• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.032 seconds

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Multi-objects detection using HOG and effective individual object tracking (HOG를 이용한 다중객체 검출과 효과적인 개별객체 추적)

  • Choi, Min;Lee, Kyu-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.894-897
    • /
    • 2012
  • We propose a effective method using the HOG (Histogram of Oriented Gradients) feature vector to track individual objects in an environment which multiple objects are moving. The proposed algorithm consists of pre-processing, object detection and object tracking. We experimented with six videos which have various trajectories and the movement. When occlusion between objects was occurred, we identified individual object by using center and predicted coordinates of moving objects. The algorithm shows 85.45% of tracking rate in the videos we experimented. We expect the proposed system is utilized in security systems which require the alalysis of the position and motion pattern of objects.

  • PDF

Design of a new family of multi wavelength two-dimensional codes for optical code division multiple access networks (다파장 OCDMA 네트웍에서의 새로운 2차원 코드의 설계)

  • 유경식;박남규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.31-41
    • /
    • 2000
  • It has been known that the optical code division multiple access (OCDMA) is a prominent future technology to support many simultaneous users and to increase transmission capacity of optical fiber. In this paper, we proposed the new construction of 2 dimensional code, which can be used as a codeword in temporal/wavelength OCDMA networks. New code family is obtained by extending the concept of Hamming correlation. All optical encoder and decoder for newly proposed code were also developed. In considering bit error ratio, we verified that new coding scheme outperforms conventional coding scheme by simulation. This system is applicable to asynchronous fast local area network, which needs a high security level and a flexible network configuration.

  • PDF

New Key Recovery System For IPSec(NKRS_IPSec) (IPSec을 위한 새로운 키 복구 시스템)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Hyeon, Eun-Sil;Kim, Tai-Yun
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.693-696
    • /
    • 2001
  • 최근 네트워크 보안에 대한 사용이 증가하고 있다. 그러나 암호는 본래 가지고 있는 키 관리의 어려움 때문에 여러 가지 문제가 발생할 수 있다. 이러한 암호의 사용이 야기하는 역기능을 해소하고 순기능을 조장하기 위하여 키 복구 개념이 도입되었다. 이러한 키 복구 방법 중 본 논문에서는 캡슐화 방식을 사용한다. 하지만 이 방식에서의 문제점은 키 협상 부분에서 키 복구에 대한 부분도 협상해야 한다. 그렇기 때문에 복잡한 키 협상 자정이 더욱 복잡해지며 마찬가지 이유로 SPD(Security Policy Database) 역시 복잡해진다. 그리고 키 복구에 대한 정보를 정해진 시간을 주기로 계속 보내야 하기 때문에 네트워크 소스 역시 많이 소비된다. 이러한 점을 해결하고자 본 논문에서는 TOS(Type Of Service)의 4bit를 이용하여 한 번의 키 복구 정보를 보내고, 사용자가 이러한 서비스를 자신이 사용하고자 할 경우에만 선택할 수 있도록 함으로써 해결하였다.

  • PDF

Key Management for Wireless Interworking (무선 네트워크 연동을 위한 키 관리)

  • Cho, Tae-Nam;Han, Jin-Hee;Jun, Sung-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.7-16
    • /
    • 2007
  • 3G telecommunication and wireless LAN provide various wireless communication services with their own native advantages and disadvantages. Currently WiBro service was developed to make up for the disadvantages of those services, and 3G-WLAN-WiBro underworking system which enables a user who uses triple-mode terminals to use those three networks was proposed. Even though each network adopts mutual authentication process between users and networks to provide security and accounting, they use different authentication protocols. In this paper, integrated authentication and key management protocol is proposed which makes use of previously used authentication information and supports safe roaming when a user moves from one network to another one under a same service provider on the 3G-WLAN-WiBro interworking network.

