능한 보호프로파일에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권2호
    • /
    • pp.411-429
    • /
    • 2014
  • As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • 제18권3호
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

Supervisory Control for Energy Management of Islanded Hybrid AC/DC Microgrid

  • Mansour, Henda Ben;Chaarabi, Lotfi;Jelassi, Khaled;Guerrero, Josep M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.355-363
    • /
    • 2022
  • This paper presents the modeling for islanded hybrid AC/DC microgrid and the verification of the proposed supervisory controller for energy management for this microgrid. The supervisory controller allows the microgrid system to operate in different power flows through the proposed control algorithm, it has several roles in the management of the energy flow between the different components of the microgrid for reliable operation. The proposed microgrid has both essential objectives such as the maximum use of renewable energies resources and the reduction of multiple conversion processes in an individual AC or DC microgrids. The microgrid system considered for this study has a solar photovoltaic (PV), a wind turbine (WT), a battery (BT), and a AC/DC loads. A small islanded hybrid AC/DC microgrid has been modeled and simulated using the MATLAB-Simulink. The simulation results show that the system can maintain stable operation under the proposed supervisory controller when the microgrid is switched from one operating mode of energy flow to another.