• Title/Summary/Keyword: leakage detection

Search Result 458, Processing Time 0.024 seconds

Implementing a Dedicated WIPS Sensor Using Raspberry Pi (라즈베리파이를 이용한 전용 WIPS 센서 구현)

  • Yun, Kwang-Wook;Choi, Suck-Hwan;An, Sang-Un;Kim, Jeong-Goo;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.397-407
    • /
    • 2017
  • Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take advantage of the vulnerabilities created by a wireless AP (Access Point). Public organizations and companies have gradually selected the WIPS (Wireless Intrusion Prevention System) to block wireless security threats and protect the internal network. However, it is very costly for other organizations and companies to introduce the WIPS solution. This paper proposes implementing a WIPS Sensor by using Raspberry Pi to reduce these costs and to block the various wireless LAN security threats. This implementation would protect corporate information and provide consistent services at a relatively reasonable price.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.

Optimization of Fugitive Dust Control System for Meteorological Conditions (기상조건별 비산먼지 관리체계 최적화 연구)

  • Kim Hyun-Goo
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.21 no.6
    • /
    • pp.573-583
    • /
    • 2005
  • Fugitive dust, which is emitted in the ambient air without first passing through a stack or duct designed to control flow, is frequently generated by means of wind erosion from storage yards at Pohang Steel Wokrs. The size distribution of fugitive dust is mostly in the range of coarse particulate which is deposited as soon as emitted and less harm to human health; however $20\%$ of fugitive dust contains PM 10 known as one of most harmful airborne pollutant. Consequently, effective control and reduction of fugitive dust is strongly requested by the local society, but it is not easy so far because the generation and dispersion of fugitive dust highly depends on meteorological conditions, and it being occurred for irregularity. This research presented a fugitive dust control system for each meteorological condition by providing statistical prediction data obtained from a statistical analysis on the probability of generating the threshold velocity at which the fugitive dust begins to occur, and the frequency occurring by season and by time of the wind direction that can generate atmospheric pollution when the dispersed dust spreads to adjacent residential areas. The research also built a fugitive dust detection system which monitors the weather conditions surrounding storage yards and the changes in air quality on a real-time basis and issues a warning message by identifying a situation where the fugitive dust disperses outside the site boundary line so that appropriate measures can be taken on a timely basis. Furthermore, in respect to the spraying of water to prevent the generation of fugitive dust from the storage piles at the storage yard, an advanced statistical meteorological analysis on the weather conditions in Pohang area and a case study of fugitive dust dispersion toward outside of working field during $2002\∼2003$ were carried out in order to decide an optimal water-spraying time and the number of spraying that can prevent the origin of fugitive dust emission. The results of this research are expected to create extremely significant effects in improving surrounding environment through actual reduction of the fugitive dust produced from the storage yard of Pohang Steel Works by providing a high-tech warning system capable of constantly monitoring the leakage of fugitive dust and water-spray guidance that can maximize the water-spraying effects.

Implementation of RTD-2000 Based Waterworks Pipe Network Monitoring System using Internet Map Service (범용지도를 이용한 RTD-2000 기반의 상수도 관망 모니터링 시스템의 구현)

  • Park, Jun-Tae;Hong, In-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1450-1457
    • /
    • 2011
  • Currently most of leak detection monitoring systems use digital maps with paying royalties, and this increases the cost of system construction and financial burdens on local self-governing bodies that manage such systems. Moreover, they have inefficiencies in repair and maintenance, functional expansion, and compatibility with other systems. Thus, this study developed a waterworks pipe network monitoring system that pursues low cost and high efficiency using general-purpose maps on the Internet such as google maps. As this system uses highly compatible free maps, it costs less in construction and its hardware requirements are lower than existing systems, and consequently, overall monitoring performance is enhanced and the cost of construction goes down sharply. This study also proposed a method for pipeline DB construction, which can be started together with the construction of the monitoring system, in order to improve the field applicability of the system.

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Kim, Eung-Sik;Kim, Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2433-2440
    • /
    • 2009
  • Whole system and network for supply of electric power and electricity safety are essential element. Electricity safety technology need rating for product and research about certification as product development that is done electric power u-IT cotton flannel mixed with development of u-IT, u-City base technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power u-IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication module about function of product for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in electric leakage, high voltage, Arc, fire detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

Adverse Effects on Crops and Soils Following an Accidental Release of Hydrogen Fluoride and Hydrofluoric Acid

  • Kang, Dae-Won;Kim, Hyuck-Soo;Kunhikrishnan, Anitha;Kim, Da-In;Lee, Seul;Park, Sang-Won;Yoo, Ji-Hyock;Kim, Won-Il
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.49 no.6
    • /
    • pp.651-654
    • /
    • 2016
  • A number of accidents relating to highly toxic hydrogen fluoride (HF) or hydrofluoric acid (HA) release have occurred over fast few decades in Korea. Thus, this study was conducted to investigate the fluoride (F) concentrations in paddy soil and brown rice from 2 different areas where the soils were exposed to HF and HA. In the first case, the HF leakage accident that occurred in 2012 affected the surrounding soils and crops and consequently, crops (rice) affected by HF were unavailable for forage even though F did not accumulate in the soil. For example, at the time of accident, F concentrations in brown rice samples were $33.0-1,395mg\;kg^{-1}$, while F concentrations in soil samples were $155-295mg\;kg^{-1}$ which were less than the Korean standard guideline values of $400mg\;kg^{-1}$. However, after a year, F concentrations in brown rice were observed below the detection limit ($1mg\;kg^{-1}$), although F concentrations in soils were similar with those in 2012. Also, large amounts of wastewater discharges containing HA occurred in 2013 and some agricultural soils exceeded the Korean standard guideline values for F ($400mg\;kg^{-1}$), but soil-plant F transfer was not observed. In conclusion, it was observed that soil to plant transfer of F is unlikely although HF and HA as gas or liquid form can cause direct damage to plants.

The danger and vulnerability of eavesdropping by using loud-speakers (스피커를 이용한 도청 위험에 대한 연구)

  • Lee, Seung Joon;Ha, Young Mok;Jo, Hyun Ju;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1157-1167
    • /
    • 2013
  • The development of electronic devices has recently led to many problems such as personal information rape and leakage of business information. Conventional loud-speakers have been generally used to output devices. It can be, however, operated as a micro-phone which was abused as a means for eavesdropping since the speaker and microphone have basically the equivalent structure. Most importantly, the general peoples are not aware of the approaching danger about using speaker as microphone. And, traditional eavesdropping detection equipment does not check the attack. In this paper, we demonstrate that there is a serious danger and vulnerability in using loud-speakers since they can be used as eavesdropping devices.

A Study on the Method of preventing from Reduction of AF Track Circuit Signal Current on a Ferroconcrete Roadbed (철근콘크리트 도상에서 AF 궤도회로 신호전류 저감방지대책에 관한 연구)

  • Hong, Hyo-Sik;Yoo, Kwang-Kiun;Rho, Sung-Chan
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.5
    • /
    • pp.500-503
    • /
    • 2010
  • Until now, the track circuit with railroad which is a part of an electrical circuit wad used only for the detection of the train location, but as train speed is up to be higher, in order to overcome the limits of ground signal system the railway signal system has changed from the ground signal system to a cab signal system. The power source of the track circuit has also changed from a direct current or a high voltage impulse to an alternating current with high frequency which is a part of the audio frequency. To improve the maintenanability and according to the environment condition, the railway roadbed is rapidly changed to the ferroconcrete roadbed. In case of a track circuit to use an alternating current with high frequency as power source at a ferroconcrete roadbed, the characteristic of the track circuit is brought on a change from a loss of the magnetic combination instead of a leakage current from electric insulation which was caused by the reinforcing iron pod with lattice shape for durability. This paper is shown the influence and the loss of the signal current at AF track circuit on a ferroconcrete in the simulation sheets and presented a proposal for the preventive method from reduction of signal current.