• Title/Summary/Keyword: IT보안

Search Result 5,408, Processing Time 0.036 seconds

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

A Study of Impact on the Job Satisfaction of Toxic Leadership : Group Cohesion Mediate Effect (군의 독성적(toxic) 리더십이 직무만족에 미치는 효과 : 조직 응집력의 매개효과)

  • Bae, Sang Hee;Park, Soo-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.285-303
    • /
    • 2020
  • A military is not an organization that seeks profits, such as a company, or a research institute whose results and outcomes can produce. Therefore, it can be said that the nature of the bureaucracy is stronger than any other organizations, which perform the task centered based on ranks. In addition, as military missions deal with national and operation security which is closed with each other and more conservative compare to other organization. In this circumstance, the role of military organization and leaders is to carry out their duties with the cost of people's lives, and indeed, leades and leadership in military are more important than those of any organizations. However, many researches are lacking or focused on leadership research in a limited field, especially positive field, developmental, constructive leadership research and researches that are not focused on that area are limited. Already in the United States, research on negative leadership has been actively conducted under the direction of the Secretary of US Army Thomas E. White in 2003, how toxic leadership is serving in military organizations and on the battlefield. Now they realize how toxic leadership had impact on missions in military organizations and on the battlefield. The purpose of this study is to collect and analyze qualitative and quantitative data on the negative leadership of military organizations that have not been studied. The aim of this study was to establish a literature study on the scope and behavior of toxic leadership among negative leadership and to build empirical data on toxic leaders of current military organizations, and to create occupations that occur when subordinates work with toxic leaders. This study analyzes changes in satisfaction and organizational cohesion that mediates results and causes. This study will be more urgent and important for groups that prioritize groups and organizations over individuals, and it may provide new directions for the role and impact of military leaders from attempting these studies.

