• Title/Summary/Keyword: Intruder

Search Result 159, Processing Time 0.025 seconds

Design of Intrusion Detection and Audit Trail System using Network Events (전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계)

  • Kim, Ki-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2342-2353
    • /
    • 1997
  • According to the outstanding development of information industry, a study of firewall is progressing as one of methods to cope with threat and loss of the data through computer network. For the secure network, this paper proposes the method diminishing threat and loss of the network using the correlation firewall with network audit trail system. Also, this paper suggests not only the audit analyzer execution model but also the type of databases used in audit analyzer to analyze the audit data. Network audit trail system has the function of identifing and analyzing of all intruder actions using audit records created by users.

  • PDF

Design and Implementation of an Advanced Cattle Shed Management System using a Infrared Wireless Sensor nodes and Surveillance Camera (적외선 무선 센서 노드 및 무인감시카메라를 이용한 선진화된 축사 관리 시스템의 설계 및 구현)

  • Yoon, Min;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.22-34
    • /
    • 2012
  • In this paper, we design and implement an advanced cattle shed management system using a infrared wireless sensor nodes and surveillance camera. Our system provides three main capabilities, such as 24-hours cattle shed monitoring, trespassing detection, automatic control of cattle shed. For this, our system can monitor cattle shed as well as the condition of cows/bulls for 24 hours per day by using surveillance cameras. Our system also can detect intruders inside the cattle shed by using infrared wireless sensor nodes. In addition, our system can control the power of electric equipments in the cattle shed by using a power controller. Finally, we combine the three components into a system by using a smartphone application program and verify the effectiveness of our system by a testbed.

Coherent fiber-optic intrusion sensor for long perimeters monitoring

  • Choi Kyoo Nam
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.876-879
    • /
    • 2004
  • The buried fiber optic cable as a distributed intrusion sensor for detecting and locating intruders along the long perimeters is proposed. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer. Light pulses from a Er:fiber cw laser with a narrow, <3kHz-range, spectral width and a frequency drift of < 1 MHz/min are injected into one end of the fiber, and the backscattered light from the fiber is monitored with a photodetector. Results of preliminary studies, measurement of phase changes produced by pressure and seismic disturbances in buried fiber optic cables and simulation of ${\varphi}-OTDR$ response over long fiber paths, to establish the feasibility of the concept are described. The field experiments indicate adequate phase changes, more than 1t-rad, are produced by intruders on foot and vehicle for burial depths in the 0.2 m to 1 m range in sand, clay and fine gravel soils. The simulations predict a range of 10 km with 35 m range resolution and 30 km with 90 m range resolution. This technology could in a cost-effective manner provide enhanced perimeter security.

  • PDF

PCA-Base Real-Time Face Detection and Tracking

  • Jung, Do-Joon;Lee, Chang-Woo;Lee, Yeon-Chul;Bak, Sang-Yong;Kim, Jong-Bae;Hyun Kang;Kim, Hang-Joon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.615-618
    • /
    • 2002
  • This paper proposes a real-time face detection and tracking a method in complex backgrounds. The proposed method is based on the principal component analysis (PCA) technique. For the detection of a face, first, we use a skin color model and motion information. And then using the PCA technique the detected regions are verified to determine which region is indeed the face. The tracking of a face is based on the Euclidian distance in eigenspace between the previously tracked face and the newly detected faces. Camera control for the face tracking is done in such a way that the detected face region is kept on the center of the screen by controlling the pan/tilt platform. The proposed method is extensible to other systems such as teleconferencing system, intruder inspection system, and so on.

  • PDF

The development of intrusion sensor using the variations of speckle patterns (스페클 패턴을 이용한 침입자 센서의 개발)

  • 엄년식;김요희;양승국;오상기;박재희;강신원
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.119-122
    • /
    • 2000
  • The speckle pattern is formed by laser light from a multimode optical fiber. The speckle fluctuation is the result of interference among propagation modes when the optical fiber is subjected to a mechanical distortion at any point along its length. The experiments were carried on for the study of the feasibility of producing an intrusion detection system using the speckle fluctuation. The speckle fluctuation signals were monitored at real time by an oscilloscope which was connected with an amplifier and a filter. The experiment results showed that the intrusion sensor had enough sensitivity to detect an intruder.

  • PDF

Formal Specification and Verification for S/KEY Against Dictionary Attack (사전공격 방지를 위한 S/KEY의 정형 명세 및 검증)

  • Kim Il-Gon;Choi Jin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1218-1225
    • /
    • 2004
  • S/KEY system was proposed to guard against intruder's password replay attack. But S/KEY system has vulnerability that if an attacker derive passphrase from his dictionary file, he can acquire one-time password required for user authentication. In this paper, we propose a correct S/KEY system mixed with EKE to solve the problem. Also, we specify a new S/KEY system with Casper and CSP, verify its secrecy and authentication requirements using FDR model checking tool.

A Study on Performance analysis of protocol in VPN (가상 사설망에서 프로토롤의 성능분석에 관한 연구)

  • 김도문;전문석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.625-632
    • /
    • 2003
  • We are view of the information on VPN(Virtual private Network) into each difference layer protocol. network on mutuality exchanged of information is importance of the confidentiality and Integrity. But it is presented problems about compatability and availability between variable equipment as several protocol. hence, it was achieved of the transmission through encryption and authentication of information, although there is secured an intended attack from the third intruder. so tunneling VPN system on achieving, each layer position transmit of mutuality exchanged. This study will investigate the codification and certified security status when layer2 and layer 3 informations are each transmitted using protocol with integrity Public Key. In addition, we will using protocol and the performance analysis difference between layers and layers.

  • PDF

Smart Vision Sensor for Satellite Video Surveillance Sensor Network (위성 영상감시 센서망을 위한 스마트 비젼 센서)

  • Kim, Won-Ho;Im, Jae-Yoo
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.70-74
    • /
    • 2015
  • In this paper, satellite communication based video surveillance system that consisted of ultra-small aperture terminals with small-size smart vision sensor is proposed. The events such as forest fire, smoke, intruder movement are detected automatically in field and false alarms are minimized by using intelligent and high-reliable video analysis algorithms. The smart vision sensor is necessary to achieve high-confidence, high hardware endurance, seamless communication and easy maintenance requirements. To satisfy these requirements, real-time digital signal processor, camera module and satellite transceiver are integrated as a smart vision sensor-based ultra-small aperture terminal. Also, high-performance video analysis and image coding algorithms are embedded. The video analysis functions and performances were verified and confirmed practicality through computer simulation and vision sensor prototype test.

A New Intruder Traceback Mechanism based on System Process Structure (시스템 프로세스 구조에 기반을 둔 침입자 추적 메커니즘)

  • 강형우;김강산;홍순좌
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.233-239
    • /
    • 2004
  • In this paper, we describe a defense mechanism to cope with stepping stones attacks in high-speed networks. (Stepping stones Attacker launches attacks not from their own computer but from intermediary hosts that they previously compromised.) We aim at tracing origin hacker system, which attack target system via stepping stones. There are two kind of traceback technology ; IP packet traceback, or connection traceback. We are concerned with connection traceback in this paper. We propose a new host-based traceback. The purpose of this paper is that distinguish between origin hacker system and stepping stones by using process structure of OS(Operating System).

  • PDF

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF