• 제목/요약/키워드: Security Events

Search Result 279, Processing Time 0.022 seconds

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study of Power Law Distribution of Korean Disaster and Identification of Focusing Events (한국 재난의 멱함수분포와 사회적 충격사건에 관한 연구)

  • Kim, Yongkyun;Kim, Sang Pil;Cho, Hyoung-Sig;Sohn, Hong-Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.36 no.1
    • /
    • pp.181-190
    • /
    • 2016
  • Improvements in disaster management has become a global necessity because the magnitude of disasters is intensifying in parallel with the increased disaster damage. The disaster risk in Korea is also increasing due to the emergence of new types of disaster; such as the Middle East respiratory syndrome coronavirus, the increase of complex disasters, and the heightened probability of a catastrophic event due to climate change. This paper aimed to identify the disaster loss-frequency relationship from 1948 to 2014 in Korea by using four types of variables. In addition, this paper found major disasters that resulted in the reformation of disaster response organizations, and inputted the deaths and economic loss attributed to those disasters into the disaster loss-frequency graph. The research result substantiated that the disaster loss-frequency relationship in Korea follows the Power Law and found the coefficients of each Power Function. Additionally, this paper found that most of the reformations of disaster response organizations happened after major disasters that concentrated societies attention and anger due to the high human and economic impact; such events are labelled as "focusing events." These focusing events, with the characteristics of a low probability and high impact, are located in the long tail of the Power Law Distribution. This paper suggests that the effective public policy for disaster response needs to be developed by paying attention to 'low probability and high impact' focusing events that are located in the long tail of the Power Law Distribution.

A Study on Quantitative Modeling for EPCIS Event Data (EPCIS Event 데이터 크기의 정량적 모델링에 관한 연구)

  • Lee, Chang-Ho;Jho, Yong-Chul
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.4
    • /
    • pp.221-228
    • /
    • 2009
  • Electronic Product Code Information Services(EPCIS) is an EPCglobal standard for sharing EPC related information between trading partners. EPCIS provides a new important capability to improve efficiency, security, and visibility in the global supply chain. EPCIS data are classified into two categories, master data (static data) and event data (dynamic data). Master data are static and constant for objects, for example, the name and code of product and the manufacturer, etc. Event data refer to things that happen dynamically with the passing of time, for example, the date of manufacture, the period and the route of circulation, the date of storage in warehouse, etc. There are four kinds of event data which are Object Event data, Aggregation Event data, Quantity Event data, and Transaction Event data. This thesis we propose an event-based data model for EPC Information Service repository in RFID based integrated logistics center. This data model can reduce the data volume and handle well all kinds of entity relationships. From the point of aspect of data quantity, we propose a formula model that can explain how many EPCIS events data are created per one business activity. Using this formula model, we can estimate the size of EPCIS events data of RFID based integrated logistics center for a one day under the assumed scenario.

Use of Multimedia Technologies in the Training of Physical Culture and Sports Specialists

