• Title/Summary/Keyword: Information leak

Search Result 245, Processing Time 0.03 seconds

A Study on Development of Internal Information Leak Symptom Detection Model by Using Internal Information Leak Scenario & Data Analytics (내부정보 유출 시나리오와 Data Analytics 기법을 활용한 내부정보 유출징후 탐지 모형 개발에 관한 연구)

  • Park, Hyun-Chul;Park, Jin-Sang;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.957-966
    • /
    • 2020
  • According to the recent statistics of the National Industrial Security Center, about 80% of the confidential leak are caused by former and current employees in the case of domestic confidential leak accidents. Most of the information leak incidents by these insiders are due to poor security management system and information leak detection technology. Blocking confidential leak of insiders is a very important issue in the corporate security sector, but many previous researches have focused on responding to intrusions by external threats rather than by insider threats. Therefore, in this research, we design an internal information leak scenario to effectively and efficiently detect various abnormalities occurring in the enterprise, analyze the key indicators of the leak symptoms derived from the scenarios by using data analytics and propose a model that accurately detects leak activities.

Unsupervised Learning-Based Pipe Leak Detection using Deep Auto-Encoder

  • Yeo, Doyeob;Bae, Ji-Hoon;Lee, Jae-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.21-27
    • /
    • 2019
  • In this paper, we propose a deep auto-encoder-based pipe leak detection (PLD) technique from time-series acoustic data collected by microphone sensor nodes. The key idea of the proposed technique is to learn representative features of the leak-free state using leak-free time-series acoustic data and the deep auto-encoder. The proposed technique can be used to create a PLD model that detects leaks in the pipeline in an unsupervised learning manner. This means that we only use leak-free data without labeling while training the deep auto-encoder. In addition, when compared to the previous supervised learning-based PLD method that uses image features, this technique does not require complex preprocessing of time-series acoustic data owing to the unsupervised feature extraction scheme. The experimental results show that the proposed PLD method using the deep auto-encoder can provide reliable PLD accuracy even considering unsupervised learning-based feature extraction.

False Alarm Filtering Algorithm Development of Pipeline Leak Detection System using Flow Volume Balance (유량 밸런스 특성을 활용한 송유관 누유 감지 시스템의 오알람 필터링 알고리즘 개발)

  • Kim, Min-Sung;Kim, Hie-Sik;Jung, Hae-Kyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.95-102
    • /
    • 2016
  • Pipeline is making the most use of transportation of petroleum products on the land. But due to tremendous accident or environmental disaster by oil pipeline leak or pipeline stolen, leak detection systems have been used for preventing it. Leak detection method based on negative pressure wave has been used at the long distance pipeline. But even if it has showed good leak detection quality, due to making a lot of false alarm, it has weak point that disturbs concentration to system. This study suggests algorithm and method of using volume balance to decrease false-alarm of pipeline leak detection system based on negative pressure wave.

The Analyzing the Consumer Information Leak Case of Korean Card Companies with Business Ethics CLD: Studying on Cause and Solution with System Dynamics (윤리경영 인과지도를 바탕으로 분석한 한국의 카드사 고객정보 유출 사건: 시스템다이내믹스를 활용한 원인 탐구와 해결책 모색)

  • Kim, SeungBum;Shin, Ho-Sang
    • Korean System Dynamics Review
    • /
    • v.17 no.1
    • /
    • pp.77-105
    • /
    • 2016
  • Whenever Information leak case had been happened, even though IT Infra systems were reinforced, those cases of kind were not decreased. It meant that the causes are not only the fault of IT, but also other things. So that the information leak cases should have been studied by the interdisciplinary way. There was a point of view for the Business Ethics which needed to be studied in the interdisciplinary way. Financial Information Leak Case of three representative Card Companies in Korea which is happened in 2014 was a case which was composed by many problems. These were bad circumstances, half-educated, lower salary, and the most of all, the C-Levels' ignorance of the law. By studying the CLD: Causal Loop Diagram of Business Ethics and those mentioned factors, few meanings were discovered. Firstly, this case was not a accident, but a predeterminate issue at all, because of the structural unethical corruption. Secondly, main reason of this case was not only criminals who leaked information, but also managers, especially CEO who didn't obey the law, forced that to employees. Thirdly, although those companies had moral guide and did CSR activities, it was not help to protect this information leak case. This study shows that the important thing was not the action for showing, but effective action to management for sustainability.