e-Navigation 관련 산업현황에 관한 기초연구

  • Choe, Han-Gyu;Gang, Byeong-Jae
    • 선박안전기술공단연구보고서
    • /
    • s.4
    • /
    • pp.1-108
    • /
    • 2007
  • 2007. 7. 23 IMO의 NAV(항해안전전문위원회)53차 회의에서는 e-Navigation을 해상에서의 안전, 보안, 해양환경보호를 목적으로 전자적인 수단에 의해 선박과 육상에서 해양정보를 수집, 교환, 표시함으로써 항구와 항구간의 항해 및 관련된 서비스를 향상시키는 것으로 정의하고 있다.2005년 11월 영국의 교통부 장관 Stephen 박사는 Royal Institute ofNavigation에서의 연설에서 해상안전과 환경보호를 위하여 선박의 항해를 감시하는 관제소 및 항행하는 선박에 유용하고 정확한 정보가 더 많이 필요함을 역설하였다. 그리고 첨단 기술에 의해 자동화된 항공 항법분야를 예로들면서, 선박의 항법 분야도 항해와 관련된 모든 시설 및 작업을 전자적 수단으로 대체하는 개념인 e-Navigation으로 전환되어야 하며 영국은 이에 필요한 작업을 주도하겠다는 의견을 피력하였다. Stephen은 e-Navigation 도입으로 얻을 수 있는 이익으로 첫째, 항해 실수로 인한 사고 확률저감, 둘째,사고 발생 시 인명 구조 및 피해 확산을 위한 효율적 대응, 셋째, 전통적인항해시설 설치 불필요로 인한 비용 저감, 넷째 선박입출항 수속의 간편화 및항로의 효율적 운용으로 인한 상업적 이익 등을 들었다. 반면에e-Navigation 체계로 전환 시 예상되는 장애로는 첫째, 체계 구축을 위한 비용(특히 개발도상국가들의 경우 어려움 예상), 둘째, e-Navigation의 성과 달성을 위하여 세계 전 해역의 모든 선박이 e-Navigation 체계에 동참하도록유도하는 문제, 셋째, 전자해도 표시 및 선교 장비들에 대한 표준화 문제, 넷째, 육상에 설치할 e-Navigation 센터의 설계 및 구축 등을 꼽았다.IMO는 2005년 81차 MSC(해사안전위원회) 회의에서 영국이 일본, 마샬아일랜드, 네덜란드, 노르웨이, 싱가포르, 미국과 공동으로 제안한 ‘e-Navigation전략 개발’ 의제를 2006년 82차 MSC 회의에서 채택하고, NAV(항해 전문위원회)를 통하여 2008년까지 e-Navigation의 구체적 개념을 정립하고 향후 개발하여야 할 전략적 비전과 정책을 수립하기로 하였다. 이어서 영국을 의장으로 e-Navigation 전략개발 통신작업반이 구성되었는데, 지난 년간 19개국, 16개 전문기관이 참여하여 아래의 작업이 수행되었다. ○ e-Navigation 개념의 정의와 목적 ○ e-Navigation에 대한 핵심 이슈 및 우선 순위 식별 ○ e-Navigation 개발에 따른 이점과 단점의 식별 ○ IMO 및 회원국 등의 역할 식별 ○ 이행계획을 포함한 추가 개발을 위한 작업계획의 작성 IMO에서 수행되고 있는 e-Navigation 전략 개발 의제 일정은 2008년까지이다. 이 전략 개발에 있어서 중요한 요소는 e-Navigation이 포함할 서비스범위, 포함하는 서비스 제공에 필요한 인프라 및 장비의 식별, 인프라 구축및 운용비용을 부담할 주체에 대한 논의, e-Navigation으로 인한 이익과 투자비용에 대한 비교 분석 등이다. 이 과정에서 정부, 선주, 항만운영자, 선원등의 입장 차이와 선진국과 개발도상국 간의 경제 수준 차이는 전략 개발에있어 큰 어려움을 줄 것이므로, 이들이 합의된 전략을 만들기 위해서는 예정된 기간보다 다소 늦어질 가능성도 있다.e-Navigation 전략 개발이 완료되면 1단계로는 해상교통 관제시스템, 선박선교 장비, 무선 통신장비 등에 대한 표준화 작업이 이루어질 것이다. 이 과정에서 각국 간에 자국 보유 기술을 표준화시키기 위한 경쟁이 치열할 것으로 예상된다. 2단계에서는 e-Navigation 체계 하에서의 다양하고 풍부한 서비스 제공을 위한 관련 소프트웨어 및 하드웨어의 개발이 이루어질 것으로전망되는데, 이는 지난 10년간 육상에서 인터넷망 설치 후 이루어진 관련 서비스 산업의 발전을 돌아보면 쉽게 짐작할 수 있을 것이다.e-Navigation 체계 하에서 선박의 항해는 현재와는 전혀 다른 패러다임으로 바뀔 것이다. 예를 들어 현재 입출항 시 요구되던 복잡한 절차는one-stop 쇼핑 형태로 단순화되고, 현재 선박 중심의 항해에서 육상e-Navigation 센터가 적극적으로 관여하는 항해 체계로 바뀔 것이며, 해상정보의 공유와 활용이 무선 인터넷을 통해 보다 광범위하게 이루어질 것이 다.e-Navigation의 잠재적 시장 규모는 선박에 새로이 탑재될 지능형 통합 항법시스템 구축과 육상 모니터링 및 지원 시스템 등 직접 시장이 약 50조원,전자해도, 통신장비, 관련 서비스 컨텐츠 등 간접 시장의 규모가 150조원으로 총 200조원으로 대략 추산하고 있다. 향후 이 거대한 시장을 차지하기 위한 전략 수립이 필요한 시점이다. 지금까지 항해 장비 관련 산업은 선진국의일부 업체들에 의해 독점되어 왔다. 우리나라는 조선과 해운에서 모두 선진국임에도 불구하고 이 분야에서는 대부분 수입에 의존해 왔다. e-Navigation체계 하에서는 전체 시장이 커지고 장비의 사양이 표준화됨에 따라 어느 소수 업체가 현재처럼 독점하기는 더 이상 어려울 것으로 예상된다. 따라서e-Navigation은 우리나라도 항해 장비 분야 시장을 차지할 수 있는 좋은 기회라고 할 수 있다. 특히 조선 1위의 장점을 적극 활용한다면 다른 나라보다우위의 경쟁력을 확보할 수도 있다. 또한, 서비스 분야의 시장은 IT 기술과밀접한 관계가 있으므로 IT 강국인 우리나라가 충분한 경쟁력을 갖고 있다고 할 수 있다.그러나, EU를 비롯한 선진국에서는 이미 e-Navigation 에 대비한 연구를10여년 전부터 수행해 왔다. 앞에서 언급한 EU의 MarNIS 사업은 현재 거의마무리 단계로 당장 실용화 할 수 있는 수준에 있는 것으로 보인다. 늦었지만 우리도 이를 따라잡기 위한 연구를 서둘러야 할 것이다. 국내에서도e-Navigation의 중요성을 깊이 인식하고, 2006년에는 관련 산학연 전문가들로 작업반을 구성하여 워크숍 등을 개최한 바 있다. 또한 해양수산부에서도e-Navigation 핵심기술 개발을 위한 연구사업을 기획 추진하고 있다.그러나 현재 항해통신장비들의 기술기준은 ITU의 전파규칙(RR)과 IMO결의 및 SOLAS 협약을 따르고 있는데 이들 규약이나 결의에 대한 국제적인 추이와 비교할 때 국내의 기술은 표준화되지 못한 부분이 많은 실정이다.본 연구에서는 e-Navigation sytem중 표준화가 필요한 요소와 전자해도,AIS 등 e-Navigation(통합전자항법시스템)관련 국내산업현황 실태조사를 통해 국내 e-Navigation기술개발 동향에 대해 조사하고자 한다.