  • Shevchenko, Olha;Bahinska, Olha;Markova, Olena;Broiakovskyi, Oleksandr;Bielkova, Tetyana;Honcharenko, Ivan;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.245-251
    • /
    • 2022
  • Educational reform in Ukraine encourages the use of multimedia technologies in the training of specialists in Physical Education and Sports, which is one of the promising directions of education development. Therefore, the article specifies the content of the terms "innovation" and "technology". For modern society, the introduction of multimedia technologies in education is not so much theoretical as pragmatic, since under condition of globalization it concerns its historical development and prospects associated with the so-called "high technologies".Our goal is to improve the training of Physical Education and Sports specialists by means of multimedia technologies. All of innovative technologies can be divided into four groups, depending on the appropriate form of educational activity for their use. The development of multimedia technologies in the training of specialists in Physical Education and Sport at the present stage of education development should be carried out in accordance with the criteria of manufacturability, which are presented in the article: scientism, to rely on the theoretical provisions of pedagogical science and methods of teaching the discipline, socially recognized educational goals, prospects for modernization of Education; consistency, which provides for the interaction of parts and the whole in the organization of the study environment, as a result of which the physical development of the young generation is an integral entity; guarantee, that is, the error between the planned and obtained results should be minimal; manageability, that is, full management of the stages of work of the teacher and students, which make up the completed cycle of actions; mass participation, for the purpose of applying the technology does not depend on the physical training of students, the pedagogical skill of the teacher and the type of educational institutions. The article presents the theory and method of organizing sports events and circuses in the training of specialists in Physical Education and Sports by means of multimedia technologies. In order to increase the level of physical development of a person, physical fitness and the state of health of students, which has a clear trend to constant deterioration, it is necessary to instill love for sports, carry out high-quality training and organize sports events using multimedia technologies. In the process of sports activities, the participants' mental education is carried out. There are two types of communication here: direct and indirect, which are described in the article.In games and sports competitions, there are many opportunities for forming rules of collective behavior. The main issues of the organization of sports activities by means of multimedia technologies have been clarified. During sports competitions, the tasks presented in Physical Education and sports classes are improved, which ensure the improvement of physical and theoretical training of the individual. The pleasure of sports, bright, emotional spectacles, confirmed by multimedia technologies, arises from the participation of the viewer in them.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Correlation of Occupational Stress Index with 24-hour Urine Cortisol and Serum DHEA Sulfate among City Bus Drivers: A Cross-sectional Study

  • Du, Chung-Li;Lin, Mia Chihya;Lu, Luo;Tai, John Jen
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.169-175
    • /
    • 2011
  • Objectives: The questionnaire of occupational stress index (OSI) has been popular in the workplace, and it has been tailored for bus drivers in Taiwan. Nevertheless, its outcomes for participants are based on self-evaluations, thus validation by their physiological stress biomarker is warranted and this is the main goal of this study. Methods: A cross-sectional study of sixty-three city bus drivers and fifty-four supporting staffs for comparison was conducted. Questionnaire surveys, 24-hour urine cortisol testing, and blood draws for dehydroepiandrosterone-sulfate (DHEA-S) testing were performed. The measured concentrations of these biological measures were logarithmically transformed before the statistical analysis where various scores of stressor factors, moderators, and stress effects of each OSI domain were analyzed by applying multiple linear regression models. Results: For drivers, the elevated 24-hour urine cortisol level was associated with a worker's relationship with their supervisor and any life change events in the most recent 3 months. The DHEA-S level was higher in drivers of younger age as well as drivers with more concerns relating to their salary and bonuses. Non-drivers showed no association between any stressor or satisfaction and urine cortisol and blood DHEA-S levels. Conclusion: Measurements of biomarkers may offer additional stress evaluations with OSI questionnaires for bus drivers. Increased DHEA-S and cortisol levels may result from stressors like income security. Prevention efforts towards occupational stress and life events and health promotional efforts for aged driver were important anti-stress remedies.

Security Measures through a Statistical Analysis of Accident within the School (학교내 사고 통계분석을 통한 안전대책 방안)

  • Kim, Tae-Hwan;Hong, Jun-Soo;Lee, Jae-Min
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.139-160
    • /
    • 2013
  • Growth of minors learning space that the school is a place where many students live. Students, but in the living space of these minors values of change and chaos that occurs in addition to school safety incidents typically occur many accidents and potential for accidents to occur. Tinking of these potential events. Indifferent about the safety of schools and teachers with the much more conscious of the safety of the students lean due to being generated. Body and life, and damage to property due to these events. Accidents due to wear and sometimes liability and indemnity issues surrounding tarnished with the image of the school and teachers look forward to hearing from parents about the school deterioration, resulting in an unfavorable impact. Therefor in this essay, we are presenting case analysis may occur or re-occur. Prevent accidents that can identify and Countermeasures against accidents that occur within the school.

  • PDF

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.