• 제목/요약/키워드: information security system

Search Result 6,599, Processing Time 2.809 seconds

An Accuracy Improvement on Acquisition Time of SCADA RTU Status Event (SCADA RTU 상태이벤트 취득시간 정확도 개선)

  • Lee, Ju-Heon;Lee, Sang-Joong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.3
    • /
    • pp.332-341
    • /
    • 2013
  • SCADA RTU is a remote control unit equipped in substations for automatic operation of a power system. The RTU monitors and measures the operation status of remote substations to transmits the signals to upper SCADA system and receives control command signals from dispatch center to actuate corresponding apparatus. The RTU receives the standard time from GPS receiver to synchronize the times for all devices and acquires the status event of power apparatus using DIM. Without the time synchronization between GPS and RTU, stable operation of the power system and accurate analysis of the system fault are impossible due to the time error of SOE. In this paper, a test is performed to identify if the operation time of SCADA RTU DIM coincides with the standard time. And we tried to find the reason of error, to minimize the time discrepancy. Through this study, RTU operation time could be synchronized with the standard time within 10[ms] to improve the reliability of SOE data.

Optical Visual Cryptography based on Binary Phase Exctraction JTC (BPEJTC를 이용한 광 비쥬얼 크립토그래피)

  • 이상이;이승현
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.589-597
    • /
    • 2003
  • Visual cryptography made it possible to decrypt thresholding scheme with not digital system but human vision system. This method, however, has some limit in it. Optical visual cryptography was proposed which used laser instead of human eyesight. As a result, it was possible to adapt cryptography to optical system. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. These problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. This paper analyzes the level of noise and the security characteristics for optical visual cryptography in terms of frequency based on joint transform correlator.

Development of Loss Prevention System WatchDog for Safe Saving and Management of Edited E-mail Attachment (전자 메일첨부 편집파일의 안전한 저장과 관리를 위한 분실 방지 시스템 WatchDog 개발)

  • Hong, Jun-Hu;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1059-1064
    • /
    • 2018
  • Many users feel a great pain owing to losing edited files. It is very serious loss in time and money. This problem occurs because email attachments are edited in 'Inbox' and the compute immediately shuts down with 'Save'. This is caused by the illusion that the 'save' in a temporary folder is saved to a secure hard disk. Our thesis proposes a loss-prevention system WatchDog for safe storage and folder management of the e-mail attachments. The proposed system operates a warning window pop-up when we 'Open(O)' and 'Save' the attachment. In addition, convenient folder management plans for safe copying and movement are shown through example programs.

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

A Design and Implementation of a Secure Internet Phone System (인터넷 폰 보안 시스템의 설계 및 구현)

  • Park, Jae-Hui;Kim, Il-Min
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.157-162
    • /
    • 2002
  • In this study, the secure Internet phone system using digital signature and data encryption with DES algorithm and EDE algorithm was implemented. And new key distribution algorithm was suggested utilizing the Diffie-bellman algorithm. For reducing processing time, a table combined with S-BOX and P-BOX of the DES was used. The proposed system was implemented with Java and the results showed the processing time using DES algorithm for encryption was 1.46 seconds and that of EDE algorithm was 3.25 seconds respectively. This system can be applied to Protect the copyright of sound products and data using internet.

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.

A Study on Methods for the Domestic Diffusion of Intelligent Security Project : With a Focus on the Case of Smart City Integrated Platform (지능형 방범 사업의 국내 확산 방안 연구 : 스마트시티 통합플랫폼을 대상으로)

  • Shin, Young-Seob;Han, Sun-Hee;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.474-484
    • /
    • 2019
  • In this age, where the social environment is changing rapidly and unpredictably, interest in safety from crime is increasing in Korean society. As the desire to live a life free from the fear of crime increases, interest in the construction of safe cities is also rising nationwide. To meet the national demand, the Korean government is promoting a project to link public disaster safety systems by involving municipalities, 112, 119, and other emergency services and institutions through the Smart City Integrated Platform in order to construct a smart safety net. This study investigates the linking of theSmart City Integrated Platform and theIntelligent Security Project. The results are as follows. 1. The linkage's objective is clear. 2. The system sector can provide information to accident-related organizations. 3. The scenario area can be expanded to a crime-prevention sector, and a long-term urban information integration infrastructure can be created. 4. Product testing is enabled by a smart city road map and through continuous consultation with relevant organizations. 5. Project diffusion to other local governments can be promoted with the continued addition of commercial products.

A Study on Efficient AI Model Drift Detection Methods for MLOps (MLOps를 위한 효율적인 AI 모델 드리프트 탐지방안 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.17-27
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology develops and its practicality increases, it is widely used in various application fields in real life. At this time, the AI model is basically learned based on various statistical properties of the learning data and then distributed to the system, but unexpected changes in the data in a rapidly changing data situation cause a decrease in the model's performance. In particular, as it becomes important to find drift signals of deployed models in order to respond to new and unknown attacks that are constantly created in the security field, the need for lifecycle management of the entire model is gradually emerging. In general, it can be detected through performance changes in the model's accuracy and error rate (loss), but there are limitations in the usage environment in that an actual label for the model prediction result is required, and the detection of the point where the actual drift occurs is uncertain. there is. This is because the model's error rate is greatly influenced by various external environmental factors, model selection and parameter settings, and new input data, so it is necessary to precisely determine when actual drift in the data occurs based only on the corresponding value. There are limits to this. Therefore, this paper proposes a method to detect when actual drift occurs through an Anomaly analysis technique based on XAI (eXplainable Artificial Intelligence). As a result of testing a classification model that detects DGA (Domain Generation Algorithm), anomaly scores were extracted through the SHAP(Shapley Additive exPlanations) Value of the data after distribution, and as a result, it was confirmed that efficient drift point detection was possible.

On-Road Car Detection System Using VD-GMM 2.0 (차량검출 GMM 2.0을 적용한 도로 위의 차량 검출 시스템 구축)

  • Lee, Okmin;Won, Insu;Lee, Sangmin;Kwon, Jangwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2291-2297
    • /
    • 2015
  • This paper presents a vehicle detection system using the video as a input image what has moving of vehicles.. Input image has constraints. it has to get fixed view and downward view obliquely from top of the road. Road detection is required to use only the road area in the input image. In introduction, we suggest the experiment result and the critical point of motion history image extraction method, SIFT(Scale_Invariant Feature Transform) algorithm and histogram analysis to detect vehicles. To solve these problem, we propose using applied Gaussian Mixture Model(GMM) that is the Vehicle Detection GMM(VDGMM). In addition, we optimize VDGMM to detect vehicles more and named VDGMM 2.0. In result of experiment, each precision, recall and F1 rate is 9%, 53%, 15% for GMM without road detection and 85%, 77%, 80% for VDGMM2.0 with road detection.