• Title/Summary/Keyword: Infringement rate

Search Result 29, Processing Time 0.022 seconds

A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm (통합 보안정책 알고리즘 적용에 따른 최적화 방어 시스템 구축에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.39-46
    • /
    • 2011
  • This study is conducted to examine the optimal integrated security policy based on network in case of attacks by implementing unique security policies of various network security equipments as an algorithm within one system. To this end, the policies conduct the experiment to implement the optimal security system through the process of mutually integrating the unique defense policy of Firewall, VPN(Virtual Private Network), IDS(Intrusion Detection System), and IPS(Intrusion Prevention System). In addition, this study is meaningful in that it designs integrated mechanism for rapid detection of system load caused by establishment of the security policy and rapid and efficient defense and secures basic network infrastructure implementation.

A Design and Implementation of the Source Code Plagiarism Detection System

  • Ahn, Byung-Ryul;Choi, Bae-Young;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.319-323
    • /
    • 2005
  • As the software industry develops at a rate speed, anyone can copy or plagiarize without difficulty contents that are becoming digitalized. To make it worse, the development of various contents that be illegally copied and plagiarized are resulting in the increasing infringement on and the plagiarism of the intellectual property. This dissertation tries to put forth the method and the theory to effectively detect any plagiarism of the source code of programs realized in various languages. This dissertation analyzes the advantage and disadvantage of the plagiarism test software, and especially, presents a method to detect possible plagiarism by using the Pattern Matching to overcome its disadvantage. And it also intends to introduce more developed automatic detection system by overcoming the problems with the method of Pattern Matching.

  • PDF

A Study on the Establishments of Aircraft Noise Abatement Procedures in Gimpo International Airport (김포공항 항공기 저소음 운항절차 수립을 위한 연구)

  • Son, Jung-Gon;Kim, Yeon-Myung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.05a
    • /
    • pp.1033-1037
    • /
    • 2007
  • The final purpose of this study is to develop noise abatement procedures for minimizing the environmental impacts caused by aircraft noise in the vicinity of Gimpo Int'l Airport, and to establish appropriate noise limits and monitoring system. The results of study was suggests for more detail the crucial factors which one is reference noise level, $L_{MAX}=88dB(A)$ at 6.5km after take-off, and second one is to installation the additional three(3) noise monitoring system on both side of runway.

  • PDF

A Study on the Establishments of Aircraft Noise Abatement Procedures in Gimpo International Airport (김포공항 항공기 저소음 운항절차 수립을 위한 연구(II))

  • Son, Jung-Gon;Kim, Yeon-Myung
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.17 no.9
    • /
    • pp.874-880
    • /
    • 2007
  • The final purpose of this study is to develop noise abatement procedures for minimizing the environmental impacts caused by aircraft noise in the vicinity of Gimpo Int'l Airport, and to establish appropriate noise limits and monitoring system. The results of study was suggests for more detail the crucial factors which one is reference noise level, $L_{MAX}=88 dB(A)$ at 6.5 km after take-off, and second one is to installation the additional three(3) noise monitoring system on both side of runway.

Analysis Method of the Damages to Rights of Light due to the Construction of the Bridge in Rural Areas (농촌지역에서 교량건설에 따른 일조 피해 분석 방법)

  • Lim, Jae-Han;Lee, Ji-Young;Jung, Jin-Ju
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.10 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • Recently, construction of bridges in rural areas has been increased to preserve the natural environment. However this brings forth the disputes over rights of light in farmland. In urban areas, the disputes over rights of light have been settled on the authority of the national architectural law and only sunshine hours for winter solstice are considered. Basically, the point at issue is different between each case. The main issues of the dispute in rural area were the reduction of the crop cultivation and the increase of the heating cost in winter. The purpose of this study is to review the mediation process in national environmental dispute resolution commission to resolve these issues, and to set up the analysis method of rights of light and modelling equation of solar position. Furthermore, we aimed at analyzing the damaged hours of daylights in rural housing and the infringement rate of daylight in farmland through the case study. In conclusion, we estimated the sunshine hours during the whole damaged periods according to the elements of bridges, and presented the solution process of dispute over rights of light due to the construction of bridge in rural area.

