• Title/Summary/Keyword: network protection system

Search Result 545, Processing Time 0.025 seconds

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC (NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석)

  • 김남기;박종오;김지영
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.57-65
    • /
    • 2003
  • A protection profile is the required specification document by consumer groups to specify what security purpose they would like to have in their specialized products. A protection profile assumption is the document that specifies consumer environment in the physical, artificial, network perspective and the contents of intended usage which include usage limitation, the value of latent asset, and additional applications for a TOE (Target of Evaluation). In this paper, we compare the assumptions of the NSA IDS PP and the IDS PP for government.

  • PDF

Development of the Digital Protection System for Customer Substation (수용가 변전소의 디지탈 보호 계전 시스템 개발)

  • Kim, Y.N.;Heo, N.J.;Baek, J.H.;Kim, J.K.;Kim, H.Y.;Lee, J.;Kim, I.S.
    • Proceedings of the KIEE Conference
    • /
    • 1992.07b
    • /
    • pp.629-632
    • /
    • 1992
  • This paper deals with Digital Protection System which has been developed at R & D Center of HYUNDAI Electrical Engineering Co.. This system consists of supervisory control part and digital measuring are protection units. RS-485 network connects the units to supervisory control part. This paper go into detail about the specification of each part and the analysis results of digital measuring and protection unit.

  • PDF

Development of a Loss of Mains Detection Method for Distributed Resources (분산 전원의 고립 운전 검출 기법 개발)

  • Jang, S.I.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.42-45
    • /
    • 2001
  • The islanding protection for distributed resources (DR) becomes an important and emerging issue in power system protection since the distributed generator installations are rapidly increasing and most of the installed systems are interconnected with distribution network. In order to avoid the negative impacts on distributed network resulting from islanding operations of DR, it is necessary to detect the loss of mains (LOM) effectively. This paper presents a new LOM detection method using the rate of change in total harmonic distortion (THD) of current. The proposed method effectively detects LOM of the DR unit operating in parallel with the distribution network. We also verified the efficiency of the proposed method using the radial distribution network of IEEE 34 bus model.

  • PDF

Comparison of Honeypot System, Types, and Tools

  • Muhammad Junaid Iqbal;Muhammad Usman Ahmed;Muhammad Asaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.169-177
    • /
    • 2023
  • Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

A Study on Analysis of Propagation Speed of Power Frequency by Generation Drop (발전기 탈락에 따른 주파수의 전파속도 해석에 관한 연구)

  • Kim, Hak-Man;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.4
    • /
    • pp.295-300
    • /
    • 2014
  • The frequency is an important operating parameter of a power system. There is an increasing importance of constant monitoring of frequency to achieve stable power supply by WAMS(wide area monitoring system) and FNET(Frequency Monitoring Network). This paper is part of development of a network-based frequency monitoring and failure prediction system for wide-area intelligent protection relaying. In this paper, analysis of propagation speed of power frequency by generation drop using the PSS/E was carried out. For dynamic analysis, the 11 metropolitan areas offices of KEPCO divided into five groups of Seoul, Gangwon, Chungcheong, Honam, and Yeongnam group, study was performed.

Fault Detection Relaying for Transmission line Protection using ANFIS (적응형 퍼지 시스템에 의한 송전선로보호의 고장검출 계전기법)

  • 전병준
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.9 no.5
    • /
    • pp.538-544
    • /
    • 1999
  • In this paper, we propose a new fault detection algorithm for transmission line protection using ANFIS(Adaptive Network Fuzzy Inference System). The developed system consists of two subsystems: fault type classification, and fault location estimation. We use rms value, zero sequence component and positive sequence of current, and then using learning method of neural network, premise and consequent parameters are tuned properly. To prove the performance of the proposcd system, generated data by EMTP(Electr0- Magnetic Transient Program) sin~ulationi s used. It is shown that the proposed relaying classifies fault types accurately and advances fault location estimation.

  • PDF

Performance Analysis of Security Management model for Unity Control (통합관제 보안관리모델의 성능분석)

  • 서정은;윤병민;허창우;김윤호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.908-911
    • /
    • 2003
  • In this study, the security system (Firewall and IDS) was installed in high speed information network and analyzed for a change in the speed of data transfer and the possibility of invasion. The selection of appropriate system, efficient detection and protection and surveillance method were suggested and analyzed. In order to do experiments, an experimental model was comprized to analyze the parameters that was affected by the detection and protection system in network. This will give a standard how much we can pull up the security system maintaining the network speed.

  • PDF

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.