Research on Rapid Disaster Prevention Measures due to Leakage During Transport of Hydrochloric Acid Tank Lorry (염산 탱크로리 운송 중 누출에 따른 신속 방재방안 연구)

  • Byoung-chan Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.213-221
    • /
    • 2024
  • Purpose: The purpose is to find the optimal way to quickly block the leak in the event of a leak accident in a tank lorry transporting hydrochloric acid aqueous solution, a hazardous chemical, and to carry out effective disaster prevention work to minimize damage caused by the leak. Method: We organized the overall characteristics of hydrochloric acid and accidents that occurred during transportation by accident type and cause, and created a small tank that can be tested assuming a leak situation in a hydrochloric acid tanker, creating an environment similar to the leak situation, and leaking in various ways. I would like to experiment and organize blocking methods. Result: Through experiments, an effective leak blocking method was confirmed. We would like to summarize measures to quickly block a leak in the event of a leak and present the optimal disaster prevention plan that can be applied at the accident site. Conclusion: It has been confirmed that using a combination of adhesive tape and magnets is more effective in blocking leaks. Rapid response is possible by repeatedly training business emergency response teams and product transporters to appropriately select and respond to leak-blocking equipment. Additional research on various leak prevention methods is needed in the future.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

A scheme of leak detection model in a reservoir pipeline valve system using wavelet coherence analysis of injected pressure wave (주입 압력파의 웨이블릿 일관성 분석을 사용한 저수조-관로-밸브 시스템에서의 누수탐지모형 연구)

  • Ko, Dongwon;Lee, Jeongseop;Kim, Jinwon;Kim, Sanghyun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.35 no.1
    • /
    • pp.15-25
    • /
    • 2021
  • In this study, a method of leakage detection was proposed to locate leak position for a reservoir pipeline valve system using wavelet coherence analysis for an injected pressure wave. An unsteady flow analyzer handled nonlinear valve maneuver and corresponding experimental result were compared. Time series of pressure head were analyzed through wavelet coherence analysis both for no leak and leak conditions. The leak information can be obtained through either time domain reflectometry or the difference in wavelet coherence level, which provide predictions in terms of leak location. The reconstructed pressure signal facilitates the identification of leak presence comparing with existing wavelet coherence analysis.

Detection of Privacy Information Leakage for Android Applications by Analyzing API Inter-Dependency and the Shortest Distance (API간 상호 의존성 및 최단거리 분석을 통한 안드로이드 애플리케이션의 개인정보 유출 탐지 기법)

  • Kim, Dorae;Park, Yongsu
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.707-714
    • /
    • 2014
  • In general, the benign apps transmit privacy information to the external to provide service to users as the malicious app does. In other words, the behavior of benign apps is similar to the one of malicious apps. Thus, the benign app can be easily manipulated for malicious purposes. Therefore, the malicious apps as well as the benign apps should notify the users of the possibility of privacy information leakage before installation to prevent the potential malicious behavior. In this paper, We propose the method to detect leakage of privacy information on the android app by analyzing API inter-dependency and shortest distance. Also, we present LeakDroid which detects leakage of privacy information on Android with the above method. Unlike dynamic approaches, LeakDroid analyzes Android apps on market site. To verify the privacy information leakage detection of LeakDroid, we experimented the well-known 250 malicious apps and the 1700 benign apps collected from Android Third party market. Our evaluation result shows that LeakDroid reached detection rate of 96.4% in the malicious apps and detected 68 true privacy information leakages inside the 1700 benign apps.

A Fundamental Study on Leak Detection System for Water Supply Valve Using Smart Bolt (상수도 밸브 누수 탐지용 스마트 볼트 적용의 기초 연구)

  • Park, Chul;Kim, Young-seok;Jung, Hae-Wook;Choi, Sang-sik;Lee, Yong-Beom
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.144-154
    • /
    • 2020
  • Purpose: This paper is a fundamental study on the applicability of the smart bolt developed for monitoring system to detect the leakage of water supply valve. Method: A leak detection experiments were conducted using the smart bolt having embedded strain sensors and accelerometer. The smart bolt used in study meets the allowable criteria of torque and tensile stress for water supply system, and it can be applied to a joint of the water supply valve by behaving well within the allowable limits. Result: As a result of the simulated leak tests, a leak signal at the valve leak point was detected in a band of 60Hz, and the main pipe leaking point was observed to produce a leak signal having much higher frequency than that of the valve leak point. This seems to result in a total coupled vibration under unconfined conditions of the pipes. Conclusion: The smart bolts appeared applicable to detecting a leaking signal from the water supply valve.