• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.025 seconds

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

A Study on Zone-based Intrusion Detection in Wireless Network Environments (무선 네트워크 환경에서 영역기반 침입탐지 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • It is impossible to apply the routing protocol in the wired environment because MANET consists of only mobile nodes. Therefore, routing protocols considered these characteristics are required. In particular, if malicious nodes are not excluded in the routing phase, network performance will be greatly reduced. In this paper, we propose intrusion detection technique based on region to improve routing performance. In the proposed technique, the whole network is divided into certain areas, and then attack detection within the area using area management node is performed. It is a proposed method that can detect attack nodes in the path through cooperation with each other by using completion message received from member nodes. It also applied a method that all nodes participating in the network can share the attack node information by storing the detected attack node and sharing. The performance evaluation of the proposed technique was compared with the existing security routing techniques through the experiments and the superior performance of the proposed technique was confirmed.

Big Data Analytic System based on Public Data (공공 데이터 기반 빅데이터 분석 시스템)

  • Noh, Hyun-Kyung;Park, Seong-Yeon;Hwang, Seung-Yeon;Shin, Dong-Jin;Lee, Yong-Soo;Kim, Jeong-Joon;Park, Kyung-won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.195-205
    • /
    • 2020
  • Recently, after the 4th industrial revolution era has arrived, technological advances started to develop and these changes have led to widespread use of data. Big data is often used for the safety of citizens, including the administration, safety and security of the country. In order to enhance the efficiency of maintaining such security, it is necessary to understand the installation status of CCTVs. By comparing the installation rate of CCTVs and crime rate in the area, we should analyze and improve the status of CCTV installation status, and crime rate in each area in order to increase the efficiency of security. Therefore, in this paper, big data analytic system based on public data is developed to collect data related to crime rate such as CCTV, female population, entertainment center, etc. and to reduce crime rate through efficient management and installation of CCTV.

Design of Area-efficient Feature Extractor for Security Surveillance Radar Systems (보안 감시용 레이다 시스템을 위한 면적-효율적인 특징점 추출기 설계)

  • Choi, Yeongung;Lim, Jaehyung;Kim, Geonwoo;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.200-207
    • /
    • 2020
  • In this paper, an area-efficient feature extractor was proposed for security surveillance radar systems and FPGA-based implementation results were presented. In order to reduce the memory requirements, features extracted from Doppler profile for FFT window-size are used, while those extracted from total spectrogram for frame-size are excluded. The proposed feature extractor was design using Verilog-HDL and implemented with Xilinx Zynq-7000 FPGA device. Implementation results show that the proposed design can reduce the logic slice and memory requirements by 58.3% and 98.3%, respectively, compared with the existing research. In addition, security surveillance radar system with the proposed feature extractor was implemented and experiments to classify car, bicycle, human and kickboard were performed. It is confirmed from these experiments that the accuracy of classification is 93.4%.

A Study on the Realities and Job Satisfaction of Hotel Cuisine Employees (대구지역 관광호텔 조리종사원 실태와 직무만족에 관한 연구)

  • 김미향
    • Korean journal of food and cookery science
    • /
    • v.12 no.2
    • /
    • pp.138-145
    • /
    • 1996
  • This study is. aimed to investigate the realities and the job satisfaction of hotel cuisine employees to be occupied with the special grade of tourist hotel in Daegu. As the factors of job satisfaction for the cooks, the 5 items such as social reputation, job itself, human relationship with co-workers, the chance of promotion, and the stability of company and benefits were selected. And 21 subitems of them were also chosen. The 154 persons of all were examined in this study. For the establishment of the factors in the area of job satisfaction, the methods of Cronbach's ${\alpha}$ analysis and factor analysis were carried out. The propensities of employees and the differences of job satisfaction were examined by using x$^2$-test method and one-way ANOVA respectively. 1. In the area of males professional cooks were 89% with respect to age, 51.9% were found to be under 25 years of age which constituted the largest age group. 96% of the cooks had graduated a high school or had a higher education Those who had four or more years of cooking experience were 46.8% which constituted the largest group, while about 30% had less than one year experience. Approximately 50% of the cooks earned an average of less than W700,000 per month. Among these cooks most worked for western type food establishments. Even with their higher education, we found that their work term is short and their income, low.2. In the research on job satisfaction, the survey result found was in the order of: social security, the work itself, human relationships with their fellow cooks, the chances of promotion, and job security and benefits with index-values of 4.59, 3.98, 3.18, 2.94 and 2.52 respectively.

  • PDF

Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme (하드웨어 공유와 캐리 보존 덧셈을 이용한 MDS 해쉬 프로세서의 설계)

  • 최병윤;박영수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.139-149
    • /
    • 2003
  • In this paper a hardware design of area-efficient hash processor which implements MD5 algorithm using hardware sharing and carry-save addition schemes is described. To reduce area, the processor adopts hardware sharing scheme in which 1 step operation is divided into 2 substeps and then each substep is executed using the same hardware. Also to increase clock frequency, three serial additions of substep operation are transformed into two carry-save additions and one carry propagation addition. The MD5 hash processor is designed using 0.25 $\mu\textrm{m}$CMOS technology and consists of about 13,000 gates. From timing simulation results, the designed MD5 hash processor has 465 Mbps hash rates for 512-bit input message data under 120 MHz operating frequency.

