• Title/Summary/Keyword: Security Agents

Search Result 212, Processing Time 0.032 seconds

A Proxy-based Resource Security Management for Home Networking Using Mobile Agents (이동에이전트를 이용한 홈네트워킹을 위한 프록시 기반 자원 보안 관리)

  • Oh, Ae-Kyung;Bang, Dae-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.275-278
    • /
    • 2001
  • 컴퓨터 이용이 일반화되어 가면서 가정내에 인터넷을 이용한 수 있는 PC뿐만 아니라 다양한 정보기기들과 정보가전기기들이 등장하였다. 홈네트워크는 가정내에 홈서버를 중심으로 정보기기들과 정보가 전기기들로 이루어진 네트워크를 말한다. 본 논문에서는 홈네트워크에서의 효율적인 작업 수행과 홈네트워크 관리를 위해서 이동에이전트를 사용하는 홈네트워킹과 그에 따른 홈서버와 정보기기들의 구조를 제안하고, 홈네트워크에서 에이전트가 요청하는 에이전트 서버의 서비스나 홈네트워크 내의 자원을 공격적인 에이전트로부터 안전하게 보호하고 관리하기 위한 프록시 기반의 자원관리 메커니즘을 제안한다.

  • PDF

Design of a Security-Vulnerability Diagnosing and Monitoring System using Mobile Agents (이동 에이전트를 사용한 보안 취약점 진단 및 모니터링 시스템의 설계)

  • 김영균;오길호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.739-741
    • /
    • 2001
  • 네트워크 기술의 보편화로 인하여 분산 네트워크 환경에서의 호스트들은 보안 사고의 위험에 항상 노출 되어 있다. 기존의 보안 기술들은 관리자가 보안을 필요로 하는 호스트에 대해 보안 취약점을 찾아서 이에 대해 조치를 취하는 것이 일반적인 방법이다. 이러한 방법들의 문제점은 새로운 보안 사고 유형에 대해 실시간으로 대처할 수 없을 뿐만 아니라, 관리자의 능력 범위 밖에 있는 호스트들은 항상 무방비 상태로 놓여 있는 문제점들이 있다. 본 논문에서는 이동 에이전트 시스템을 사용하여 각 호스트에 특정 보안 유형에 대해 진단 기능을 갖는 이동 에이전트를 파견하고 보안 취약점을 검사한 후 이를 관리자에게 보고 하는 자동화된 보안 취약점의 진단 및 모니터링 시스템에 대해 연구하였다.

  • PDF

A Study on Business Information Security using Mobile Agents (모바일에이전트를 활용한 기업정보 보안에 관한 연구)

  • Jo, Sang-Hyun;Lee, Hee-Jo;Park, Hyun-Do
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.754-757
    • /
    • 2010
  • 최근 모바일 시스템은 고성능 단말기의 보급과 발달한 인터넷 환경으로 인하여 점점 방대해지고 복잡해지고 있으며, 특히 많은 회사들이 기업경쟁력 향상의 극대화,고객 서비스 만족 극대화 등의 이슈로 무선인터넷망을 활용한 다양한 데이타를 필요로 하는 모바일시스템을 빠르게 도입하고 있다. 본 논문에서는 다양한 데이타를 활용함에 있어 불가피하게 기업시스템에 접근해야 함에 있어 기업 IP 정보등 사용자 정보가 노출되는 문제점을 분석하여 모바일 에이전트를 활용하여 이것을 해결할 하나의 모델을 제시함으로써 편리하고 안정적인 응용을 보이고자 한다.

Danger Alert Surveillance Camera Service using AI Image Recognition technology (인공지능 이미지 인식 기술을 활용한 위험 알림 CCTV 서비스)

  • Lee, Ha-Rin;Kim, Yoo-Jin;Lee, Min-Ah;Moon, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.814-817
    • /
    • 2020
  • The number of single-person households is increasing every year, and there are also high concerns about the crime and safety of single-person households. In particular, crimes targeting women are increasing. Although home surveillance camera applications, which are mostly used by single-person households, only provide intrusion detection functions, this service utilizes AI image recognition technologies such as face recognition and object detection to provide theft, violence, stranger and intrusion detection. Users can receive security-related notifications, relieve their anxiety, and prevent crimes through this service.