  • PDF

Analysis of vulnerabilities and Breaches in a network separation environment (망분리 환경에서 취약성 및 침해사고 분석)

  • Choe, Ye-won;Lee, DongHwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.632-634
    • /
    • 2021
  • In proportion to the development of the Internet and the increase in users, the rate of cyber-incident using it is increasing. As a countermeasure, there is a network separation method that separates the system accessible to users and the system containing key information from each other. However, in the case of tasks that require the use of the Internet network, it is exposed to cyber attacks, and there are many loopholes in the method of data transmission between networks and the management and operation of the system, resulting in infection of the closed network. In this paper, we aim to enhance the safety of the networking system by investigating the types and cases of infringement accidents in these network separation environments.

  • PDF

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Classifying Windows Executables using API-based Information and Machine Learning (API 정보와 기계학습을 통한 윈도우 실행파일 분류)

  • Cho, DaeHee;Lim, Kyeonghwan;Cho, Seong-je;Han, Sangchul;Hwang, Young-sup
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1325-1333
    • /
    • 2016
  • Software classification has several applications such as copyright infringement detection, malware classification, and software automatic categorization in software repositories. It can be also employed by software filtering systems to prevent the transmission of illegal software. If illegal software is identified by measuring software similarity in software filtering systems, the average number of comparisons can be reduced by shrinking the search space. In this study, we focused on the classification of Windows executables using API call information and machine learning. We evaluated the classification performance of machine learning-based classifier according to the refinement method for API information and machine learning algorithm. The results showed that the classification success rate of SVM (Support Vector Machine) with PolyKernel was higher than other algorithms. Since the API call information can be extracted from binary executables and machine learning-based classifier can identify tampered executables, API call information and machine learning-based software classifiers are suitable for software filtering systems.

Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information (스마트그리드 네트워크에서 가용성 보장 메커니즘에 관한 연구: 신호정보를 이용한 공격 및 공격노드 검출)

  • Kim, Mihui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.279-286
    • /
    • 2013
  • The recent power shortages due to surge in demand for electricity highlights the importance of smart grid technologies for efficient use of power. The experimental content for vulnerability against availability of smart meter, an essential component in smart grid networks, has been reported. Designing availability protection mechanism to boost the realization possibilities of the secure smart grid is essential. In this paper, we propose a mechanism to detect the availability infringement attack for smart meter and also to find anomaly nodes through analyzing smart grid structure and traffic patterns. The proposed detection mechanism uses approximate entropy technique to decrease the detection load and increase the detection rate with few samples and utilizes the signal information(CIR or RSSI, etc.) that the anomaly node can not be changed to find the anomaly nodes. Finally simulation results of proposed method show that the detection performance and the feasibility.

Discussion on Sustaining "Olle" without Losing Integrity of Local Identity - Focused on downtown area called Mu-geun-sung at Jeju city - (올래의 지속가능한 재생방식에 관한 연구 - 제주시 무근성 지역을 중심으로 -)

  • Yi, Yong Kyu;Yi, Yun Kyu;Jing, Li-Yuan
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.20 no.3
    • /
    • pp.19-26
    • /
    • 2018
  • There are still a number of "olles" existing with traditional alley characteristics in the inner city of Jeju. As a matter of fact, the renovation of old buildings and the protection of alley space are facing a dilemma due to the existence of less than 4m-width-roads in the area of "Mu-geun-sung". This study examines the current status of alley space in "Mu-geun-sung" area; and puts forward to the potential possibility and limitation of alley space regeneration via exploring the applicable scheme of building agreement. In the field survey, a number of regions in inner city of Jeju witnesses the existing majority of invaluable, conventional olles. So as to grasp the feasibility in "Mu-geun-sung" area, we designs a simulating experiment to carry out the Building Agreement; and compares with the current development model in this area. Building Agreement implies to establish gradually a separation of land ownership under the existing unified development of landowners and users, thus to explore a variety of land exploitation systems by separating land ownership and right to use land. As a result, the deterioration of the street landscape results from the increase of building storey numbers. The damages to the surrounding environment brought by the newly built buildings will be minimized as well as keeping the maximum building volume rate. Obviously, these measures will alleviate infringement to the traditional residential sunlight and privacy space effectively, and reduce the pressure from high-rise buildings to the alley space, so that the landscape of the alley will enhance to form a more comfortable alley environment.