• 제목/요약/키워드: illegal activities

검색결과 122건 처리시간 0.027초

리눅스 기반 침입 방지를 위한 로그 분석 방법 연구 (Methodology of Log Analysis for Intrusion Prevention based on LINUX)

  • 임성화;이도현;김점구
    • 융합보안논문지
    • /
    • 제15권2호
    • /
    • pp.33-41
    • /
    • 2015
  • 보안성 향상을 위한 안전한 리눅스 시스템은 자료의 불법적인 유출과 위 변조를 막고 사용 원칙에 위배되는 행위의 추적을 위한 감사(audit)능력을 가지고 있어야 한다. 또한 시스템 관리 및 운영자의 책임과 사용자의 행위를 명확히 구분 지울 수 있는 로그관리가 반드시 이루어 져야 할 것이다. 본 논문에서는 리눅스 시스템의 보안 로그를 분석하여 침입차단 및 탐지에 활용하는 방법을 제안하였다. 이를 통해 시스템의 침입차단 상태와 침입탐지 상태, 그리고 파일 시스템의 무결성 변화를 실시간 확인하여 신속히 시스템의 문제를 해결할 수 있어 시스템의 신뢰성 향상에 크게 기여하게 될 것이다.

중국 어선의 불법조업에 대한 우리나라 수산자원의 보호방안 (A Study on the Protection Plan of Fisheries Resources against Illegal Fishing of Chinese Fishing Vessel)

  • 정봉규
    • 수산해양교육연구
    • /
    • 제28권6호
    • /
    • pp.1549-1560
    • /
    • 2016
  • Today, all the countries of the world newly recognize importance of sea, which are focused on efforts for security of marine territory and fishes resources. Many of the coastal state, to strengthen the rights of their own country EEZ, marine survey and continental shelf development, travels through such maritime jurisdiction in the territorial sovereignty and the EEZ overlaps, deepening complex interests between neighboring countries cooperation activities of the fierce competition, the domestic and foreign been has been carried out. Under such circumstances, is devastated coastal of China, our territorial waters and EEZ has been violated more and more, in spite of the powerful crackdown maritime public power, illegal fishing more resistance intensified. They tend to be gradually organization, collectivization and atrocities. Currently, illegal fishing of Chinese fishing boats in the West Sea of Korea, including the waters near Yeonpyeong Island is prevalent as operating in the coast of the country. Furthermore regrettable one is illegal on a scale and the situation where South Korea of scale of damage caused by it have not been accurately grasp of the operation, but that there is damage of Korea official duty enforcement to crack down the increase to illegal operations year after year have occurred. Violent, illegal fishing of Chinese fishing boats, in order to eradicate the operations of insane at our sea, we investigated to the infringement situations of fisheries resources by multiple fields. each of problems presenting a specific preservation plan in accordance with the function and role of the maritime enforcement organization and other government organization the point. at the same time we will try to seek measures such as a scheme that it is possible to increase the capacity.

화재안전기준(NFSC)에 따른 기계분야 소방설비 설계, 시공, 감리 유지관리 업무 표준화 방안에 대한 제안 (Proposals On The Designe, Construction, Management Maintenance standardization Method Of Mechanical Field Fire Protection System By NFSC)

  • 김성일;강경식
    • 대한안전경영과학회지
    • /
    • 제19권3호
    • /
    • pp.11-17
    • /
    • 2017
  • The study seeks to cooperate with the investigation of a fire investigation based on public-private partnership. Fire protection systems provide a wide variety of viewpoints from the perspectives of design, construction, management, maintenance, maintenance and maintenance systems at a particular point in time, construction, management, and maintenance systems. What is controversial is that there are illegal activities such as illegal activities of the Patent Office, misconduct of construction work and unreasonable construction of construction works.As a theoretical framework, the present study identified the four key elements of a successful disaster response system : responsiveness, control, professionalism, and bias.

연안 어장에서의 불법 조업 어선의 탐지, 식별 및 감시 시스템 개발 (Detection, Identification and Surveillance System Development of Illegal Fishing Vessels in Inshore Fishing Ground)

  • 이대재;김광식
    • 한국수산과학회지
    • /
    • 제37권4호
    • /
    • pp.337-344
    • /
    • 2004
  • A real-time surveillance system of the inshore fishing ground was constructed to identify and detect discrete targets, such as illegal fishing vessels. This paper describes measurements made with a combination of sensors, such as radar, CCTV camera, and GPS receivers, for monitoring the fishing activity of small vessels within the fishing limit zones of the inshore waters. The CCTV camera system was used to confirm detection and to classify the type of target. The location of legal vessels distributed in coastal waters was acquired from each GPS system of ships connected to commercial satellite communication network. The surveillance system was networked via LAN to one host PC with the use of electronic navigational charts (ENC) and a radar link. Radar Target Extractor (RTX) for radar signal processing can be remotely accessed and controlled on existing PC via the internet, from anywhere, at any time. Results are presented that demonstrate the effectiveness of the newly constructed fisheries monitoring system for conducting continuous surveillance of illegal fishing vessels in the inshore fishing ground. The identification of illegal fishing vessels was achieved by comparing radar positions of illegal fishing vessels exceeding the warning limits in the surveillance area with GPS position reports transmitted from legal fishing vessels, and the illegal fishing vessels were marked with red symbols on the ENC screen of a PC. The methods to track the activities of all vessels intruding or leaving the fishing limit zones also were discussed.

