• 제목/요약/키워드: Security Event

검색결과 398건 처리시간 0.033초

A Study of Improving Safety Management in Taekwondo Events (태권도 이벤트의 안전관리 개선 방안)

  • Cho, Hyun-Joo;Kim, Doo-Han
    • Korean Security Journal
    • /
    • 제53호
    • /
    • pp.231-251
    • /
    • 2017
  • Taekwondo has developed into a global sport that sports 80 million people from 208 countries around the world. Korea is the mother country of Taekwondo, and there are many international Taekwondo events in Korea. As important as the image of Taekwondo contents, it will be operation plan and management for event facilities. In particular, safety management for participants is more important than anything else. In case of Taekwondo where there are many national events, there are many foreign visitors, so safety management in facilities and running programs needs to be important. In this study, we conducted in - depth interviews with experts with a career in Taekwondo events. Based on the in - depth interviews, we analyzed the safety management problems of the international Taekwondo events and suggested improvement directions to overcome them. Based on the results of these researches, the improvement direction of Taekwondo event safety management proposed in the first category is a demand for improving safety and injury related system construction. The second category, the safety improvement of visitors, is to secure professional manpower and secure budgets. Also, what is important in the third category, facility safety area, is the proposal to introduce facility safety certification system.

  • PDF

Towards Low Complexity Model for Audio Event Detection

  • Saleem, Muhammad;Shah, Syed Muhammad Shehram;Saba, Erum;Pirzada, Nasrullah;Ahmed, Masood
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.175-182
    • /
    • 2022
  • In our daily life, we come across different types of information, for example in the format of multimedia and text. We all need different types of information for our common routines as watching/reading the news, listening to the radio, and watching different types of videos. However, sometimes we could run into problems when a certain type of information is required. For example, someone is listening to the radio and wants to listen to jazz, and unfortunately, all the radio channels play pop music mixed with advertisements. The listener gets stuck with pop music and gives up searching for jazz. So, the above example can be solved with an automatic audio classification system. Deep Learning (DL) models could make human life easy by using audio classifications, but it is expensive and difficult to deploy such models at edge devices like nano BLE sense raspberry pi, because these models require huge computational power like graphics processing unit (G.P.U), to solve the problem, we proposed DL model. In our proposed work, we had gone for a low complexity model for Audio Event Detection (AED), we extracted Mel-spectrograms of dimension 128×431×1 from audio signals and applied normalization. A total of 3 data augmentation methods were applied as follows: frequency masking, time masking, and mixup. In addition, we designed Convolutional Neural Network (CNN) with spatial dropout, batch normalization, and separable 2D inspired by VGGnet [1]. In addition, we reduced the model size by using model quantization of float16 to the trained model. Experiments were conducted on the updated dataset provided by the Detection and Classification of Acoustic Events and Scenes (DCASE) 2020 challenge. We confirm that our model achieved a val_loss of 0.33 and an accuracy of 90.34% within the 132.50KB model size.

Real-Time Attack Detection System Using Event-Based Runtime Monitoring in ROS 2 (ROS 2의 이벤트 기반 런타임 모니터링을 활용한 실시간 공격 탐지 시스템)

  • Kang, Jeonghwan;Seo, Minseong;Park, Jaeyeol;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제32권6호
    • /
    • pp.1091-1102
    • /
    • 2022
  • Robotic systems have developed very rapidly over the past decade. Robot Operating System is an open source-based software framework for the efficient development of robot operating systems and applications, and is widely used in various research and industrial fields. ROS applications may contain various vulnerabilities. Various studies have been conducted to monitor the excution of these ROS applications at runtime. In this study, we propose a real-time attack detection system using event-based runtime monitoring in ROS 2. Our attack detection system extends tracetools of ros2_tracing to instrument events into core libraries of ROS 2 middleware layer and monitors the events during runtime to detect attacks on the application layer through out-of-order execution of the APIs.

