• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.027 seconds

Counter-Piracy Cooperation to Strengthen New Southern Policy's "Peace": An Analysis of ROK and ASEAN's Counter-Piracy Practices (신남방정책의 "평화"를 강화하기 위한 해적행위 대응 협력: 한국과 아세안의 해적행위 대응 관행 분석)

  • Boo, Yerin;Kim, Sujin;Yeo, Mathew Jie Sheng
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.141-185
    • /
    • 2021
  • The growing U.S.-China rivalry has placed the countries of Southeast Asia in exceedingly precarious positions. The Republic of Korea (ROK) likewise has been tasked with the challenge of "navigating the waters" between deepening geopolitical divides. It is in this context that the "New Southern Policy" (hereafter NSP) has become a key word in Korea's foreign policy circles. Through NSP, ROK aims to diversify its economic and security interests by strengthening ties with its southern partners, focusing on three key areas (termed as the "3 Ps"): People, Prosperity, and Peace. At the same time, the NSP seeks cooperation with other key diplomatic agendas such as the U.S.'s "Free and Open Indo-Pacific," rendering it crucial for the overall stability of the region. Considering such strategic significance, deeper analysis of the policy is more timely than ever. A brief assessment of the policy's outcome so far, however, reveals that relatively, the "Peace" pillar has been insufficient in achieving satisfactory outcomes. Here, this paper asks the question of: 1) How can the "Peace" pillar of South Korea's New Southern Policy be strengthened? Based on an analysis on the causes of the "Peace" pillar's weakness, this paper identifies counter-piracy cooperation as a solution. This paper then proceeds to answer the next question of: 2) How can ROK and ASEAN cooperate on counter-piracy, and how can these efforts be integrated into ROK's NSP? To answer the above question, this paper conducts in-depth case studies on ASEAN's and ROK's approaches to counter-piracy and identifies specific mechanisms of cooperation. In Chapter I, the paper begins with an overview of the NSP's strategic significance and an evaluation of its "Peace" pillar. Chapter II conducts a literature review on the causes of, and prescriptions for, the weakness of the "Peace" pillar. The paper then justifies why counter-piracy may be a solution. Chapter III examines ASEAN's and ROK's approaches to counter-piracy. By analyzing the general framework and each region's cases, the paper displays the strengths and weaknesses of each region's piracy responses. Based on this analysis, Chapter IV suggests ways to incorporate counter-piracy cooperation into the "Peace" pillar of the NSP. This research bears significance in that it identifies a specific area of cooperation (counter-piracy) to strengthen the "Peace" pillar of ROK's NSP. Such identification is based on a comprehensive study into the two parties' past and current experience in counter-piracy, making it contextual in nature. Furthermore, the study suggests practical mechanisms of cooperation, and considers ways of incorporation into the existing framework of NSP. This approach differs from existing literature that failed to generate case-specific, policy-oriented solutions. The COVID-19 pandemic has exacerbated piracy issues and deepened geopolitical divides. Turbulent seas such as these call for careful navigation. When it comes to promoting "peace," the key lies in combating the pirates that sail those very waters.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Homeland Security Management: A Critical Review of Civil Protection Mechanism in Korea (국가안전관리: 한국의 시민보호(위기재난관리) 체계에 관한 비판적 고찰)

  • Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.121-144
    • /
    • 2011
  • The Framework Act on the Management of Disasters and Safety 2004(FAMDS) currently underpins Korean civil protection system, and under this FAMDS, Korean civil protection establishes a three-tiered government structure for dealing with crises and disasters: central government, provincial & metropolitan government, and local government tiers. In particular, the concept of Integrated Emergency Management(IEM) emphasizes that emergency response organizations should work and act together to respond to crises and disasters effectively, based on the coordination and cooperation model, not the command and control model. In tune with this trend, civil protection matters are, first, dealt with by local responders at the local level without direct involvement of central or federal government in the UK or USA. In other words, central government intervention is usually implemented in the UK and the USA, only when the scale or complexity of a civil protection issue is so vast, and thus requires a degree of central government coordination and support, resting on the severity and impact of the event. In contrast, it appears that civil protection mechanism in Korea has adopted a rigid centralized system within the command and control model, and for this reason, central government can easily interfere with regional or local command and control arrangements; there is a high level of central government decision-making remote from a local area. The principle of subsidiarity tends to be ignored. Under these circumstances, it is questionable whether such top-down arrangements of civil protection in Korea can manage uncertainty, unfamiliarity and unexpectedness in the age of Risk Society and Post-modern society, where interactive complexity is increasingly growing. In this context, the study argues that Korean civil protection system should move towards the decentralized model, based on coordination and cooperation between responding organizations, loosening the command and control structure, as with the UK or the USA emergency management arrangements. For this argument, the study basically explores mechanisms of civil protection arrangements in Korea under current legislation, and then finally attempts to make theoretical suggestions for the future of the Korean civil protection system.

  • PDF

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

What Can Koreans Learn from the Dutch Experiences in Reforming the Health Insurance System? (한국의료보험제도(韓國醫療保險制度)의 개혁필요성(改革必要性)과 네덜란드의 경험(經驗)이 주는 교훈(敎訓))

  • Kwon, Soon-won;Sunwoo, Duk
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.47-69
    • /
    • 1990
  • The measures taken to reform the Dutch health insurance system hold valuable lessons for countries such as Korea, where there has been increased concern regarding the efficiency and effectiveness of the health services provided. The growing literature on comparative health insurance policies suggests that nations can learn from each other. In addition, Korean policymakers have shown great interest in the health insurance systems of foreign countries, particularly in Japan. The development of Korea's health insurance scheme during the past 12 years has made a significant contribution to the increased accessibility of health care services. Although the insurance coverage is universal, the health insurance system today in Korea is by no means a product of systematic and planned efforts. Moreover, it lacks due considerations of insured's needs as well as the long-term objectives of the social security health care system. There are growing gaps in premium burdens and benefits between the rural health insurance program and the employee's health insurance programs. Furthermore, the regional health insurance program is experiencing financial difficulties in spite of the fact that the amount of the government subsidy has been sharply increased in recent years. Under the present payment method solely based on the fee-for-service schedule, both consumers and providers are encouraged to utilize and prescribe more services. The combination of the utilization-inducing reimbursement system and continuous pushes for expanding health insurance has played a crucial role in raising the country's medical bills. Current trends in Korea's health care sector and those anticipated in the near future necessitate changes in the structure and funding of health care. As indicated in the above, there are various shortcomings in this context, the health policy authority in Korea can draw valuable lessons from the Dutch experiences in reforming their health insurance system. The main elements of the Dutch reform measures are a restructuring of the insurance system and a greater role for market forces in the health care system. On this basis a new system will be created which reflects the social nature of health care while at the same time containing sufficient mechanisms to allow the health care sector to operate in a cost-effective and efficient manner.

  • PDF

Humic Acid Confers HIGH-AFFINITY K+ TRANSPORTER 1-Mediated Salinity Stress Tolerance in Arabidopsis

  • Khaleda, Laila;Park, Hee Jin;Yun, Dae-Jin;Jeon, Jong-Rok;Kim, Min Gab;Cha, Joon-Yung;Kim, Woe-Yeon
    • Molecules and Cells
    • /
    • v.40 no.12
    • /
    • pp.966-975
    • /
    • 2017
  • Excessive salt disrupts intracellular ion homeostasis and inhibits plant growth, which poses a serious threat to global food security. Plants have adapted various strategies to survive in unfavorable saline soil conditions. Here, we show that humic acid (HA) is a good soil amendment that can be used to help overcome salinity stress because it markedly reduces the adverse effects of salinity on Arabidopsis thaliana seedlings. To identify the molecular mechanisms of HA-induced salt stress tolerance in Arabidopsis, we examined possible roles of a sodium influx transporter HIGH-AFFINITY $K^+$ TRANSPORTER 1 (HKT1). Salt-induced root growth inhibition in HKT1 overexpressor transgenic plants (HKT1-OX) was rescued by application of HA, but not in wild-type and other plants. Moreover, salt-induced degradation of HKT1 protein was blocked by HA treatment. In addition, the application of HA to HKT1-OX seedlings led to increased distribution of $Na^+$ in roots up to the elongation zone and caused the reabsorption of $Na^+$ by xylem and parenchyma cells. Both the influx of the secondary messenger calcium and its cytosolic release appear to function in the destabilization of HKT1 protein under salt stress. Taken together, these results suggest that HA could be applied to the field to enhance plant growth and salt stress tolerance via post-transcriptional control of the HKT1 transporter gene under saline conditions.

Physiology, genomics and molecular approaches for lmproving abiotic stress tolerance in rice and impacts on poor farmers

  • Ismail, Abdelbagi M.;Kumar, Arivnd;Singh, R.K.;Dixit, Shalabh;Henry, Amelia;Singh, Uma S.
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.7-7
    • /
    • 2017
  • Unfavorable weather and soil conditions reduce rice yield and land and water productivity, aggravating existing encounters of poverty and food insecurity. These conditions are foreseen to worsen with climate change and with the unceasing irrational human practices that progressively debilitate productivity despite global appeals for more food. Our understanding of plant responses to abiotic stresses is advancing and is complex, involving numerous critical processes - each controlled by several genetic factors. Knowledge of the physiological and molecular mechanisms involved in signaling, response and adaptation, and in some cases the genes involved, is advancing. Moreover, the genetic diversity being unveiled within cultivated rice and its wild relatives is providing ample resources for trait and gene discovery, and this is being scouted for rice improvement using modern genomics and molecular tools. Development of stress tolerant varieties is now being fast-tracked through the use of DNA markers and advanced breeding strategies. Large numbers of drought, submergence and salt tolerant varieties were commercialized over recent years in South and Southeast Asia and more recently in Africa. These varieties are making significant changes in less favorable areas, transforming lives of smallholder farmers - progress considered incredulous in the past. The stress tolerant varieties are providing assurance to farmers to invest in better management of their crops and the ability to adjust their cropping systems for even higher productivity and more income, sparking changes analogous to that of the first green revolution, which previously benefited only favorable irrigated and rainfed areas. New breeding tools using markers for multiple stresses made it possible to develop more resilient, higher yielding varieties to replace the aging and obsolete varieties still dominating these areas. Varieties with multiple stress tolerances are now becoming available, providing even better security for farmers and lessening their production risks even in areas affected by complex and overlapping stresses. The progress made in these less favorable areas triggered numerous favorable changes at the national and regional levels in several countries in Asia, including adjusting breeding and dissemination strategies to accelerate outreach and enabling changes at higher policy levels, creating a positive environment for faster progress. Exploiting the potential of these less productive areas for food production is inevitable, to meet the escalating global needs for more food and sustained production systems, at times when national resources are shrinking while demand for food is mounting. However, the success in these areas requires concerted efforts to make use of existing genetic resources for crop improvement and establishing effective evaluation networks, seed production systems, and seed delivery systems to ensure faster outreach and transformation.

  • PDF

Plant Immunity against Viruses: Moving from the Lab to the Field (식물바이러스 면역반응 최신 연구 동향 및 전망)

  • Kim, Nam-Yeon;Hong, Jin-Sung;Jeong, Rae-Dong
    • Research in Plant Disease
    • /
    • v.24 no.1
    • /
    • pp.9-25
    • /
    • 2018
  • Plant viruses cause significant yield losses and continuously threaten crop production, representing a serious threat to global food security. Studies on plant-virus interactions have contributed to increase our knowledge on plant immunity mechanism, providing new strategies for crop improvement. The prophylactic managements consist mainly following international legislations, eradication of infected plants, and application of pesticide to decrease the population of vectors. Hence, putting together the pieces of knowledge related to molecular plant immunity to viruses is critical for the control of virus disease in fields. Over the last several decades, the outstanding outcomes of extensive research have been achieved on comprehension of plant immunity to viruses. Although most dominant R genes have been used as natural resistance genes, recessive resistance genes have been deployed in several crops as another efficient strategy to control viruses. In addition, RNA interference also regulates plant immunity and contribute a very efficient antiviral system at the nucleic acid level. This review aims at describing virus disease on crops and summarizes current resistance mechanisms. Furthermore, we will discuss the current biotechnological approaches to control viral diseases and the future questions that are to be addressed to secure crop production against viruses.

Discovery of Active Nodes and Reliable Transmission of Active Packets in IP Networks (IP 망에서의 액티브 노드 발견 및 액티브 패킷의 신뢰성 전송 기법)

  • Kim, Bang-Eun;Chae, Ki-Joon;Kim, Dong-Young;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.361-370
    • /
    • 2004
  • All active nudes which have no physically direct connection with each other in If network must be able to compose and manage network topology Informations. Besides one active program can be performed by the active nodes when every active packet for this program is transmitted without any loss of packets. Also the active packets should be transmitted effectively to minimize the transmission delay and securely from threatens. In this thesis, the discovery scheme of active nodes is adapted for active nodes in IP networks to compose and manage the topology information. The scheme for the efficient, reliable and secure transmission of active packets is also proposed. The sequence number is assigned to every active packet. If a receiver detects the loss of active packet checking the sequence number, the receiver requests the retransmission of the lost packet to the previous active node. kiter receiving an active packet and adapting security and reliability schemes, intermediate active nodes not only copy and send the Packet Instantly but also apply some suity mechanisms to it. And the active packet transmission engine is proposed to provide these transmission schemes The simulation of the adapted active node discovery scheme and the proposed active packet transmission engine is performed. The simulation results show that the adapted active node discovery scheme is efficient and the proposed active engine has the low latency and the high performance.

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.