• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.024 seconds

On the Hybrid Intrusion Detection System based Biometric Efficiency (생체 면역 기반의 하이브리드 침입 탐지 시스템에 관하여)

  • 양은목;이상용;서창호;김석우
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.57-68
    • /
    • 2001
  • Computer security is considered important because of the side effect generated from the expansion of computer network and rapid increase of the use of computer. Intrusion Detection System(IDS) has been an active research area to reduce the risk from intruders. In this paper, the Hybrid Intrusion Detection System(HIDS) based biometric immuntiy collects and filters audit data by misuse detection is innate immune, and anomaly detection is acquirement immune in multi-hosts. Since, collect and detect audit data from one the system in molt-hosts, it is design and implement of the intrusion detection system which has the immuntiy the detection intrusion in one host possibly can detect in multi-hosts and in the method of misuses detection subsequently.

  • PDF

Design of User Certification Module of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 사용자 인증 모듈 설계)

  • Myung, Sun-Kyu;Kim, Gwang-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.27-35
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

A Study on Design Elements of Main Control Room in Nuclear Power Plants by Analyzing Space Characteristics (원자력발전소 주제어실의 공간특성에 따른 디자인 요소에 관한 연구)

  • Lee, Seung-Hoon;Lee, Tae-Yeon
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.6
    • /
    • pp.249-256
    • /
    • 2010
  • For guaranteeing for security of nuclear power plant, ergonomic factors have been applied to design of main control room, core area for management and control of nuclear power plant, but design elements for performance of operators have been ignored. As the behaviors of operators are important for security of nuclear power plant, space design which makes them pleasant psychologically and makes them maintain attention on security equipments ceaselessly is required. Therefore, the purpose of this study is to analyze space characteristics of main control rooms according to regulations of nuclear power plant and general guidelines of space design, and to offer basic data for designing of main control room which makes operators pleasant psychologically and physically. At first, theoretical issues related with design of main control room are reviewed and several premises of space are developed by abstracting design elements from common space and regulations of nuclear power plant and, then integrating each design elements interactively. In short, the improvement of system environment based on human-machine interface space has brought about perceptual, cognitive, and spatial changes and has realized next generation of main control rooms. And, differences and similarities between ordinary space and main control room, which ergonomic sizes and regulations are applied and is VDT environment based on LDP, are discussed in relation to 13 design elements and 17 space premise.

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

ITU-T SG17 국제표준화 동향 및 향후 전망

  • Oh, Heung-Ryong;Kim, Youngwha;Youm, HeungYoul
    • Review of KIISC
    • /
    • v.23 no.3
    • /
    • pp.5-13
    • /
    • 2013
  • 정보보호 분야의 국제표준화는 기술들의 특성 및 참여하는 사용자들의 관점에 따라 다양한 국제표준화기구에서 국제표준개발 및 관련 연구가 진행되고 있다. 즉, ITU-T SG17(보안)에서는 전기통신(Telecommunication) 관점에서 통신망에 적용 가능한 응용기술들을 중심으로 국제표준화가 추진되고 있으며, ISO/IEC JTC1/SC27(정보보호)에서는 정보보호 원천기술들에 대한 국제표준화를 다루며, IETF Security Area에서는 인터넷 서비스의 품질 보장 및 향상된 인터넷 환경 구축을 위한 산업체 중심의 사실표준을 추진하고 있다. 그리고 유럽 및 아시아 지역에서 국가간에 정보통신 표준화와 국제표준화 기구들에 대한 공동 대응을 위한 ETSI, ASTAP, CJK Security WG 등에서도 지역 내 정보보호 표준화 활동들이 이루어지고 있다. 또한, 이러한 국제표준기구는 참여하는 이해 당사자가 국가(National Body)인지 혹은 산업체 등의 이해당사자들 간에 참여인지에 따라 특성 또한 달라지며, 표준을 개발하는 절차가 공식적인 방법에 따른 것인지 이해 당사자들 간에 합의에 의한 것인지에 따라 구분될 수도 있다. 본 논문에서는 2011년 11월, 두바이에서 개최된 ITU-T WTSA-12(세계정보통신표준총회) 국제회의 결과를 바탕으로 향후 4년간의 ITU-T SG17 국제표준화 활동 방향에 대한 정보를 제공하고자 한다.