  • PDF

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.

Object Tracking Based on Exactly Reweighted Online Total-Error-Rate Minimization (정확히 재가중되는 온라인 전체 에러율 최소화 기반의 객체 추적)

  • JANG, Se-In;PARK, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2019
  • Object tracking is one of important steps to achieve video-based surveillance systems. Object tracking is considered as an essential task similar to object detection and recognition. In order to perform object tracking, various machine learning methods (e.g., least-squares, perceptron and support vector machine) can be applied for different designs of tracking systems. In general, generative methods (e.g., principal component analysis) were utilized due to its simplicity and effectiveness. However, the generative methods were only focused on modeling the target object. Due to this limitation, discriminative methods (e.g., binary classification) were adopted to distinguish the target object and the background. Among the machine learning methods for binary classification, total error rate minimization can be used as one of successful machine learning methods for binary classification. The total error rate minimization can achieve a global minimum due to a quadratic approximation to a step function while other methods (e.g., support vector machine) seek local minima using nonlinear functions (e.g., hinge loss function). Due to this quadratic approximation, the total error rate minimization could obtain appropriate properties in solving optimization problems for binary classification. However, this total error rate minimization was based on a batch mode setting. The batch mode setting can be limited to several applications under offline learning. Due to limited computing resources, offline learning could not handle large scale data sets. Compared to offline learning, online learning can update its solution without storing all training samples in learning process. Due to increment of large scale data sets, online learning becomes one of essential properties for various applications. Since object tracking needs to handle data samples in real time, online learning based total error rate minimization methods are necessary to efficiently address object tracking problems. Due to the need of the online learning, an online learning based total error rate minimization method was developed. However, an approximately reweighted technique was developed. Although the approximation technique is utilized, this online version of the total error rate minimization could achieve good performances in biometric applications. However, this method is assumed that the total error rate minimization can be asymptotically achieved when only the number of training samples is infinite. Although there is the assumption to achieve the total error rate minimization, the approximation issue can continuously accumulate learning errors according to increment of training samples. Due to this reason, the approximated online learning solution can then lead a wrong solution. The wrong solution can make significant errors when it is applied to surveillance systems. In this paper, we propose an exactly reweighted technique to recursively update the solution of the total error rate minimization in online learning manner. Compared to the approximately reweighted online total error rate minimization, an exactly reweighted online total error rate minimization is achieved. The proposed exact online learning method based on the total error rate minimization is then applied to object tracking problems. In our object tracking system, particle filtering is adopted. In particle filtering, our observation model is consisted of both generative and discriminative methods to leverage the advantages between generative and discriminative properties. In our experiments, our proposed object tracking system achieves promising performances on 8 public video sequences over competing object tracking systems. The paired t-test is also reported to evaluate its quality of the results. Our proposed online learning method can be extended under the deep learning architecture which can cover the shallow and deep networks. Moreover, online learning methods, that need the exact reweighting process, can use our proposed reweighting technique. In addition to object tracking, the proposed online learning method can be easily applied to object detection and recognition. Therefore, our proposed methods can contribute to online learning community and object tracking, detection and recognition communities.

