• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.05 seconds

A UPnP Proxy System for the Remote Control of Home Appliances (댁내 장치의 원격 제어를 위한 UPnP 프록시 시스템)

  • 김동희;임경식;이화영;안준철;조충래;박광로
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.337-350
    • /
    • 2004
  • Because of a security problem and not enough IPv4 address space, the home network has been made up of private network, and it has been separated from Internet. This fact prevents people in Internet from controlling and monitoring home appliances. So, this paper designs and Implements the UPnP Proxy System which offers functions for users to control and monitor home appliances. When users are in the outside of the home network, they do not know which devices were connected in the home network because the advertisement messages of UPnP devices would not be delivered to the outside of the home network. Also, users cannot access devices directly, and their control messages are not delivered into the home network. So, this paper designs and implements the UPnP Proxy System to solve these problems. The merit of the system is that users can control and monitor home appliances in realtime using presentation web documents with the HTTP push technology.

Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm (암호화 AES Rijndael 알고리즘 적용 유도탄 점검 장비)

  • Jung, Eui-Jae;Koh, Sang-Hoon;Lee, You-Sang;Kim, Young-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.339-344
    • /
    • 2019
  • In order to prepare for the rise of data security threats caused by the information and communication technology, technology that can guarantee the stability of the data stored in the missile test set is important. For this purpose, encryption should be performed when data is stored so that it cannot be restored even if data is leaked, and integrity should be ensured even after decrypting the data. In this paper, we apply AES algorithm, which is a symmetric key cryptography system, to the missile test set, and Encrypt and decrypt according to the amount of data for each bit of each AES algorithm. We implemented the AES Rijndael algorithm in the existing inspection system to analyze the effect of encryption and apply the proposed encryption algorithm to the existing system. confirmation of suitability. analysis of capacity and Algorithm bits it is confirmed that the proposed algorithm will not affect the system operation and the optimal algorithm is derived. compared with the initial data, we can confirm that the algorithm can guarantee data undulation.

Methodology on e-Navigation-Assisted Ocean Monitoring and Big Data Analysis (이내비게이션을 활용한 해양환경관측 및 빅데이터 분석방안)

  • LEE, GUAN-HONG;PARK, JAE-HUN;HA, HO KYUNG;KIM, DO WAN;LEE, WOOJOO;KIM, HONGTAE;SHIN, HYUN-JUNG
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.23 no.4
    • /
    • pp.204-217
    • /
    • 2018
  • This study proposes a cost-effective method to monitor coastal environments using e-Navigation-implemented domestic and international ferries, and to analyze big data of records such as wind, temperature, salinity, waves, and currents that are gathered through e-Navigation system. First, we present the concept and architecture of e-Navigation operation system based on the General Information Center on Maritime Safety and Security. Then, the marine observation system that can be applied to ferries operating in our nation's territory is discussed. Analytical methods, such as spatio-temporal mixed effects model, ensemble method, and meshfree method, in handling real-time big data obtained by the e-Navigation observing system are then explained in detail. This study will support the implementation of the Korean e-Navigation project that focuses on the safety of small vessels such as coasters and fishing vessels.

Design and Effect Analysis of Confederation Interface for ROK-US Combined Exercises (한미 연합연습 모의지원을 위한 다중 페더레이션 인터페이스 설계 및 효과분석)

  • Won, Kyoungchan;Jeong, Sukjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.498-506
    • /
    • 2018
  • Recently, the US commanded a wargame simulation system of a combined ROK-US exercise with single federation. However, after the OPCON transfer, many limitations to the single federation have been cited such as security policies and information protection. We suggest a hierarchical federation as a way to overcome these problems. Regarding HLA rules, the participants use the same FOM and RTI in single federation. There are limitations to implement CI in applying heterogeneous FOMs and RTIs in current single federation. Therefore, we propose implementing CI with heterogeneous FOMs and RTIs in a hierarchical federation. This system overcomes the weaknesses of the system structure, which is a disadvantage of the single federation. In the federation test, we can apply heterogeneous FOMs and RTIs and achieve similar performance to the current combined exercise simulation. In conclusion, ROK should lead the simulation system of combined exercises using the CI after the OPCON transfer.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Worker Location Tracking System of Shipyard using Power Line Communication and Beacon (전력선 통신과 비컨을 활용한 선박 건조 현장의 작업자 위치 추적 시스템)

  • Taewoong Hwnag;Young-Doo Lee;Ki-Woong Park;In-Soo Koo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.41-49
    • /
    • 2024
  • This paper discusses the modeling and implementation of a worker location system at a shipbuilding site. The importance of worker location in an industrial environment is highlighted as a critical element in the prevention of industrial accidents. The paper presents a worker tracking system that integrates power line and beacon communication to accurately track worker position. Through experiments, the paper demonstrates how to monitor the changes in worker location based on different scenarios and how to access the status of worker location using the manager's web service. The paper can be used for the design of a system that will provide real-time location information to safety managers for the improvement of worker safety management.

A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field (국방 분야 인공지능 기술 접목에 따른 교육훈련 데이터 가명처리 방법론에 관한 연구)

  • Hyunsuk Cho;Sujin Kang;Dongrae Cho;Yeongseop Shin
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.

  • PDF

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.