• Title/Summary/Keyword: Port-security

Search Result 312, Processing Time 0.022 seconds

TIS Toolkit을 이용한 방화벽 시스템 구축 방법

  • 김봉한;김점구;이명선;이용준;이재광
    • Review of KIISC
    • /
    • v.7 no.4
    • /
    • pp.13-28
    • /
    • 1997
  • 본 논문에서는 해커의 불법적인 공격으로부터 전산망을 안전하게 보호하기 위하여 Trusted Information System에서 발표한 공개 버전인 TIS Firewall Toolkit의 방화벽 시스템 구조와 구성요소를 분석하였고 그리고 구축방법에 대하여 기술하였다. 또한 툴킷에서 제공하는 관리 지원 도구인 Port scanner, network subnet ping manager, reporting도구 등을 분석하였다. 본 논문에서 기술한 TIS 툴킷을 이용한다면, 상용 방화벽 시스템을 구축하기 전에 , 보다 쉽게 기관의 보안 정책 개발과 전산망 보호 기술을 확보할 수 있다.

  • PDF

A Study on the Application of FLO-2D Model for Analysis of Debris Flow Damage Area (토석류 피해지역 분석을 위한 FLO-2D 모형의 적용에 관한 연구)

  • Jo, Hang-Il;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.37-44
    • /
    • 2022
  • As the frequency of torrential rains and typhoons increases due to climate change, the frequency of occurrence of debris flow is also increasing. In particular, in the case of Kangwon-do, the occurrence of damage caused by mountain disasters is increasing as it has a topographical characteristic where the mountains and the coast are in contact. In order to analyze the flow characteristics in the sedimentary part of the debris flow, input data were constructed through numerical maps and field data, and a two-dimensional model, FLO-2D, was simulated. The damaged area was divided into the inflow part of the debris flow, the village center, and the vicinity of the port, and the flow center and flow velocity of the debris flow were simulated and compared with field survey data. As a result, the maximum flow depth was found to be 2.4 m at the debris flow inlet, 2.7 m at the center of the village, and 1.4 m at the port adjacent to the port so the results were similar when compared to the field survey. And in the case of the maximum flow velocity, it was calculated as 3.6 m/s at the debris flow inlet, 4.9 m/s in the center of the village and 1.2 m/s in the vicinity of the port, so It was confirmed that the maximum flow center occurred in the section where the maximum flow rate appeared.

Design of OpenAPI for Application of Maritime Traffic Data (해상교통데이터 활용을 위한 OpenAPI 설계)

  • Kim, Juyoung;Lee, Byunggil;Chung, Byungho;Shin, Sang Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.522-524
    • /
    • 2016
  • E-Navigation is required port operation for effective and safety. Maritime traffic data must be exchanged between Vessel Traffic Service Center and ship for e-navigation build. In this paper, We designed Open API system for the exchange and use of maritime traffic data. This system provide Open API data to $3^{rd}$ party.

  • PDF

A Study on Packet Security of ATM Firewall Switch (ATM 방화벽 스위치 기반의 패킷 보안에 관한 연구)

  • 임청규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.100-106
    • /
    • 2003
  • This paper presents the design of a value-added ATM switch. The ATM switch ca perform CAC Processing and Firewall Processing Routine at packet-level (IP) at the ATM environment per port. The proposed two routine are integrated into the components of ATM switch. The Firewall switch employs a suggested two routine model to avoid or reduce the latency caused by filtering. Also, we suggest four classes are defined. namely, classes A, B, C, and D, which are orded from the safest to the most dangerous. The suggested model performance of ATM Firewall switch is estimated simulation in terms of the throught and latency by computer.

  • PDF

A Study on Security Issues Due to Foreign Function Interface in Rust (Rust 언어의 FFI로 인한 취약에 대한 연구)

  • Martin, Kayondo;Bang, In-Young;You, Jun-Seung;Seo, Ji-Won;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.151-154
    • /
    • 2021
  • Rust is a promising system programming language that made its debut in 2010. It was developed to address the security problems in C/C++. It features a property called ownership, on which it relies to mitigate memory attacks. For this and its many other features, the language has consistently gained popularity and many companies have begun to seriously consider it for production uses. However, Rust also supports safe and unsafe regions under which the foreign function interface (FFI), used to port to other languages, falls. In the unsafety region, Rust surrenders most of its safety features, allowing programmers to perform operations without check. In this study, we analyze the security issues that arise due to Rust's safety/unsafety property, especially those introduced by Rust FFI.

A Design of Maritime Information Network System Based on Mesh Network (Mesh Network 기반의 해상 정보 네트워크 시스템 설계)

  • Seo, Ki-Yeol;Oh, Se-Woong;Choi, Deuk-Jae;Park, Sang-Hyun;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.497-502
    • /
    • 2007
  • The important purposes of research in ship operation are to ensure safe navigation, high efficiency of transportation, high accuracy, and security. IMO, develops a broad strategy for incorporating the use of new technologies in a structured way to ensure that their use is compliant with the various electronic navigational and communication technologies and services that are already available. As a base research for E-Navigation, therefore, this paper proposes a maritime information network based on Mesh Network that is one of the maritime broadband solutions. Firstly, this paper analyzes an international port network system and the requirements of port network for E-Navigation. Finally, it designs the maritime information network system based on Mesh Network and shows its validity for E-Navigation.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

Design and Implementation of the Device Independent RFID Middleware Component for the Next Generation Port-Logistics (차세대 항만물류를 위한 장치 독립형 RFID 미들웨어 구성요소의 설계 및 구현)

  • Jang, Su-Wan;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.124-130
    • /
    • 2007
  • RFID technology is considered as a promising solution to increase efficiency of port logistics. Especially active RFID technology, such as e-Seal for container security, is receiving attention nowadays. If active RFID system is combined with passive RFID and legacy bar-code system overall efficiency of port logistics can be improved However, due to the device dependent control interface of RFID readers, there are many difficulties in making active-passive combined RFID system environment. In this paper, we introduce Smart Reader Interface (SRI) system, which provides a device independent RFID reader interrace to control different kinds of RFID readers by hiding device dependent control interface through adapter architecture which is similar to device driver of conventional operating systems. The key design objectives of SRI are the followings; conformance to the related standard. efficiency in processing, easy addition of an adapter for a new RFID reader. Actually, the implemented SRI system can support various kinds of commercial RFID readers, and through the test carried out not only in laboratory but also in the container terminal in the GwangYang Port, its practicality is verified.

A Study on Colors through Regeneration Design for Abandoned Factory Buildings - The Color of Buildings in the Port Area of Bongnae-dong, Yeongdo, Busan as an Example - (폐공장 건물 재생디자인에 대한 색채 관한 연구 - 부산 영도 봉래동 항만지역 건축물 색채를 중심으로 -)

  • Li, XinTong;Zhang, Ning;Cho, Joung-Hyung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.177-188
    • /
    • 2021
  • In South Korea, with the advancement of the 'Port' project, the regeneration industry adapted to the modern economic development has been promoted, leading to construction around the port was also redefined. Therefore, through regeneration, the problem of image construction of buildings around the port has been re-examined, in which color is an important content of image construction. In this study, the exterior walls of abandoned factory buildings in the port area of Bongnaedong, Pusan were selected as the color research object and evaluated according to the characteristics of the regenerated factory buildings combined with the building color function. Technically, KSCP color analysis system is used for color analysis. In this way, the color plan for the exterior walls of the factory buildings is proposed to visually enhance the image of abandoned factory buildings and attract more attention, thus driving the regional economic development. The results of this study show that in order to adapt to the regional, industrial and commercial characteristics of the regenerated port space, the color hue, lightness, chroma and use area of the building can be changed to enhance the aesthetic value and enhance the inductivity and security.

Design and Implementation of ARIA Cryptic Algorithm (ARIA 암호 알고리듬의 하드웨어 설계 및 구현)

  • Park Jinsub;Yun Yeonsang;Kim Young-Dae;Yang Sangwoon;Chang Taejoo;You Younggap
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.4 s.334
    • /
    • pp.29-36
    • /
    • 2005
  • This paper presents the first hardware design of ARIA that KSA(Korea Standards Association) decided as the block encryption standard at Dec. 2004. The ARIA cryptographic algorithm has an efficient involution SPN (Substitution Permutation Network) and is immune to known attacks. The proposed ARIA design based on 1 cycle/round include a dual port ROM to reduce a size of circuit md a high speed round key generator with barrel rotator. ARIA design proposed is implemented with Xilinx VirtexE-1600 FPGA. Throughput is 437 Mbps using 1,491 slices and 16 RAM blocks. To demonstrate the ARIA system operation, we developed a security system cyphering video data of communication though Internet. ARIA addresses applications with high-throughput like data storage and internet security protocol (IPSec and TLS) as well as IC cards.