불법저작물 유포자 행위분석 프로파일링 기술 연구 (Research on illegal copyright distributor tracking and profiling technology)

  • 김진강;황찬웅;이태진
    • 인터넷정보학회논문지
    • /
    • 제22권3호
    • /
    • pp.75-83
    • /
    • 2021
  • IT 산업의 발달과 문화 활동의 증가로 저작물에 대한 수요가 증가하고 온라인 환경에서 쉽고 편리하게 이용할 수 있다. 이에 따른 저작물 복제 및 유통이 용이하여 저작권 침해가 심각하게 일어나고 있다. 일부 특수한 유형의 온라인 서비스 제공업체(OSP)는 저작권을 보호하기 위해 필터링 기반 기술을 사용하기만 쉽게 우회할 수 있으며, 모든 불법 저작물을 차단하기에는 한계가 있어 저작권을 보호하기는 갈수록 힘들어지고 있다. 최근 불법저작물 유포자 대부분은 특정 소수이며, 다수 OSP와 다수 ID를 통해 불법저작물을 유포하여 이득을 취한다. 본 논문에는 불법저작물을 바탕으로 주요 분석대상인 대량의 불법저작물 유포자인 대량 유포자(Heavy Uploader) 프로파일링 기술을 제안한다. 이 프로파일링 기술은 불법저작물 전반에 대한 정보가 담긴 특징(Feature)을 생성하고 주요대량 유포자를 식별한다. 이 중 동일인으로 추정되는 대량 유포자를 식별하기 위해 클러스터링 기술을 사용한다. 또한, 불법저작물 유포자 추적과 행위분석을 통해 우선순위가 높은 대량 유포자를 분석할 수 있다. 향후, 대량의 불법저작물을 유포하는 대량 유포자를 식별하고 차단한다면 저작권 피해를 최소화할 것으로 기대한다.

IUU어업에 대한 국제적 규제 동향과 우리나라의 대응 방안 (International Trend of Regulation on IUU Fishing and Countermeasures)

  • 이광남;서병귀
    • 수산해양교육연구
    • /
    • 제15권1호
    • /
    • pp.81-100
    • /
    • 2003
  • It is undeniable that IUU Fishing are threatening so many legal fishermen' economic livelihood, negatively impact on conservation and protection of the fishery stock and ecosystem itself. Especially, negative impact of IUU Fishing resulted from the increasing fishery activities on the high seas. The Korea case of Coastal and Off-shore Fisheries, difficulties in conserving and controlling the fishery stock was brought about. Simultaneously, it is the fact that there are so many damage such as the reduction of fish Stock management program's effect, dissatisfaction of legal fishermen, over-exploiting of fish stock. Related with this kind of problem, FAO had adopted "International Plan of Action to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated Fishing(2001)". From this reason, Korea also needs to make actual efforts to prevent IUU Fishing. i.e. each nation should develop Korea action plan by Feb. 2004 and impliment it, report on implementation toward FAO. This Paper will review the definition of the IUU stipulated by "International Plan of Action on Illegal, Unreported and Unregulated Fishing" and study Korea cases of the IUU fishing. Finally, the analysis of Korea's implementation will be done, centering around the contents stated on the International Action Plan. The significance of this paper is to grope the political countermeasures against international movement of the IUU fishing prevention.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

국내 소프트웨어 산업 지원 방안에 대한 연구

  • 최재규;김재영;지경용
    • 기술경영경제학회:학술대회논문집
    • /
    • 기술경영경제학회 2003년도 제23회 하계학술발표회 논문집
    • /
    • pp.75-89
    • /
    • 2003
  • In recent, internal IT industries are suffering a severe pain due to stagnancy of business activities. Particularly, internal software industries are losing international competitiveness. As to solve this problems, the paper is studied about political plans for supporting internal software industries. The paper has two important topics which are enlarged plan of domestic demand and supplement of the expert personnel in internal software industries. The paper consists of three parts: one is plan which prevents for using illegal softwares, another is problems which is related to publication of expert programming books, and the other is If educations of governmental leading. The paper suggests realistic price of softwares, powerful inspection about illegal softwares as governmental leading, and continuous public relations for changing consumers'awareness.

  • PDF

북한의 불법 해상활동에 대한 해양차단에 관한 연구 (Maritime Interdiction against the DPRK's Illicit Maritime Practices)

  • 김정수
    • Strategy21
    • /
    • 통권46호
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.