Structural damage distribution induced by Wenchuan Earthquake on 12th May, 2008

  • Jia, Junfeng;Song, Nianhua;Xu, Zigang;He, Zizhao;Bai, Yulei
    • Earthquakes and Structures
    • /
    • v.9 no.1
    • /
    • pp.93-109
    • /
    • 2015
  • Based on the reconnaissance of buildings in Dujiangyan City during 2008 Wenchuan earthquake, China, structural damage characteristics and the spatial distribution of structural damage are investigated, and the possible reasons for the extraordinary features are discussed with consideration of the influence of urban historical evolution and spatial variation of earthquake motions. Firstly, the urban plan and typical characteristics of structural seismic damage are briefly presented and summarized. Spatial distribution of structural damage is then comparatively analyzed by classifying all surveyed buildings in accordance with different construction age, considering the influence of seismic design code on urban buildings. Finally, the influences of evolution of seismic design code, topographic condition, local site and distance from fault rupture on spatial distribution of structural damage are comprehensively discussed. It is concluded that spatial variation of earthquake motions, resulting from topography, local site effect and fault rupture, are very important factor leading to the extraordinary spatial distribution of building damage except the evolution of seismic design codes. It is necessary that the spatial distribution of earthquake motions should be considered in seismic design of structures located in complicated topography area and near active faults.

Design of Surveillance System for Fishery Safety and Security Using F-AIS (F-AIS를 이용한 어장보호 시스템 설계)

  • Yim Jeong-Bin;Nam Taek-Keun;Jeong Jung-Sik;Park Seong-Hyen;Yang Weon-Jae
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.71-74
    • /
    • 2005
  • This paper describes Fishery Safety and Security System using F-AIS based on the concepts of RFID(Radio Frequency Identification). This system is to track, protect and arrest the thief who invaded in an fishing ground. The system composed with various functional modules to implement selectively available system providing low cost to high cost and simple function to high function according to user's requirement in a practical fishing fields. Sea trial tests are carried out at Mokpo, Busan and Incheon and, it is found that the system can guard the wide area of cultivating farm field.

  • PDF

Quality Evaluation Model for Intrusion Detection System based on Security and Performance (보안성과 성능에 따른 침입탐지시스템의 품질평가 모델)

  • Lee, Ha-Young;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.289-295
    • /
    • 2014
  • Intrusion detection system is a means of security that detects abnormal use and illegal intension in advance in real time and reenforce the security of enterprises. Performance of intrusion detection system is judged by information collection, intrusion analysis, intrusion response, review and protection of intrusion detection result, reaction, loss protection that belong to the area of intrusion detection. In this paper, we developed a evaluation model based on the requirements of intrusion detection system and ISO international standard about software product evaluation.

Design of Web-Based Home Gateway Management System using SSL (SSL을 이용한 웹 기반 홈 게이트웨이 관리 시스템의 설계)

  • 황태인;박광로;윤병우;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.189-198
    • /
    • 2002
  • In this paper, we have designed the Web_based Home Gateway Management System using SSL, which can manage subscribers using Home Gateway device in home networking technology. To manage Home Gateway devices with SNMP, management elements are classified into system. performance. fault functional area based on MIB objects from Home Gateway devices MIB. System analysis provides configuration information of each Home Gateway, and Performance analysis provides device's traffic information and state. And fault analysis provides fault logging for the unexpected events and trap message from devices. HGMS uses SSL (Secure Socket Layer) to enforce the security of communication which is between server and client, and it improved the stability of HGMS.

  • PDF

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.