Development of Success Attribution Scale for Body Guard in Korea (한국 경호원의 성공귀인 측정도구 개발)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.173-183
    • /
    • 2017
  • This study is for presenting the factors about success attribution that fit the korean security service conditions and developing the actual analysis of measurement tools by investigating the success factors of the security service agents. To this end, conducted a meeting from the fully open questionnaire at first, and then formed the semi-structured questionnaire, finally carried out the survey from the closed questionnaire and analyzed data from SPSS 21.0, AMOS 21.0 and developed the measurements. It was conducted from December, 2014 to June, 2015. This survey was conducted of 170 security guards after the verification of the content validity though the pilot survey and presented the success attribution factors and standards on the basis of the result form this survey. At the first and second analysis process, the success attribution factors of the guards consisted of inner qualities, external qualities, induction factors for inner qualities, and induction factor for external qualities. On analysis of the final data and documents, however, at the third analysis, the success attribution factors of the guards consisted of 'martial arts and physical ability'(4 questions), 'attitudes to work'(3 questions), 'support for the working environment'(3 questions), 'organized business skills'(3 questions), 'attitudes to the duty'(3 questions), and 'coping with crises(2 questions).

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

Action Plan of Security Service against a Fire case in a Tall Building Event (경호행사시 초고층건물 화재 대응방안)

  • Son, Kyung-Hwan
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.37-61
    • /
    • 2014
  • Nowadays the world is threatened because of terrors that take aim at Soft-Targets available and easy to access to the people rather than more secured Hard-Targets. The inspection department of the Presidential Security Service develops and acts a perfect safety plan wherever the President stays so that it is possible to get immediate actions for various contingencies. Some events, in which the President take part, could be held in a lower or higher store in a tall building. Additional to the routine work at this case it is to emphasize on a plan of fire precaution to check the spot and respond to a real fire situation, so that the damage could be minimized. First, the agents of the President Security Service should possess basic knowledge concerning to the fire accidents and be trained on their manuals, even in a busy events plan. An organization, whatever it is, could be improved in that it tries to develop not only the personal abilities, but also education programs of the organization continually. And enhanced abilities of the members lead to the driving force for the advance. The knowledge of fire accident should be able to adapt to the real situation. Second, related to the event, it should be cooperated with the relevant departments, so that it is possible to conduct and control the system. It is urgently required to know that the security event could not be done perfectly with only one part or department. Third, from the time of recognizing of the event it is necessary for the fire department to get an action plan with fire fighting measures, evacuation measures based of the instructions given by the Security Service. Fourth, on the knowledge of the action plan of the fire department the Security Service should inspect the safety activities of the spot and establish the practical operation plan through the fire fighting and evacuation plan. Fifth, the Security Service should share final informations and plan of fire fighting in a high-rise building with the other relevant departments. If not, it could cause a great confusion that could lead to a great damage.

  • PDF

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

Reliable Cascaded Delegation Scheme for Mobile Agent Environments (이동 에이전트 환경을 위한 안전한 연속 위임 구현 기법)

  • Lee, Hyun-Suk;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.31-38
    • /
    • 2004
  • In mobile agent environments, migration of an agent occurs continuously due to the mobility of agents. So cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by creator of the agent within the signed part of the next immediate delegation token. And we prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.

Implementation of Smart Video Surveillance System Based on Safety Map (안전지도와 연계한 지능형 영상보안 시스템 구현)

  • Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.169-174
    • /
    • 2018
  • There are many CCTV cameras connected to the video surveillance and monitoring center for the safety of citizens, and it is difficult for a few monitoring agents to monitor many channels of videos. In this paper, we propose an intelligent video surveillance system utilizing a safety map to efficiently monitor many channels of CCTV camera videos. The safety map establishes the frequency of crime occurrence as a database, expresses the degree of crime risk and makes it possible for agents of the video surveillance center to pay attention when a woman enters the crime risk area. The proposed gender classification method is processed in the order of pedestrian detection, tracking and classification with deep training. The pedestrian detection and tracking uses Adaboost algorithm and probabilistic data association filter, respectively. In order to classify the gender of the pedestrian, relatively simple AlexNet is applied to determine gender. Experimental results show that the proposed gender classification method is more effective than the conventional algorithm. In addition, the results of implementation of intelligent video security system combined with safety map are introduced.