• Title/Summary/Keyword: ESM

Search Result 192, Processing Time 0.031 seconds

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.

Development of Wide Area Electric Energy Saving Management System for SMEs (광역 중소기업 전력 저감 관리 시스템 개발)

  • Cho, Hyun-Sang;Seo, Sang-Hyun;Kim, Yo-Hee;Jang, Hong-Soon
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.180-181
    • /
    • 2011
  • 에너지 절약 최적화를 위한 녹색 기술개발은 지속가능경제와 화석연료 사용에 의한 부작용을 최소화하기 위한 전세계적 화두로 대두되고 있다. 중소기업은 다양한 품목에서 자체적인 생산활동을 수행하며 대기업 제품에 사용되는 부품을 실질적으로 공급하고 전체 근로자의 85%이상을 고용하는 등 국가적인 부가가치 창출에 큰 역할을 수행하고 있으나, 인적자원과 관리 인프라의 부족과 부재로 인해 체계적인 에너지 관리를 통한 에너지 사용 절감을 위한 최적화 활동 수행에 한계점을 가지고 있다. 그러나, 향후 직접적인 에너지 절감을 통한 원가 경쟁력 향상은 물론 향후 탄소 거래제와 생산 공정과 결과물에 대한 정량적인 탄소배출량 관리제도의 법제화에 대비하여 이러한 제한상황에 대한 해결안 제시가 절실하게 요구되고 있다. 본 논문은 이러한 문제를 해결하기 위하여 서해안 산업단지를 대상으로 한국산업기술대학교 전력저감센터에서 개발중인 중소기업을 위한 energy saving management system (ESMS)에 대해 기술한다. ESMS는 개별 공장에서 소비되는 전체전력과 대표 부하에서의 소비전력의 전력품질과 현황을 모니터링하고 부하특성에 맞는 전력저감 메커니즘을 제공한다. 또한 자체적인 과거 소비전력 경향과 광역 공단의 전체 소비 데이터와의 비교 데이터를 통해 자체적인 전력 소비 현황 및 절감대책을 수립하도록 지원한다.

  • PDF

Flow and Internal Experiences of Korean High School Students in view of the Comparison between Public and Proprietary School (학교와 학원의 비교를 통해 본 청소년의 플로우 및 내적경험)

  • Kim, Kee-Ok;Hyun, Eun-Ja;Choe, In-Soo;Yoo, Hyun-Jung
    • Proceedings of the Korean Association for Survey Research Conference
    • /
    • 2005.12a
    • /
    • pp.247-262
    • /
    • 2005
  • The purpose of this study was to compare the school life of Korean high school students between public and proprietary schools, especially focused on their internal experiences and flow. Internal experiences were composed of three dimensions: emotion, cognitive efficiency, and satisfaction. Flow was classified into four conditions: apathy, boredom, anxiety, and flow. The study results are: 1. Korean high school students felt more flow when they were in public school than in proprietary school,. In public school, they felt relatively more bored, and on the other hand, they were relatively more anxious in proprietary school. 2. Korean high school students felt more positive emotions when they were in public school than in proprietary school. 3. Korean high school students were more involved into study when they were in public school than in proprietary school. 4. Korean high school students were more satisfied when they were in public school than in proprietary school.

  • PDF

The research regarding an information system risk management process modeling (정보시스템 위험관리 프로세스 모델링에 관한 연구)

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.157-164
    • /
    • 2006
  • From the hazard which it prepares in the hazards increase which it follows in information demand augmentation of information technical development and the consumer from inside systematizing integrity and solubility of information technological resources. inside against a confidentiality. The control against information and a system and a data outside is demanded. From the dissertation which it sees demand function and the structure which do information technical risk management system development it will be able to manage the danger which it infiltrates with the root which is various overview in hazard necessity it investigated the inside and outside of the country instance in the center and it analyzed. And it plans the dangerous civil official integrated process model ultimately as against a hazards it will be able to prepare in the dictionary in order, it put the place objective which it induces.

  • PDF

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Development Security agents for Integrated security management of the Educational Network (교육망의 통합보안관리를 위한 보안 에이전트 개발)

  • Lee, Do Hyeon;Kim, Hyun Cheol;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.43-55
    • /
    • 2015
  • Security infrastructure of Educational Network responds to threats by collecting and analyzing security events from various information protection system based on the integrated management system. Even if this system provides useful and detailed information to the administrator, there are some problems that this system does not provide effective response process and management systems for various threatening situations and the simultaneous threat processes. To solve this problem, we propose and develop security agents that enable the administrator to effectively manage integrated security for Educational Network. The proposed solution provides the administrator with efficient management techniques and process scheduling for various security events so that the administrator can response promptly to problems with the initial threat to Educational Network.

An Experiential Study of a Week of Korean High School Students on What They Do, Where They Go, and How They Feel Flow (경험표집법을 이용한 고등학생들의 생활경험에 관한 연구: 주된 활동과, 활동 공간, 및 플로우를 중심으로)

  • 최인수;김순옥;황선진;이수진
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.8
    • /
    • pp.213-227
    • /
    • 2003
  • The purpose of this study is to explore a weekly life of Korean high school students, especially focused on their activities, locations, and flow. The data were collected from 116 high school students by the Experiential Sampling Method, employing a cellular-phone as a signaling device. Students reported, in response to the 6964 random signals, that 43.4% of their time was spent for social/leisure activities. An additional 31% percent of time was used for productive activities and the rest of times belonged to maintenance activities. When engaged in productive activities, they usually reported anxiety, while they felt bored for social/leisure activities and flow for maintenance activities. The most pervasive context of their lives was school (42.8%), followed by home (33.3%), public space (24.6%), and educational institutes (9.2%). In general, they experienced flow for the most of the locations, except educational settings in which they felt anxiety. The flow for productive activities varied by gender, pending on where they had productive activities, while others did not show any significant differences in the activity flow by locations.

Shear behavior of RC interior joints with beams of different depths under cyclic loading

  • Xi, Kailin;Xing, Guohua;Wu, Tao;Liu, Boquan
    • Earthquakes and Structures
    • /
    • v.15 no.2
    • /
    • pp.145-153
    • /
    • 2018
  • Extensive reinforced concrete interior beam-column joints with beams of different depths have been used in large industrial buildings and tall building structures under the demand of craft or function. The seismic behavior of the joint, particularly the relationship between deformation and strength in the core region of these eccentric reinforced concrete beam-column joints, has rarely been investigated. This paper performed a theoretical study on the effects of geometric features on the shear strength of the reinforced concrete interior beam-column joints with beams of different depths, which was critical factor in seismic behavior. A new model was developed to analyze the relationship between the shear strength and deformation based on the Equivalent Strut Mechanism (ESM), which combined the truss model and the diagonal strut model. Additionally, this paper developed a simplified calculation method to estimate the shear strength of these type eccentric joints. The accuracy of the model was verified as the modifying analysis data fitted to the test results, which was a loading test of 6 eccentric joints conducted previously.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안관리 시스템에서의 침입탐지 및 대응을 위한 보안 정책 모델에 관한 연구)

  • Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.9-17
    • /
    • 2005
  • Recently It's difficult to deal with about variety of attack. And Simple Security management have a problem. It is that they don't develop system measuring their system envoirment and have efficient attack detector, countermeasure organization about large network. Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF