• Title/Summary/Keyword: SW보안

Search Result 114, Processing Time 0.027 seconds

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Development Testing/Evaluating Method about Residual Data Protection Technology based on the MFP (디지털 복합기의 잔여정보 완전삭제 기능 시험/평가방법론 개발)

  • Kim, Chan-Il;Lee, Kwang-Woo;Cho, Young-Jun;Kim, Dong-Keun;Sim, Wan-Tae;Kim, Seung-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1449-1452
    • /
    • 2009
  • 현재 기업 및 공공기관에서는 산업기술 유출 방지를 위해 잔여데이터 완전삭제 등 보안기능이 구현된 디지털 복합기를 사용하고 있다. 이에 따라 국제적으로 특히 일본 평가기관들 중심으로 공통평가기준으로 평가 인증 많이 받고 있다. 그러나 국내에서는 MFP에 대한 인식과 평가 노하우(know-how)의 부족하여 평가 인증 방법에 미비한 상태이다, 본 논문에서는 MFP의 핵심 중요 기술인 잔여정보 완전삭제 기능을 공통평가기준으로 평가할 수 있는 국내 시험/평가 방법론을 제시하고자 한다.

A Study on the IoT Network Traffic Shaping Scheme (IoT 네트워크의 트래픽 쉐이핑 기법 연구)

  • Changwon Choi
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.75-81
    • /
    • 2023
  • This study propose the traffic shaping scheme on IoT Network. The proposed scheme can be operated on the gateway which called sink node and control the IoT traffic with considering the traffic type(real-time based or non real-time based). It is proved that the proposed scheme shows a efficient and compatible result by the numerical analysis and the simulation on the proposed model. And the efficient of the proposed scheme by the numerical analysis has a approximate result of the simulation.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Paleostress Measurements from Calcite Twin in the Jeongseon Limestone of the Joseon Supergroup (조선 누층군 정선 석회암내의 방해석 쌍정에 나타난 고응력장 연구)

  • 장보안;강성승
    • The Journal of Engineering Geology
    • /
    • v.8 no.1
    • /
    • pp.75-86
    • /
    • 1998
  • Eighteen oriented samples from the Jeongsun limestone of the Joseon Supergroup are collected. The orientations of C-axis of calcite and e twin plane, the average thickness, numbers of twins and the widths of calcite grains in 10 samples are measured. Then, the twin strain, mean width, intensity of twin and relative magnitude and orientations of principal stresses are calculated using Calcite Strain Gauge program. Twin strain, mean width and intensitv rainge between 0.801%~10.927%, $0.43{\mu\textrm{m}}~2.03{\mu\textrm{m}}$, and 33.5~113.4twim/mm, respectively. Metamorphic temperatures calculated from twin show below $70^{\circ}C$, indicating that twins were developed within 2.3km depth. In five samples, two events with different orientations of principal stress produced calcite twins, while only one event produced calcite twins in five samples. The direction of the maximum stress is almost horizontal and the minimum is almost vertical, indicating that the stress regirne is identical with thrust fault. E-W and NW-SE are the most dominant directions of comressive stress and N-S and NE-SW directions are also shown. Comparision between paleostress orientations measured in the study and others indicates that the maximum horizontal stress oriented to E-W may represent the paleostress of period either from the Silurian to the Triassic or from the Silulian to the Permian. Paleostress oriented to NW-SE may be the major direction of stress during the Daeho orogeny.

  • PDF

SW Quality of Convergence Product: Characteristics, Improvement Strategies and Alternatives (융합 소프트웨어 품질의 특성, 개선 전략과 대안)

  • Min, Sang-Yoon;Park, Seung-Hoon;Lee, Nam-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.19-28
    • /
    • 2011
  • In today and near future, most of the commercially manufactured IT products will be evolved into software convergence product. Recently, the embedded software products is called as 'Software Convergence Products.' This phenomenon does not simply show the trendy fashion, but has the seriously implication that the functionalities of IT product is accomplished and evolved via software technology, not via mechanical nor electrical means. It will become true that the quality of the convergence product is dominantly governed by the software it uses. Meanwhile, we are facing with the threatening fact that software defects in the mass products will requires tremendous amounts of cost proportional to the quantity of the product. We can remind ourselves of the disasters that have been already happened, such as Automotive recalls, Smart-phone recalls, and others. In software engineering, there have been large amount of work done in software quality improvement for the past couple of decades. Software process improvement, and testings are the representative ones. But we are facing with limitations of those traditional approaches in current convergence industry; exponentially increasing software sizes and rapid changes in software technology. In this paper, we analyze the characteristics of the software convergence industry, the limitations of the traditional Software quality improvement approaches. We suggest a new approaches in software quality improvement in different angles of thought and philosophy.

  • PDF

An Efficient ECU Analysis Technology through Non-Random CAN Fuzzing (Non-Random CAN Fuzzing을 통한 효율적인 ECU 분석 기술)

  • Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;Jo, Hyo Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1115-1130
    • /
    • 2020
  • Modern vehicles are equipped with a number of ECUs(Electronic Control Units), and ECUs can control vehicles efficiently by communicating each other through CAN(Controller Area Network). However, CAN bus is known to be vulnerable to cyber attacks because of the lack of message authentication and message encryption, and access control. To find these security issues related to vehicle hacking, CAN Fuzzing methods, that analyze the vulnerabilities of ECUs, have been studied. In the existing CAN Fuzzing methods, fuzzing inputs are randomly generated without considering the structure of CAN messages transmitted by ECUs, which results in the non-negligible fuzzing time. In addition, the existing fuzzing solutions have limitations in how to monitor fuzzing results. To deal with the limitations of CAN Fuzzing, in this paper, we propose a Non-Random CAN Fuzzing, which consider the structure of CAN messages and systematically generates fuzzing input values that can cause malfunctions to ECUs. The proposed Non-Random CAN Fuzzing takes less time than the existing CAN Fuzzing solutions, so it can quickly find CAN messages related to malfunctions of ECUs that could be originated from SW implementation errors or CAN DBC(Database CAN) design errors. We evaluated the performance of Non-Random CAN Fuzzing by conducting an experiment in a real vehicle, and proved that the proposed method can find CAN messages related to malfunctions faster than the existing fuzzing solutions.