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

A Study on the Appropriate Management of Maritime Police Authority in Korea Coast Guard: Focusing on the Japan Coast Guard (해양경비안전본부의 해양경찰권 적정 운영방안에 관한 연구: -일본 해상보안청과의 비교를 중심으로-)

  • Son, Yeong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.361-391
    • /
    • 2015
  • Regarding the [Government Organization Act; which is legislated on 19th November, 2014] Korea Coast Guard(KCG) has been re-organized and belong from Korea Coast Guard shall be established under the Minister of Oceans and Fisheries to Ministry of Public Safety and Security. Furthermore, National Police Agency(NPA) Commissioner has the right for administer duties concerning investigation and information by succession from Korea Coast Guard Commissioner. That means that main rule has been moved from prior KCG to Ministry of Public Safety and Security(MPSS) and NPA currently which is dual structure. Meanwhile, This kind of organization change has been effective to investigative agency which exert KCG's call of duty and causes needs of variety problems. In other words, There are quite huge changes such as KCG's reduction of their work, call of duty and re-organization regarding revised government organization act. However this change - including re-organization by government, was not able to take current MPSS's special features such as organization specialty and legal rights. It means, the current change has not been taken present law system CRIMINAL PROCEDURE LAW and there was no preparation to stable maritime police authority action as well. To sum up, this revised GOVERNMENT ORGANIZATION ACT is supposed to provide total, quick security service by establishing strong disasters and safety control tower. However they only contains few area such as organization revision regarding 'Sewol Ferry Disaster', they was not able to contain the other parts of Society. Therefore, in this article I would like to check the part of re-evaluation of current change made by KCC's organization revision. It is supposed to provide better legal stability by making clear of work area by government agencies who acts maritime police authority.

  • PDF

Abnormal Water Temperature Prediction Model Near the Korean Peninsula Using LSTM (LSTM을 이용한 한반도 근해 이상수온 예측모델)

