• 제목/요약/키워드: Next Generation Cyber Security

검색결과 29건 처리시간 0.029초

통합 사이버 보안 상황분석을 통한 관제 상황인지 기술 (Context cognition technology through integrated cyber security context analysis)

  • 남승수;서창호;이주영;김종현;김익균
    • 스마트미디어저널
    • /
    • 제4권4호
    • /
    • pp.80-85
    • /
    • 2015
  • 인터넷을 이용하는 응용의 수가 급격히 증가함에 따라 인터넷 상에서 이루어지는 사이버 공격의 발생 빈도는 점점 증가하고 있다. 전 세계적으로 L3 DDoS 공격 탐지 중비의 장비에서 응용계층 기반의 지능형 DDoS 공격에 대한 탐지가 미비하다. 차세대 네트워크 보안솔루션의 다양한 요구사항을 충족할 수 있는 고성능 유무선 네트워크 위협대응 기술에 있어서 국내제품은 외국제품에 비해 기능면에서는 근접하나 성능은 미비한 상황에 있으며, 악성코드 탐지 및 시그니쳐 생성연구 관련하여 주로 Window OS에서 동작하는 악성코드 탐지 및 분석 연구 중심으로 진행하고 있다. 본 논문에서는 최신 사이버 보안 상황 침해공격 분석을 통한 최신 다양한 신종 공격 기법 및 분석 기술의 현황 조사, 분석등을 기술한다.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

스마트 그리드 개인정보 보안이슈 방안 제시 (Proposed measure for Smart Grid's Personal Information Security Issue)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략 (Security Problems in Aircraft Digital Network System and Cybersecurity Strategies)

  • 임인규;강자영
    • 한국항행학회논문지
    • /
    • 제21권6호
    • /
    • pp.633-637
    • /
    • 2017
  • 항공기와 항공 네트워크에 대한 사이버 공격은 일반적으로 지상 산업에서 흔히 볼 수 있는 사이버 공격과 크게 다르지 않다. 항공 교통 인프라스트럭처(infrastructure)는 항공 교통 자원 확보를 위해 디지털 기반 구조로 전환되고 있다. 다양한 종류의 통신 환경과 정보 통신, 항법, 감시 및 기내 엔터테인먼트 시스템이 사이버 테러 위협에 노출될 위험을 가중시키고 있다. 또한 무인항공기의 출현은 사이버 테러에 의해 통제될 수 없는 위험을 내포하고 있다. 차세대 데이터 네트워크 시스템 환경에서 항공기 시스템 및 항공 기반의 인프라스트럭처에 대한 사이버 위협의 취약점을 인식하고 항공 선진국의 사이버 보안 표준과 대응 전략을 분석했다. 그리고 국내 항공 환경에서 고려해야 할 사이버 보안 정책에 대한 포괄적인 방안을 논의하고, 보안 환경에 대한 개념과 신속한 대응 전략 수립 등을 논의하였다.

Design and Implementation of a Wearable LED Display Device

  • Shin, Seung-Hyeok
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권10호
    • /
    • pp.7-13
    • /
    • 2015
  • Wearable device, next generation smart device, is consistently growing. The flexible display will be a kind of display in the wearable device. The flexible display technology is now evolving with end-user requirement such as portability and easy installation. Previous wearable display products still have some difficulties in manufacturing and in flexibility whole device. But it can be a flexible display with LED device and utilized in commercial area. In this paper, we propose a driver to control the LED display and implement a flexible LED display system.

사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석 (Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

제로트러스트 보안 모델에서 보안관제 시스템 강화 연구 (Enhancement of Security Monitoring & Control System in Zero Trust Security Models)

  • 박원형
    • 융합보안논문지
    • /
    • 제22권2호
    • /
    • pp.51-57
    • /
    • 2022
  • 최근 제로 트러스트에 대한 개념이 도입되며 차세대 보안관제 시스템에 필요한 보안 요소 강화가 필요하다. 또한, 4차 산업혁명 시대의 보안 패러다임도 바뀌고 있다. 클라우드 컴퓨팅과 코로나 19로 인해 업무 환경이 변화되면서 발생하는 사이버보안 문제는 지속 발생하고 있다. 그리고 이와 동시에 새로운 사이버 공격기법들도 지능화 고도화되고 있는 상황에서 보안을 강화할 미래의 보안관제 시스템이 필요하다. 제로 트러스트 보안 개념은 모든 것을 의심하며 신뢰하지 않는다는 개념을 기반으로 모든 통신을 감시하고 접근 요청자에 대한 엄격한 인증과 최소한의 접근 권한을 핵심으로 보안성을 높인다. 본 논문에서는 기존 보안관제 시스템의 문제점을 이해하고 이를 해결할 수 있는 제로 트러스트 보안 모델을 통해 보안관제 분야의 보안 강화 방안을 제안 한다.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권10호
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.