• Title/Summary/Keyword: Port Security

Search Result 307, Processing Time 0.026 seconds

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

A Study on the Establishment of Specific Traffic Safety Areas at Pyeongtaek Port (평택항 교통안전특정해역 설정에 관한 연구)

  • Yoo, Sang-Lok;Kim, Deug-Bong;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.6
    • /
    • pp.660-670
    • /
    • 2016
  • This study expresses the necessity of recognizing Pyeongtaek Port as a specific traffic safety area to ensure the safety of the vessels that navigate there using quantitative data. The number of foggy days, pilotage distance, the number of large vessels and the number of fishing vessels that traveled between Pyeongtaek Port and 6 ports chosen as comparative study objects were compared and analyzed. The results showed that Pyeongtaek Port was more frequently affected by restricted visibility. With these perverse conditions, Pyeongtaek Port has a longer pilotage distance than Busan, Busan Newport, Ulsan or Pohang Ports by as much as 3.5-6 times. Especially from May to July, when fisheries were most functional, large vessels were required to navigate in an opposite direction to avoid 35 fishing vessels that were observed, creating an increased possibility for collisions among vessels. Therefore, the navigational safety of Pyeongtaek Port should be further secured by defining the approaching waters as specific traffic safety areas, giving large vessels legal priority over fishing vessels.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic (퍼지 로직을 이용한 느린 포트스캔 공격 탐지 및 대응 기법)

  • Kim, Jae-Kwang;Yoon, Kwang-Ho;Lee, Seung-Hoon;Jung, Je-Hee;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.679-684
    • /
    • 2008
  • The slow port scan attack detection is the one of the important topics in the network security. We suggest an abnormal traffic control framework to detect slow port scan attacks using fuzzy rules. The abnormal traffic control framework acts as an intrusion prevention system to suspicious network traffic. It manages traffic with a stepwise policy: first decreasing network bandwidth and then discarding traffic. In this paper, we show that our abnormal traffic control framework effectively detects slow port scan attacks traffic using fuzzy rules and a stepwise policy.

An Empirical Study on e-Logistics of Port & Logistics industry (항만물류산업의 e-Logistics 실증연구)

  • 조소희;허윤수;남기찬
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.365-370
    • /
    • 2004
  • At the present, e-commerce takes the place of existing transaction form in structure in the world trade by advancement of Information Technology and diffusion of Internet. There is no exceptions of this tendency even in industry of maritime and logistics. So, global shipping lines and logistics companies try to construct the e-Business network system for increasing their competitiveness in an are of cyber. However, in Korea, most of companies prefer "final handshake" as the traditional way of transaction to "e-commerce", because they bear a distrust in mind about the outflow of transaction information and security of settlement. So, number of companies using e-commerce is very small, and this situation causes the limited factor for activating the transaction structure of it. The rate of using e-commerce in logistics industry is lower than other industries, even more higher effectiveness is expected when they use it. Especially, it is very necessary not only e-commerce but also e-Logistics which can serve information of freight cost on cargo flow, operation cost and schedule, and tracing information of cargo. Increasing the necessity of e-Logistics, this study research the rate rf using e-Logistics focused on maritime and logistics companies, and analyze the transaction form among members of these industries for improving them. In detail, this paper examine the drivers for activating e-Logistics, and present the effective factors for a successful development of these industries.

  • PDF

Organizational Change Readiness, Service Innovation, and Corporate Image in Improving Competitiveness: A Case Study in Indonesia

  • HUTAPEA, John Gunung;NIMRAN, Umar;IQBAL, Mohammad;HIDAYAT, Kadarisman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.683-693
    • /
    • 2021
  • Shipping has become an important sector in supporting social, economic, government, defense, security, cultural and other sectors to unite separate islands and broad seas. Thus, ports automatically become an important facility in Indonesia. The purpose of this research is to test and explain the effect of Organizational readiness for change, Service Innovation, and Corporate Image on Perceived opportunity and challenge. The research model with inferential analysis uses Structural Equation Modeling (SEM) analysis with the WarpPLS approach, expected to answer the statements of problem and be able to test the desired hypothesis. The model development in this research was based on the background, statements of problem, conceptual framework and research hypotheses. The model referred to is "Complete and Comprehensive Port." Its development was carried out through studying and synthesizing various sources. The most important source is the results of literature review in the form of theoretical developments and research results, then continued with compilation. The use of Organizational Change Readiness, Service Innovation, and Corporate Image in improving Port Competitiveness is seen as one of the novelties of this research, specifically the use of the Organizational Change Readiness variable which is often used in high-flexibility companies but now used in port companies as well.

