• Title/Summary/Keyword: Security Control

Search Result 3,087, Processing Time 0.033 seconds

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

The Analysis on Users' Centrality in the Social Network and their Sentiment : Applying to Medical Web Forum on Alzheimer's Disease (사회연결망상의 우위와 감성 표현과의 관계 분석: 알츠하이머 웹포럼의 적용)

  • Lee, Min-Jung;Woo, Ji-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.127-140
    • /
    • 2015
  • In this study, we aim to analyze the relationship between the centrality in the social network and the sentiment of medial web forum users. In recent, many people use online resources to obtain health and wellness information especially social media resources. In the medial web forum, people give and receive informational supports and emotional supports and this interaction forms the social network. We analyze the social network, derive node characteristics in terms of centrality and compare the centrality index and the sentiment score derived from users' messages. We found that as more people express their emotion, they possess higher central position in the network. Further, people who express positive emotion in their messages have higher central position in the network than people who have negative emotion. This study will help to identify influentials of emotional supports to others and finally to control the depression of Alzheimer's disease patients and their related ones.

A Study on the Preservation Programs in Libraries and Archives (도서관 및 기록관 자료보존프로그램에 관한 고찰)

  • Cho, Young-Ju
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.1
    • /
    • pp.101-116
    • /
    • 2004
  • Deterioration and brittleness of resources on the shelves of institutions such as libraries and archives have been increased and accelerated as time passes in accordance with the preservation environment and the nature of their own material. It can be a loss of current information with little importance in prolong the life of valuable materials and to preserve them in security, integrated preservation programs should be developed and implemented according to missions, sizes, the nature of collections, users, and budgets of individual institutions. In reality, most institutions, however, are not able to implement perfect preservation programs due to lack of budget, human resources, and expertise. To solve this problem, some institutions in similar circumstances have planned cooperative preservation programs in various levels. Through cooperative systems individual institutions can not only pursue common interests but gain real benefits for themselves. Consequently institutions are recommended to collaborate with in development and implementation of various preservation programs at local, national, and international levels in addition to individual institutional programs.

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.

Construction Schemes of GIS-based Integrated Water Environment Information Management System Linked with Korean Reach File (KRF를 연계한 GIS기반의 통합 물환경정보 관리시스템 구축 방안)

  • Lee, Chol Young;Kim, Kye Hyun;Park, Yong Gil;Lee, Hyuk
    • Journal of Korean Society on Water Environment
    • /
    • v.30 no.2
    • /
    • pp.226-241
    • /
    • 2014
  • This study proposes schemes of GIS-based system development for integrated information management in water environment linked with Korean Reach File (KRF). For this purpose, precedent studies and systems of the U.S. were investigated and analyzed to induce optimal methodology for Korean circumstances. Thereafter, data linkage methods of KRF and Water Environment Information System (WEIS), system configuration plans, application development plans, and KRF improvement and maintenance plans were considered. For data linkage and system configuration, three methods were suggested: an overlay operation-based data linkage method, entering spatial addresses into the existing DB, and creating link information between KRF and the existing DB. The first method was predicted to be the most effective for system implementation, the second method is advantageous for search tasks, and the third method is advantageous for system security and maintenance. Various types of applications should be developed in the consideration of the types of the users and their usages. Moreover, there is a need for further research on regular renewal of KRF, standard development, expansion of construction areas, etc. Based on the present results, research on actual system design and development also should be conducted for supporting Total Maximum Daily Loads (TMDLs).

Relationship among Health Status, Health Behaviors and Health Practices of Adults in a Poor Area (대구광역시 영세주민의 건강행위 및 건강실천행위 관련요인)

  • 임용찬;이중정;박종원
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.2
    • /
    • pp.55-85
    • /
    • 2004
  • The problems of health in poor peoples are various and difficult things to solve it. They are highly susceptible to chronic disease because of bad environment and It is hard to access to medical services because of their Socio-demographic status. Therefore, it is important to address the problem of prevention of chronic disease and health promotion aspect. The purpose of this study was to determine the relationships among the health status, health behaviors and health practices of poor people in urban slum area. The subject of this study were 298 poor peoples who live in poor area in Daegu metropolitan city and they were asked to answer the survey questionnaires modified for Korean from behavioral risk factor surveillance system of Centers for Disease Control and Prevention USA. The result of the study were as follows; (1) There were significant relationships between health status (prevalence of chronic disease and perceived general health) and socio-demographic factor such as occupation, existence of spouse, number of family educational level, type of medical security. (2) There were some relationships between health risk behaviors such as smoking, drinking and obesity and health status of subject especially in female obesity.(3) There were relationships among health concern activity, prevalence of chronic disease and some social factor such as educational level and occupation. (4) There were relationships among health practice, health concern activity, health status and socio-demographic factors of subject. This study suggest that health status, socio-demographic status, health concerns and health promotion activity of study populations were associated and It is very important things supporting the poor people in the level of community and nation to practice healthy behaviors themselves.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.