Efficient Hardware Implementation of ${\eta}_T$ Pairing Based Cryptography (${\eta}_T$ Pairing 알고리즘의 효율적인 하드웨어 구현)

  • Lee, Dong-Geoon;Lee, Chul-Hee;Choi, Doo-Ho;Kim, Chul-Su;Choi, Eun-Young;Kim, Ho-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.3-16
    • /
    • 2010
  • Recently in the field of the wireless sensor network, many researchers are attracted to pairing cryptography since it has ability to distribute keys without additive communication. In this paper, we propose efficient hardware implementation of ${\eta}_T$ pairing which is one of various pairing scheme. we suggest efficient hardware architecture of ${\eta}_T$ pairing based on parallel processing and register/resource optimization, and then we present the result of our FPGA implementation over GF($2^{239}$). Our implementation gives 15% better result than others in Area Time Product.

Russian Military Security Strategy and Ukraine (러시아의 군사안보전략과 우크라이나)

  • Kim, Yong Hwan
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.2
    • /
    • pp.47-72
    • /
    • 2009
  • Since the Soviet Union collapsed, Russia has been aggressively seeking a role and place in the U.S.-led international order. Russia conditionally cooperated with the U.S. global policy, efforts to protect and expand the national interests in Post-soviet region. In this context, Post-soviet space is the arena of the struggle among the world powers. Especially in Ukraine as the Axis power of Post-soviet space, hegemony conflicts so called 'New Cold War' between Russia and western powers including U.S. have appeared. This paper examines what are Russian military security strategy and policy, how these come to fruition in Ukraine, what are important factors of complications and its aspect.

A Dilemma of Kyrgyzstan Goes Through the Process of Nation-Building: National Security Problems and Independent National Defense Capability (국가건설과정에서 키르기스스탄의 국가안보와 자주국방의 딜레마)

  • Kim, Seun Rae
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.4
    • /
    • pp.27-52
    • /
    • 2011
  • The regions of Central Asia have each acquired an elevated strategic importance in the new security paradigm of post-September 1lth. Comprised of five states, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan, Central Asia's newly enhanced strategic importance stems from several other factors, ranging from trans-national threats posed by Islamic extremism, drug production and trafficking, to the geopolitical threats inherent in the region's location as a crossroads between Russia, Southwest Asia and China. Although the U.S. military presence in the region began before September 11th, the region became an important platform for the projection of U.S. military power against the Taliban in neighboring Afghanistan. The analysis goes on to warn that 'with US troops already in place to varying extents in Central Asian states, it becomes particularly important to understand the faultlines, geography, and other challenges this part of the world presents'. The Kyrgyz military remains an embryonic force with a weak chain of command, the ground force built to Cold War standards, and an almost total lack of air capabilities. Training, discipline and desertion - at over 10 per cent, the highest among the Central Asian republics - continue to present major problems for the creation of combat-effective armed forces. Kyrgyzstan has a declared policy of national defence and independence without the use of non-conventional weapons. Kyrgyzstan participates in the regional security structures, such as the Collective Security Treaty Organisation (CSTO) and the Shanghai Co-operation Organisation (SCO) but, in security matters at least, it is dependent upon Russian support. The armed forces are poorly trained and ill-equipped to fulfil an effective counter-insurgency or counter-terrorist role. The task of rebuilding is much bigger, and so are the stakes - the integrity and sovereignty of the Kyrgyz state. Only democratization, the fight against corruption, reforms in the military and educational sectors and strategic initiatives promoting internal economic integration and national cohesion hold the key to Kyrgyzstan's lasting future

Designed and Development of Location Tracking System by The Short-Range Radio Frequency Relay Algorithm (근거리 RF중계알고리즘에 의한 구내 위치추적시스템 연구)

  • Park, Sang-Min;Lee, Gong;Lee, Sang-Keun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.73-81
    • /
    • 2008
  • We can find easily about researches or technical development that deal with grasping the location of an object with GPS(Global Positioning System) in order to use them as a useful information. Most researches or technical development on application of tracing have been developed for the purpose of tracing objects in broad area as physical distribution or transportation, but recently, there are many researches on tracing materials in premise area as a fork lift, carts, or the equipment of work. In general, a system that utilizes location information of objects needs data communication network to transmit location data and it ensures data communication network by using common networks(SK, LG, KFT) or wireless LAN. However these two methods need monthly payment for the rental fee or require considerable amount of investment for the early stage so it is difficult to use them merely for tracing premise subjects. This study was conducted to build a tracing system for premise area by local area RF relay algorithm with low cost applying RF relay algorithm to local area wireless communication(ZIGBEE, 424MHz, Bluetooth, 900MHz) system in order to supplement these demerits and included relay algorithm, RF locating information terminal, local area RF gab-fillers, a plan for collection server of locating information, and the way of realization as they are needed in this system. I consider that this study would be applicable with flexibility in the industry area that needs tracing solution within a specific area or needs ensuring data communication network, to transmit data in ubiquitous environment, by easier and more rapid way with lower cost.

  • PDF