A Study on the Derivation of Port Safety Risk Factors Using by Topic Modeling (토픽모델링을 활용한 항만안전 위험요인 도출에 관한 연구)

  • Lee Jeong-Min;Kim Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.59-76
    • /
    • 2023
  • In this study, we tried to find out port safety from various perspectives through news data that can be easily accessed by the general public and domestic academic journal data that reflects the insights of port researchers. Non-negative Matrix Factorization(NMF) based topic modeling was conducted using Python to derive the main topics for each data, and then semantic analysis was conducted for each topic. The news data mainly derived natural and environmental factors among port safety risk factors, and the academic journal data derived security factors, mechanical factors, human factors, environmental factors, and natural factors. Through this, the need for strategies to strengthen the safety of domestic ports, such as strengthening the resilience of port safety, improve safety awareness to broaden the public's view of port safety, and conduct research to develop the port industry environment into a safe and specialized mature port. As a result, this study identified the main factors to be improved and provided basic data to develop into a mature port with a port safety culture.

An Integrated Approach for Korea's e-Navigation Development Project to Playing the Global Lead in Maritime Safety Logistics of IMO's Next Generation (한국의 이네비게이션개발사업이 IMO차세대 해사안전보안물류상 세계 주역을 맡기 위한 통합적 접근)

  • Gim, Jin-Goo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.58-58
    • /
    • 2016
  • This study aims to enhance Korea's competitiveness by taking the lead in the international standardization and relevant global market. This is to be achieved by performing the role of First Mover through the resolute investment from Fast Follower that is servile to the decision of the organization in the e-Navigation strategy that has been promoted by the IMO. The study methodology is an integrated approach. It is established by modelling LSCM G2B2C2 Platform in maritime safety/security logistics and applied to the enhancement of maritime safety/security in global LSCM. This paper externally contributes to the reduction of world maritime accidents and exalt the national prestige; internally, the enhancement of the national competitiveness through the improvement of shipping port logistics and others. These eventually contribute to Korea's economic development that is combined by both theory and practice and of practical use of the integrated approach.

  • PDF

Composing Recommended Route through Machine Learning of Navigational Data (항적 데이터 학습을 통한 추천 항로 구성에 관한 연구)

  • Kim, Joo-Sung;Jeong, Jung Sik;Lee, Seong-Yong;Lee, Eun-seok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.285-286
    • /
    • 2016
  • We aim to propose the prediction modeling method of ship's position with extracting ship's trajectory model through pattern recognition based on the data that are being collected in VTS centers at real time. Support Vector Machine algorithm was used for data modeling. The optimal parameters are calculated with k-fold cross validation and grid search. We expect that the proposed modeling method could support VTS operators' decision making in case of complex encountering traffic situations.

  • PDF

An Analysis on Structure of Risk Factor for Maritime Terror using FSM and AHP (해상테러 위험요소의 구조와 우선순위 분석)

  • Jang Woon-Jae;Yang Won-Jae;Keum Jong-Soo
    • Journal of Navigation and Port Research
    • /
    • v.29 no.6 s.102
    • /
    • pp.487-493
    • /
    • 2005
  • Since the destruction of World Trade Center the attention of the United States and the wider international community has focussed upon the need to strengthen security and prevent terrorism This paper suggests an analysis prior to risk factor and structure for anti-terrorism in the korean maritime society. For this, in this paper, maritime terror risk factor was extracted by type and case of terror using brainstorming method. Also, risk factor is structured by FSM method and analyzed for ranking of each risk factor by AHP. At the result, the evaluation of risk factor is especially over maximum factor for related external impact.