• 제목/요약/키워드: Security Detection

Search Result 2,066, Processing Time 0.027 seconds

Status of Ocean Observation using Wave Glider (무인해상자율로봇(Wave Glider)을 이용한 해양관측 현황)

  • Son, Young Baek;Moh, Taejun;Jung, Seom-Kyu;Hwnag, Jae Dong;Oh, Hyunju;Kim, Sang-Hyun;Ryu, Joo-Hyung;Cho, Jin Hyung
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.419-429
    • /
    • 2018
  • An unmanned autonomous maritime surface system can move the vehicle to the areas for observing the ocean accidents, disasters, and severe weather conditions. Detection and monitoring technologies have been developed by the converging of the regional and local surveillance system. Wave Glider, one of the autonomous maritime surface systems, is ocean-wave propelled autonomous surface vehicle and controlled using Iridium satellite communication. In this study, we carried out two-time Wave Glider observations for 2016 and 2017 summer in the East China Sea that the area was influenced by low-salinity water. We observed the sea surface warming effect due to the low-salinity water using the regional (satellite) and local (Wave Glider) surveillance system. We also monitored the effect of the typhoon and understood the change of the ocean-atmosphere environments in real-time. New unmanned surface system with autonomous system and high endurance structure can measure comprehensively and usefully a long observation in complicated ocean environments because of connecting with other surveillance systems.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement (생존성 강화를 위한 침입감내 시스템의 분류와 통합 프레임워크 제안)

  • Kim, Gi-Han;Chio, Myeong-Ryeoi;Lee, Kyung-Whan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.295-304
    • /
    • 2003
  • Currently security researchers focus on protection of program and data from malicious users and accidents. Therefore, many firewalls and intrusion detection systems have been developed commercially. The intrusion tolerance is a new concept that is the last line of defense for the information survivability. It emphasizes availability and integrity to provide critical system services continuously even when system is compromised. In this paper, we classify current intrusion tolerant technologies from the point of view of program and data. Furthermore, we propose an integrated framework that supports intrusion tolerance of program and data.

Development of Integrated Corrosion Monitoring and Control System (통합 부식 모니터링 및 통합 제어 시스템의 개발)

  • Yoo, Nam-Hyun;Kim, Young-Hun
    • Journal of Ocean Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.8-14
    • /
    • 2013
  • Although there are various factors that threaten the security of ships, one of the most harmful is corrosion. It is not easy to find corroding areas and the status of corrosion, even though corrosion causes serious problems such as submergence and marine pollution as a result of leaking oil and polluted water. To monitor the corrosion of ships, non-destructive inspection, weight loss coupons, electrical resistance, linear polarization resistance, zero resistance ammeter, and electrochemical impedance spectroscopy have been developed. However, these methods require much time to detect corrosion, and most are not appropriate for real time monitoring. Coating, sacrificial anode, and impressed current cathodic protection (ICCP) methods have been developed to control corrosion. The ICCP and sacrificial anode methods are the most popular ways to prevent ship corrosion. However, ICCP is only appropriate for the outside of a ship and cannot be used for complex structures such as ballast tanks because these are composed of many separate chambers. Sacrificial anodes have to be replaced periodically. This paper proposes an integrated corrosion monitoring and control system (ICMCS) that can detect corrosion in real time and is appropriate for complex structures such as ballast tanks. Because the system uses titanium for an anode, exhausted anodes do not need to be replaced.

DNA-functionalized single-walled carbon nanotube-based sensor array for gas monitoring

  • Zhang, Wenjun;Liu, Yu;Wang, Ming. L
    • Smart Structures and Systems
    • /
    • v.12 no.1
    • /
    • pp.73-95
    • /
    • 2013
  • Nine deoxyribonucleic acid (DNA) sequences were used to functionalize single-walled carbon nanotube (SWNT) sensors to detect the trace amount of methanol, acetone, and HCl in vapor. DNA 24 Ma (24 randomly arranged nitrogenous bases with one amine at each end of it) decorated SWNT sensor and DNA 24 A (only adenine (A) base with a length of 24) decorated SWNT sensor have demonstrated the largest sensing responses towards acetone and HCl, respectively. On the other hand, for the DNA GT decorated SWNT sensors with different sequence lengths, the optimum DNA sequence length for acetone and HCl sensing is 32 and 8, separately. The detection of methanol, acetone, and HCl have identified that DNA functionalized SWNT sensors exhibit great selectivity, sensitivity, and repeatability with an accuracy of more than 90%. Further, a sensor array composed of SWNT functionalized with various DNA sequences was utilized to identify acetone and HCl through pattern recognition. The sensor array is a combination of four different DNA functionalized SWNT sensors and two bare SWNT sensors (work as reference). This wireless sensing system has enabled real-time gas monitoring and air quality assurance for safety and security.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

Multi-Scale, Multi-Object and Real-Time Face Detection and Head Pose Estimation Using Deep Neural Networks (다중크기와 다중객체의 실시간 얼굴 검출과 머리 자세 추정을 위한 심층 신경망)

  • Ahn, Byungtae;Choi, Dong-Geol;Kweon, In So
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.3
    • /
    • pp.313-321
    • /
    • 2017
  • One of the most frequently performed tasks in human-robot interaction (HRI), intelligent vehicles, and security systems is face related applications such as face recognition, facial expression recognition, driver state monitoring, and gaze estimation. In these applications, accurate head pose estimation is an important issue. However, conventional methods have been lacking in accuracy, robustness or processing speed in practical use. In this paper, we propose a novel method for estimating head pose with a monocular camera. The proposed algorithm is based on a deep neural network for multi-task learning using a small grayscale image. This network jointly detects multi-view faces and estimates head pose in hard environmental conditions such as illumination change and large pose change. The proposed framework quantitatively and qualitatively outperforms the state-of-the-art method with an average head pose mean error of less than $4.5^{\circ}$ in real-time.

Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol;Yoon, Myung-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1854-1873
    • /
    • 2012
  • Owing to its simplicity and flexibility, the session initiation protocol (SIP) has been widely adopted as a major session-management protocol for Internet telephony or Voice-over IP (VoIP) services. However, SIP has faced various types of security threats. Call-disruption attacks are some of the most severe threats they face, and can greatly inconvenience consumers. In this paper, we analyze such SIP call-disruption attacks, and propose a method for detecting and counteracting them by extending the SIP INFO method with authentication. Using the proposed method, both the target user and the SIP server can detect the existence of a call-disruption attack on a user and counteract the attack. We demonstrate the effectiveness of the proposed method from the viewpoint of computational complexity by configuring a test-bed with an Asterisk SIP proxy server and an SIP performance (SIPp) emulator.

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.