  • Choi, Hey Min;Kim, Min-Kyu;Yang, Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.3
    • /
    • pp.265-282
    • /
    • 2022
  • Sea surface temperature (SST) is a factor that greatly influences ocean circulation and ecosystems in the Earth system. As global warming causes changes in the SST near the Korean Peninsula, abnormal water temperature phenomena (high water temperature, low water temperature) occurs, causing continuous damage to the marine ecosystem and the fishery industry. Therefore, this study proposes a methodology to predict the SST near the Korean Peninsula and prevent damage by predicting abnormal water temperature phenomena. The study area was set near the Korean Peninsula, and ERA5 data from the European Center for Medium-Range Weather Forecasts (ECMWF) was used to utilize SST data at the same time period. As a research method, Long Short-Term Memory (LSTM) algorithm specialized for time series data prediction among deep learning models was used in consideration of the time series characteristics of SST data. The prediction model predicts the SST near the Korean Peninsula after 1- to 7-days and predicts the high water temperature or low water temperature phenomenon. To evaluate the accuracy of SST prediction, Coefficient of determination (R2), Root Mean Squared Error (RMSE), and Mean Absolute Percentage Error (MAPE) indicators were used. The summer (JAS) 1-day prediction result of the prediction model, R2=0.996, RMSE=0.119℃, MAPE=0.352% and the winter (JFM) 1-day prediction result is R2=0.999, RMSE=0.063℃, MAPE=0.646%. Using the predicted SST, the accuracy of abnormal sea surface temperature prediction was evaluated with an F1 Score (F1 Score=0.98 for high water temperature prediction in summer (2021/08/05), F1 Score=1.0 for low water temperature prediction in winter (2021/02/19)). As the prediction period increased, the prediction model showed a tendency to underestimate the SST, which also reduced the accuracy of the abnormal water temperature prediction. Therefore, it is judged that it is necessary to analyze the cause of underestimation of the predictive model in the future and study to improve the prediction accuracy.

A Study on Improvement Plans for Local Safety Assessment in Korea (국내 지역안전도 평가의 개선방안 연구)

  • Kim, Yong-Moon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.69-80
    • /
    • 2021
  • This study tried to suggest improvement measures by discovering problems or matters requiring improvement among the annual regional safety evaluation systems. Briefly introducing the structure and contents of the study, which is the introduction, describes the regional safety evaluation method newly applied by the Ministry of Public Administration and Security in 2020. Utilization plans were also introduced according to the local safety level that was finally evaluated by the local government. In this paper, various views of previous researchers related to regional safety are summarized and described. In addition, problems were drawn in the composition of the index of local safety, the method of calculating the index, and the application of the current index. Next, the problems of specific regional safety evaluation indicators were analyzed and solutions were presented. First, "Number of semi-basement households" is replaced with "Number of households receiving basic livelihood" of 「Social Vulnerability Index」 in the field of disaster risk factors is replaced with "the number of households receiving basic livelihood". In addition, the "Vinyl House Area" is evaluated by replacing "the number of households living in a Vinyl House, the number of container households, and the number of households in Jjok-bang villages" with data. Second, in the management and evaluation of habitual drought disaster areas, local governments with a water supply rate of 95% or higher in Counties, Cities, and Districts are treated as "missing". This is because drought disasters rarely occur in the metropolitan area and local governments that have undergone urbanization. Third, the activities of safety sheriffs, safety monitor volunteers, and disaster safety silver monitoring groups along with the local autonomous prevention foundation are added to the evaluation of the evaluation index of 「Regional Autonomous Prevention Foundation Activation」 in the field of response to disaster prevention measures. However, since the name of the local autonomous disaster prevention organization may be different for each local government, if it is an autonomous disaster prevention organization organized and active for disaster prevention, it would be appropriate to evaluate the results by summing up all of its activities. Fourth, among the Scorecard evaluation items, which is a safe city evaluation tool used by the United Nations Office for Disaster Risk Reduction(UNDRR), the item "preservation of natural buffers to strengthen the protection functions provided by natural ecosystems" is borrowed, which is closely related to natural disasters. The Scorecard evaluation is an assessment index that focuses on improving the disaster resilience of local governments while carrying out the campaign "Creating cities resilient to climate crises and disasters" emphasized by UNDRR. Finally, the names of "regional safety level" and "local safety index" are similar, so the term of local safety level is changed to "natural disaster safety level" or "natural calamity safety level". This is because only the general public can distinguish the local safety level from the local safety index.

Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method (다중 SL-AVS 동기화 유지기법)

  • Park, Hyun-Moon;Park, Soo-Huyn;Seo, Hae-Moon;Park, Woo-Chool
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.