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • 제11호
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF

The Protection in Security Situation and Effective Ways in the International Major Meetings (국제정상회의 경호안전 실태 및 대책방안)

  • Kwon Jeong-Hun;Lee Sae-Hwan
    • Journal of the Korean Society of Safety
    • /
    • 제20권2호
    • /
    • pp.151-157
    • /
    • 2005
  • One of the most significant parts in the international major meetings is to stand attendants over various danger and keep the safe of the nation. The International major meetings such as the summit, the athletic meeting are often held around the world while the activity of the terrorists unseen increases at the high speed. The goal of this thesis is to present some effective ways for successful opening of the international event. Some of the proposals that I come up with the research can be summarized as follows: the smooth cooperation between countries, the control for NGO's demonstration, the training and the best use of security personnel, finally the understanding of peoples and forming sympathy from them.

A study on the classification algorithm in order to information explosion prevention in building security network (빌딩 보안 네트워크상의 정보폭주 방지를 위한 분류 알고리즘에 관한 연구)

  • Kim Kye-Kook;Seo Chang-Ok
    • Journal of the Korea Society of Computer and Information
    • /
    • 제10권5호
    • /
    • pp.133-140
    • /
    • 2005
  • The whole network system is paralyzed due to excess event of security server once in a while. If that happens, We have to analyze the cause of events, the time will require when we deal with a matter All the while, ACU(ACCESS CONTROL UNIT) and security server are off, We can not treat about information retrieval of people who come to building with real time. In this paper, we suggested classification algorithm in order to prevent of information explosion.

  • PDF

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • 제11권4호
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

Design of a Security Monitoring System based on correlation analysis (침해위협 상관분석 기반의 보안관제시스템 설계)

  • Jeong, Ki-Moon;Park, Hark-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 한국컴퓨터정보학회 2011년도 제44차 하계학술발표논문집 19권2호
    • /
    • pp.335-338
    • /
    • 2011
  • 최근 정보화가 고도화됨에 따라 해킹, 웜 바이러스 등 사이버 침해사고 또한 증가하고 있다. 이에 따라 사이버 침해사고를 예방하고 대응하기 위하여 보안관제의 필요성이 대두되고 있으며 이를 지원하기 위한 시스템이 등장하고 있다. 단순한 사이버 공격을 탐지하는 수준에서 벗어나 분석 및 대응 등 넓은 의미의 보안관제 활동을 수행하기 위한 시스템은 이기종 환경에서 대용량의 데이터를 처리하여 신속하고 정확한 탐지 결과를 보여줄 수 있어야 한다. 또한 다양한 보안관제 활동을 원활히 수행할 수 있는 기능을 제공하여야 한다. 본 논문에서는 이러한 요구사항을 반영하여 대용량 보안이벤트 데이터를 동적으로 상관 분석하여 탐지 효율성과 신속성을 향상시킬 수 있는 보안관제시스템을 설계 제안한다.

  • PDF

Evaluating Unsupervised Deep Learning Models for Network Intrusion Detection Using Real Security Event Data

  • Jang, Jiho;Lim, Dongjun;Seong, Changmin;Lee, JongHun;Park, Jong-Geun;Cheong, Yun-Gyung
    • International journal of advanced smart convergence
    • /
    • 제11권4호
    • /
    • pp.10-19
    • /
    • 2022
  • AI-based Network Intrusion Detection Systems (AI-NIDS) detect network attacks using machine learning and deep learning models. Recently, unsupervised AI-NIDS methods are getting more attention since there is no need for labeling, which is crucial for building practical NIDS systems. This paper aims to test the impact of designing autoencoder models that can be applied to unsupervised an AI-NIDS in real network systems. We collected security events of legacy network security system and carried out an experiment. We report the results and discuss the findings.

An Analysis of System Log using Regular Expressions (정규표현식을 이용한 시스템 로그 분석)

  • Kim, Hong-Kyung;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2020년도 춘계학술발표대회
    • /
    • pp.154-156
    • /
    • 2020
  • 보안업무를 수행하는 담당자로서 사이버 피해 여부를 파악하기 위한 가장 중요한 업무 중의 하나는 피해를 입은 시스템과 서비스에서 발생되는 다양한 로그들을 정확하게 분석하는 것이다. 그러나 해당 기관이 보안로그를 전문적으로 분석하는 SIEM(Security Information and Event Management)과 같은 솔루션이 없을 경우 보안업무 담당자가 피해 시스템에서 추출된 로그만 가지고 직접 분석하여 공격여부를 판단하기는 쉽지 않다. 따라서 본 논문에서는 정규표현식을 이용하여 다양한 시스템의 로그를 쉽고 정확하게 분석하는 방법을 제시한다.