• Title/Summary/Keyword: Security Zone

Search Result 221, Processing Time 0.033 seconds

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

Remote Measurement of Ultraviolet Reflections for the Guidelines for Leisure Tourism Activities on the Adjacent Coast of the Demilitarized Zone Peace Life Belt (비무장지대 평화생명벨트 인접해안에서의 레저관광활동 가이드라인을 위한 자외선 반사량 원격측정)

  • Uh, Je-Sun;Choi, chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.499-506
    • /
    • 2022
  • With the construction of the northern line of the East Sea in 2021, expectations for peaceful use of the Demilitarized Zone (DMZ) are rising. Accordingly, it is necessary to prepare for leisure tourism activities at nearby beaches using the Demilitarized Zone as a security ecological tourism. However, despite the increase in the amount of ultraviolet rays on the surface due to the destruction of the ozone layer, there are no guidelines for UV exposure. In this paper, the amount of ultraviolet reflection on the coast adjacent to the DMZ using remote exploration was measured and analyzed. It is hoped that the presented results will be used as basic data to prepare UV guidelines for leisure tourism activities in nearby areas.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

IDs Assignment of Hybrid Method for Efficient and Secure USN (Ubiquitous Sensor Networks) (효율적인 안전한 유비쿼터스 센서 네트워크를 위한 하이브리드 방식의 아이디 할당)

  • Sung, Soon-Hwa
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.15-25
    • /
    • 2008
  • Due to the differences between a mobile ad-hoc network and a sensor network, the pre-existing autoconfiguration for a mobile ad-hoc network cannot be simply applied to a sensor network. But. a mechanism is still necessary to assign locally unique addresses to sensor nodes efficiently. This paper proposes a hybrid IDs assignment scheme of local area sensor networks. The IDs assignment scheme of hybrid method combines a proactive IDs assignment with a reactive IDs assignment scheme. The proposed scheme considers efficient communication using reactive IDs assignment, and security for potential attacks using zone-based self-organized clustering with Byzantine Agreement in sensor networks. Thus, this paper has solved the shortage of security due to minimizing network traffic and the problem of repairing the network from the effects of an aberrant node in sensor networks.

  • PDF

An Intelligent Video Image Segmentation System using Watershed Algorithm (워터쉐드 알고리즘을 이용한 지능형 비디오 영상 분할 시스템)

  • Yang, Hwang-Kyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.309-314
    • /
    • 2010
  • In this paper, an intelligent security camera over internet is proposed. Among ISC methods, watersheds based methods produce a good performance in segmentation accuracy. But traditional watershed transform has been suffered from over-segmentation due to small local minima included in gradient image that is input to the watershed transform. And a zone face candidates of detection using skin-color model. last step, face to check at face of candidate location using SVM method. It is extract of wavelet transform coefficient to the zone face candidated. Therefore, it is likely that it is applicable to read world problem, such as object tracking, surveillance, and human computer interface application etc.

Assessing the Green Total Factor Productivity of Water Use in Mainland China

  • Ning, Meng;Wu, Zheru;Zhou, Zhitian;Yang, Duogui
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.201-206
    • /
    • 2021
  • The significance of high-quality development and green total factor productivity has attracted widespread attention and research, while few studies on green total factor productivity that considers the use of water resources have been conducted in the context of water shortages and water stress. In this study, the green total factor productivity of water use from 2005 to 2015 in mainland China is evaluated based on the global Malmquist-Luenberger productivity index. Results show that: (1) China's green total factor productivity of water use has been improving since 2005 with an annual global Malmquist-Luenberger productivity index of 1.0104. (2) At the regional level, the eastern zone in mainland China owns the highest green total factor productivity of water use, while that in the intermediate zone ranks last. (3) The green total factor productivity of water use in the southern region (1.0113) significantly higher than that in the northern region (1.0095), and also higher than the national average level in the same period. BPC index has been the most important incluencing factor of green total factor productivity of water use at both national level and regional level since 2011.

The Design of Security Information Management System of CORBA Security with Using Repository (Repository를 활용한 CORBA Security의 보안정보관리 시스템 설계)

  • Ryu, Ki-Young;Kim, Ki-Bong;Jin, Seong-Il;In, So-Ran
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.15-18
    • /
    • 2000
  • 분산객체 처리 환경에서 CORBA 를 기반으로 한 응용 객체간에 전달되는 정보에 대하여 보안을 유지하기 위해 요구되는 보안 정보를 관리하는 기법을 제안하고 이들을 관리하기 위한 보안정책 들의 객체들을 효율적으로 관리하기 위하여 Repository 응용 방안을 제시하였다.

  • PDF

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF