• Title/Summary/Keyword: audit data

Search Result 420, Processing Time 0.028 seconds

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

The Bayesian Framework based on Graphics for the Behavior Profiling (행위 프로파일링을 위한 그래픽 기반의 베이지안 프레임워크)

  • 차병래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.69-78
    • /
    • 2004
  • The change of attack techniques paradigm was begun by fast extension of the latest Internet and new attack form appearing. But, Most intrusion detection systems detect only known attack type as IDS is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, the experiments to apply various techniques of anomaly detection are appearing. In this paper, we propose an behavior profiling method using Bayesian framework based on graphics from audit data and visualize behavior profile to detect/analyze anomaly behavior. We achieve simulation to translate host/network audit data into BF-XML which is behavior profile of semi-structured data type for anomaly detection and to visualize BF-XML as SVG.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

A Basic Study on Analysis of Influencing factor of Bus Accidents in Bus Lane Section (버스전용차로 구간 유형별 버스사고영향요인 분석 기초연구)

  • Park, Jun-Tae;Kim, Hyun-Jin;Kim, Jung-Yeol;Jang, Il-Jun;Lim, Joon-Bum
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.3
    • /
    • pp.153-160
    • /
    • 2012
  • Various social problems such as traffic congestion, car accidents and environmental problems(air pollution, noises etc.) have been happening in the Seoul metropolitan area that has the car oriented traffic system providing cars continuously. Along with this, the financial burden caused by current oil price anxiety made paradigm shift from caroriented to public transportation-oriented. Its typical example is an arterial branch bus system changing(bus lane through the center of main road) started in Seoul in July, 2004. But study on safety analysis of bus lane and characteristic of accidents are not sufficient enough to now. The bus lanes are expanded to provide roads for better traffic operation and accidents between buses and pedestrians or ordinary vehicles are considered main problems. This study divided each bus route of median bus lane(bus-only lane through the center of main roads) and bus lane at roadside by intersection and collected and analysed data about influence variables of bus accidents chosen in each section. We constructed a logistic model using collected data. As a result, bus lane at roadside are used by both buses and other kinds of vehicles differently from median bus lane and showed such characteristic in accident influence. Therefore access management to factors causing conflict and improvement of operation management are required. In case of median bus lane, the more buses moving general vehicle lane and traffic volume of section were, the more accidents happened. In case that stop line of center lane is not backward, view blocking of vehicles turning left caused accidents.

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

2D-MELPP: A two dimensional matrix exponential based extension of locality preserving projections for dimensional reduction

  • Xiong, Zixun;Wan, Minghua;Xue, Rui;Yang, Guowei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.2991-3007
    • /
    • 2022
  • Two dimensional locality preserving projections (2D-LPP) is an improved algorithm of 2D image to solve the small sample size (SSS) problems which locality preserving projections (LPP) meets. It's able to find the low dimension manifold mapping that not only preserves local information but also detects manifold embedded in original data spaces. However, 2D-LPP is simple and elegant. So, inspired by the comparison experiments between two dimensional linear discriminant analysis (2D-LDA) and linear discriminant analysis (LDA) which indicated that matrix based methods don't always perform better even when training samples are limited, we surmise 2D-LPP may meet the same limitation as 2D-LDA and propose a novel matrix exponential method to enhance the performance of 2D-LPP. 2D-MELPP is equivalent to employing distance diffusion mapping to transform original images into a new space, and margins between labels are broadened, which is beneficial for solving classification problems. Nonetheless, the computational time complexity of 2D-MELPP is extremely high. In this paper, we replace some of matrix multiplications with multiple multiplications to save the memory cost and provide an efficient way for solving 2D-MELPP. We test it on public databases: random 3D data set, ORL, AR face database and Polyu Palmprint database and compare it with other 2D methods like 2D-LDA, 2D-LPP and 1D methods like LPP and exponential locality preserving projections (ELPP), finding it outperforms than others in recognition accuracy. We also compare different dimensions of projection vector and record the cost time on the ORL, AR face database and Polyu Palmprint database. The experiment results above proves that our advanced algorithm has a better performance on 3 independent public databases.

Audit guideline for the Data consruction of GIS & Application case of a self-governing body (GIS Data구축 감리와 지자체 적용사례 분석)

  • Cheo, Yun-Suk;Park, In-Man;Lee, Jong-Yong;Nam, Shang-Kyou;Kim, Hyun-Jeong
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2002.03a
    • /
    • pp.71-76
    • /
    • 2002
  • 본 논문에서는 GIS Data구축 감리에 대한 내용정의와 수행방법 및 사례에 대해서 소개하고, 향후 GIS사업의 성공을 위한 GIS Data구축 감리의 역할에 대해서 설명한다.

