• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.024 seconds

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.

Study on Development of Automation System for Non-Contact Counting of ID Card (비접촉 ID카드 계수를 위한 자동화 시스템 개발)

  • Kang, Dae-Hwa;Hong, Jun-Hee;Guo, Yang-Yang;Lee, Hyok-Won
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.4
    • /
    • pp.652-657
    • /
    • 2013
  • In this study, we developed a counting method for non-contact ID cards using an optical fiber displacement sensor instead of the traditionally used friction counting method. The proposed method has the advantage of high speed and automated measurement. For counting non-contact ID cards, an H-type optical fiber sensor, jig part, and counting program are developed separately to build the system and adjust it. Through the experimental test results, it was confirmed that counting is possible with one type of international ID card and one type of financial security card based on ISO7810. Furthermore, by applying the proposed method to 100 ID cards 100 times repeatedly, it was confirmed that it has high accuracy and an error ratio of 0%. We experimentally demonstrated that the proposed counting method for non-contact ID cards using an optical fiber displacement sensor can perform measurements with high accuracy and high speed.

Factors Affecting Continuous Customer Acceptance of Internet Banking (인터넷 뱅킹의 사용자 지식, 서비스 특성, 보안요인이 지속적 고객수용에 미치는 영향)

  • Chae, Young-Il
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.372-384
    • /
    • 2011
  • The purpose of this study is empirically analyzing the effects of external factors(user knowledge, service characteristics, security), perceived risk, trust, ease of use, and usefulness on continuous customer acceptance in Internet banking. To achieve the goal, we develop the extended Technology Acceptance Model(Ex-TAM) based in the theoretical backgrounds of the Technology Acceptance Model(TAM). To test the new model(Ex-TAM), path analysis is performed by AMOS 4.0 package as a statistical tool. The finding indicate that 4 factors(service characteristics, ease of use, usefulness, trust) are significant. However, 2 factors(security, perceived risk) are not significant, user knowledge is partly significant.

Design and Implementation of Alert Analysis System using Correlation (연관성을 이용한 침입탐지 정보 분석 시스템의 설계 및 구현)

  • 이수진;정병천;김희열;이윤호;윤현수;김도환;이은영;박응기
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.438-449
    • /
    • 2004
  • With the growing deployment of network and internet, the importance of security is also increased. But, recent intrusion detection systems which have an important position in security countermeasure can't provide proper analysis and effective defence mechanism. Instead, they have overwhelmed human operator by large volume of intrusion detection alerts. In this paper, we propose an efficient alert analysis system that can produce high level information by analyzing and processing the large volume of alerts and can detect large-scale attacks such as DDoS in early stage. And we have measured processing rate of each elementary module and carried out a scenario-based test in order to analyzing efficiency of our proposed system.

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF

Influence of Perceived Attachment Security and Social Support on Somatic Symptoms in Late School-Aged Children Using a School Health Clinic (보건실 이용 학령후기 아동이 지각한 애착안정성, 사회적 지지가 신체화 증상에 미치는 영향)

  • Park, Yu Jin;Im, Yeo Jin
    • Child Health Nursing Research
    • /
    • v.22 no.4
    • /
    • pp.370-378
    • /
    • 2016
  • Purpose: The purpose of this study was to examine current status of somatic symptoms of late school-aged children using the school health clinic and to investigate the influence of perceived attachment security and social support on their somatic symptoms. Methods: For this descriptive study, self-report questionnaires were completed by fifth and sixth graders attending 'A' elementary school in Gyeonggi-do. Data from 216 students were included. Data analysis included descriptive statistics, t-test, ANOVA, Pearson correlation coefficient, and multiple regression analysis. Results: Most frequent somatic symptoms were headache, fainting, backache, numbness in a body part, and muscle ache in that order. More frequent somatic symptoms were reported by girls, students who recognized their family SES as low, students who used school health clinic often and students who were dissatisfied with school life. Somatic symptom showed negative correlations with attachment stability and perceived social support from family and teachers. In the regression analysis, the variables; low attachment stability, female gender, and low satisfaction with school affected more frequent somatic symptoms. Conclusion: Careful monitoring of late school-aged children expressing frequent somatic symptoms is required. Intervention programs to improve attachment security and satisfaction with school should be developed for school children, especially girls, presenting with somatic symptoms.

A study on effects of water-cement ratio and crack width on chloride ion transmission rate in concrete

  • Li, Yue;Chen, Xiaohan;Zhang, Guosheng
    • Computers and Concrete
    • /
    • v.19 no.4
    • /
    • pp.387-394
    • /
    • 2017
  • To study the effects of water-cement ratio changes and cracks on chloride ion transmission rate in cracked concrete, RCM method was adopted to accelerate the diffusion of chloride ion in cracked concrete, and the changes in chloride ion concentration and around the cracks are inferred by finite-element method. The test results show that as far as prefabricated cracks on concrete components are concerned, the width thresholds of two cracks on the concrete specimens with a water-cement ratio of 0.5 and 0.6 are 0.05 mm and 0.1 mm respectively, the width threshold of two cracks on the concrete specimens with a water-cement ratio of 0.4 is 0.05 mm and 0.2 mm respectively; and the results of numerical simulation show that the smaller the water-cement ratio is, the more significant effects of cracks on chloride ion transmission rate are. As a result, more attention shall be paid to the crack prevention, repairing and strengthening for high-strength concrete.

Development of Application Service for Secure Container Transport Based on CSD (CSD 기반의 컨테이너 안전운송 응용 서비스 개발)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2203-2208
    • /
    • 2011
  • In this paper, we describe application service development for secure land and marine transport based on CSD (Conveyance Security Device) systems. Based on CSD systems, we present application service and security service according to relevant standards as well as test procedure of developed services. Exploiting temperature, moisture, impact sensors, state monitoring function of container freight was developed to prevent disaster during transportation in addition to security function with CSD. For confidentiality of messages exchanged among application service entity and CSD systems, Encryption and decryption functions going by RC5 and AES-128 algorithms were implemented at desktop PC and 8 bit CPU environments, respectively. Measuring the elapsed time during encryption and decryption shows that two algorithms are allowable for the application service.

Implementation of ATmega128 based Short Message Transmission Protocol IMCP (ATmega128 기반 단문 메시지 전송 프로토콜 IMCP 구현)

  • Kim, Jeom Go
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.3-11
    • /
    • 2020
  • The social networking service (SNS) is free, but the data usage fee paid to the telecommunications company and the member's information must be provided directly or indirectly. In addition, while SNS' specifications for transmitting and receiving devices such as smart-phones and PCs are increasing day by day, using universal transmission protocols in special environments such as contaminated areas or semiconductor manufacturing plants where work instructions are mainly made using short messages is not easy. It is not free and has a problem of weak security. This paper verified the practicality through the operation test by implementing IMCP, a low-power, low-cost message transmission protocol that aims to be wearable in special environments such as risk, pollution, and clean zone based on ATmega128.