Laser Radar-Based Railroad Crossing Detection Device Developed for Crossing Security Device Integration (건널목 보안장치 통합화를 위한 레이저레이더기반 철도 건널목 지장물 검지장치 개발)

  • Baek, Jong-Hyen;Kim, Gon-Yop;Song, Yong-Soo;Oh, Seh-Chan;Kim, Yong-Kyu;Chae, Eun-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.471-478
    • /
    • 2013
  • In this paper, we have designed and implemented an obstacle detecting device based laser radar. It is an alternative to solve through problem analysis of that are currently operated safety equipment and status research of domestic railway crossing. It is target to improve the safety and reliability of the rail traffic through effective obstacle detection at crossing account for a large proportion of train accidents. suggest a system to overcome the problems caused by aging and limitation of existing safety equipment. Design a crossing obstacle detection device that utilizes laser radar scanner, proved this through performance evaluation and testing of the prototype.

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

  • Hostiadi, Dandy Pramana;Wibisono, Waskitho;Ahmad, Tohari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4176-4197
    • /
    • 2020
  • Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the correlation. This paper proposed a new model to measure the similarity between bot activities using the intersections-probability concept to define bot group activities called as B-Corr Model. The B-Corr model consisted of several stages, such as extraction feature from bot activity flows, measurement of intersections between bots, and similarity value production. B-Corr model categorizes similar bots with a similar target to specify bot group activities. To achieve a more comprehensive view, the B-Corr model visualizes the similarity values between bots in the form of a similar bot graph. Furthermore, extensive experiments have been conducted using real botnet datasets with high detection accuracy in various scenarios.

ObjectPeerWork : Framework for the Development of Peer-to-Peer Applications based on Shared Object Model (ObjectPeerWork : 공유 객체 모델 기반의 피어투피어 어플리케이션 개발을 위한 프레임워크)

  • Kang, Un-Gu;Wang, Chang-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.630-640
    • /
    • 2001
  • In this paper, we describe the design and implementation of ObjectPeerWork, which is a framework for the development of shared object model-based P2P(Peer-to-Peer) applications. The shared object model can prevent the computing power decrease on the way of resource management by incorporating the resource management function into resources themselves, and raise reliability on shared resources by improving the security problems. Also this model assures expandability by means of distributed component-based request broker manager and module container. The ObjectPeerWork based on this shared object model is a framework which makes the implementation of the enterprise information system possible, and makes distribution of the computing power and efficient resource management possible by improving the weakness in the general P2P model.

  • PDF

Active Warehouse Condition Management System based on RFID/USN Security (보안을 고려한 RFID/USN 기반의 능동형 창고 상태 관리 시스템)

  • John, Young-Jun;Choi, Yong-Sik;Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.122-127
    • /
    • 2006
  • RFID/USN 은 유비쿼터스 사회의 중요한 기반 인프라로서 고려되고 있다. 또한 다양한 연구를 통해 실용적인 접목이 시도 되고 있다. 특히 물류 시스템에서 물류의 입출 재고와 상태 관리를 위한 연구가 진행 중에 있으며 이는 물품 보관 단위인 파렛트(Pallet) 에 RFID 태그를 부착하여 입/출고시의 물품을 식별하고, Zigbee 무선 통신기능을 가진 센서 모듈에 의해 물품의 환경 상태 정보를 파악하는 형태로 이루어진다. 본 논문은 RFID/ USN 기반의 창고 상태 관리 시스템에서 상태정보 습득 과정의 보안적용을 위한 시스템을 구성을 주된 목적으로 한다. 부가적으로 상태정보 습득에 사용되는 이동형 단말장치의 기능에 대해서 제안한다. 창고 내에 배치되는 RFID 와 센서노드간의 적용 관계 또한 정의한다. 결과적으로 본 논문은 의사판단의 주체인 현장 관리자에 적절한 제어 정보의 제공과 센서의 동작을 제어하기 위한 RFID tag 보안 접근, 그리고 센서 노드 자체의 생존성 이라는 세 가지 관점의 절충점을 찾기 위한 시도로서 설계하였다.

  • PDF

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).