  • PDF

China's Government Audit and Governance Efficiency of Companies: Analyses of Listed Companies Controlled By China's Central State-Owned Enterprises (중국의 정부감사와 기업의 관리효율성 : 중국 중앙기업 상장자회사 분석)

  • Choe, Kuk-Hyun;Sun, Quan
    • International Area Studies Review
    • /
    • v.22 no.4
    • /
    • pp.55-75
    • /
    • 2018
  • In China, different from the private enterprises or the locally-administered state enterprises, central state-owned enterprises generally spread over cornerstone industry which is greatly influenced by the public policy, which results in the objective existence of government influence in their productive activities. As the strategic resource, listed companies controlled by central state-owned enterprises, mostly distributed in the lifeblood and security of key industries. Therefore, listed companies controlled by central state-owned enterprises' governance efficiency play an important role in optimal allocation of state-owned assets, improve capital operation, improve the return on capital, and maintain state-owned assets safety. As the immune systems of national governance, the government audit strengthen the supervision of listed companies controlled by central state-owned enterprises in case of the loss of state-owned assets and significant risk events occur, to ensure that the value of state-owned assets. As an important component of national governance, government audit produced in entrusted with the economic responsibility of public relationship. Government audit can play an important role in maintaining financial security and corruption, and also improve listed company's accounting stability and transparency. While government audit can improve governance efficiency and maintain state-owned assets safety, present literature is scarce. Under the corporate governance theory and the economical responsibility theory, the thesis select data from 2010-2017 to verify the relationship between government audit and listed companies controlled by central state-owned enterprises' corporate performance. Results show that listed companies controlled by central state-owned enterprises are more likely to be audited by government of poor performance. Results also show that the government audit will have a promoting effect on listed companies controlled by central state-owned enterprises, and through to the improvement of the governance efficiency will enhance its companies' value. The results show that China's government audit has appealing role in accomplishing central state-owned enterprises to realize the business objectives and in promoting the governance efficiency.

An Operational Scheme of Software Configuration Management (소프트웨어 형상관리 운영 방안에 관한 연구)

  • 김태달
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.10a
    • /
    • pp.165-171
    • /
    • 1999
  • 형상관리는 프로젝트를 추진함에 있어 현실적으로 필수적인 관리 항목으로 인식할 필요성이 대두되고 있다. 그 이유는 프로젝트를 성공적으로 완료하기 위해서는 전체 프로젝트 공정을 통해 사전에 계획된 절차에 준하여 단계별로 어떻게 추진되고 있는지 추진과정을 추적, 확인되어야 하며, 또한 추진 결과에 있어 단계별로 어떤 결과물이 양산되고 있는지를 검증 및 확인하여야 하기 때문이다. 본 논문에서는 이러한 형상관리를 위해서는 프로젝트 수행 초기에 형상관리 계획을 입안하기 위한 형상관리 조직형태를 제안하며 작성된 계획서에 수록된 형상관리 조직을 운영함에 있어 필요한 형상관리활동의 주요 내용들에 대해 국내외 표준 및 지침에 대해 조사하였으며, 현실적으로 공공 프로젝트를 추진함에 있어 형상관리를 위한 필수관리 항목과 문서화 기준 및 이들 문서들간의 연관성에 대해 연구, 제안한다.

  • PDF

Configuration Management System for Rotorcraft Multi-Component Developement (회전익기 다품종부품 개발을 위한 형상관리 체계)

  • Kim, Hyun-Gi;Kim, Hwakbum;Kim, Sungchan
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.3
    • /
    • pp.35-43
    • /
    • 2012
  • Medium size rotorcraft consist of approximately 5,000 key components. The components must satisfy the target weight and performance requirement through optimization. Therefore a rotorcraft component has approximately 100 times higher unit cost for mass production than the equivalent of an automobile's, along with huge development cost. Configuration management consists of four main parts : configuration identification, configuration control, configuration audit, and data management. In development programme, configuration management is one of the methods to save development cost, and setting a well-structured configuration management system according to the Military Standard is an important factor in success of the programme. The paper proposes a configuration management system suitable for development of various multi-use components development and presents that the configuration management was performed successfully during dual-use component development programme using the established system.