• Title/Summary/Keyword: security event

Search Result 398, Processing Time 0.027 seconds

The comparative study between Korea's S&T security provision and China's (중국의 과학기술보안규정과 대한민국 국가연구개발사업 연구보안제도 정책과의 비교 연구)

  • Kang, Sun Joon;Won, Yoo Hyung;Kim, Min Ji
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.2
    • /
    • pp.875-905
    • /
    • 2018
  • Recently China's science and technology development is accelerating, and some technologies have the world's best technology. With the rapid development of science and technology, China has been deeply aware of the importance of science and technology, and many efforts are being made to legislate security regulations to protect their technologies. Korea and other countries are also interested in research security, and research and development cooperation with China is also on the rise. In this paper, we derived some implications by comparing and analyzing China's science and technology security regulation and Korea's national R&D project management regulations. China is also enacting science and technology security regulations as a subordinate to the laws and regulations of science and technology. However, it should be reflected in future legislation that the difference from Korea is composed of separate independent regulations. In particular, the fact that the science and technology security regulations have been enacted separately may be a hint that can be reflected in the nation's future legislation processes. In this paper, major contents of the science and technology security regulations, points to division of knowledge property into scientific and technological cooperation or security tasks, designation of regulations on the characteristics of research security guidelines, and operation of individual national security agencies In addition, in the event that the contents of the related statutes, confidentiality provisions, and import and import control are recorded in this paper, and the results of the joint R&D project are not utilized, or the technology transfer is not carried out.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

A Study on Aviation Security System on Airport (국제민간항공협약의 표준과 관행을 고려한 공항보안체계의 문제점고찰)

  • Yoo, Kwang-Eui
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.165-182
    • /
    • 2004
  • According to the Annex 17 to the Convention on International Civil Aviation, an appropriate authority of each contracting state has to define and allocate tasks and coordinate activities between the departments, agencies and other organizations of the State, airport and aircraft operators and other entities concerned with or responsible for the implementation of various aspects of the national civil aviation security programme. It is generally recognized that the three major parties responsible for the aviation security at an airport are appropriate government departments, airport operator and airlines. The airlines are the beneficiaries of security activities as well as the provider of security activities. So, their responsibilities have been critical in protecting civil aviation from unlawful interferences. The airport has to take leading role in implementing security tasks at airport area because the airport operator is the provider of airport facilities and services to its customer and the security activities belong to its services. The government has the responsibilities not only for establishing regulatory system but also for oversighting the implementation of aviation security activities. The paper is to review the revision of aviation security regulation and the changes of aviation security responsibilities, and costs and task assignment in Republic of Korea after September 11 event. The responsibilities, tasks and costs assigned to airlines, airport operators and government are introduced and evaluated in terms of economic fairness, effectiveness and efficiency of aviation security activities. The drawbacks of new legal system are pointed out and the suggestions to remedy them are proposed as conclusions.

  • PDF

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

A Study of Basic Design Method for High Availability Clustering Framework under Distributed Computing Environment (분산컴퓨팅 환경에서의 고가용성 클러스터링 프레임워크 기본설계 연구)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.17-23
    • /
    • 2013
  • Clustering is required to configure clustering interdependent structural technology. Clustering handles variable workloads or impede continuity of service to continue operating in the event of a failure. Long as high-availability clustering feature focuses on server operating systems. Active-standby state of two systems when the active server fails, all services are running on the standby server, it takes the service. This function switching or switchover is called failover. Long as high-availability clustering feature focuses on server operating systems. The cluster node that is running on multiple systems and services have to duplicate each other so you can keep track of. In the event of a node failure within a few seconds the second node, the node shall perform the duties broken. Structure for high-availability clustering efficiency should be measured. System performance of infrastructure systems performance, latency, response time, CPU load factor(CPU utilization), CPU processes on the system (system process) channels are represented.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

The role of the People's Liberation Army during the Korean War and Prospect of China's Role in the event of Contingency in North Korea (6.25 전쟁 시 중공군의 역할과 북한 유사시 중국의 역할 전망)

  • Choi, Kyung-Sik
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.169-238
    • /
    • 2010
  • The year 2010 is the 60th anniversary commemorating the Korean War. China intervened in the Korean War with the logics such as "To Resist the U.S.'s Aggression and Aid North Korea," "Save Endangered Home & defend Nation," and "If the Lips Are Gone, the Teeth Will Be Exposed to the Cold or If One of Them Falls, the Other is in Danger." However, China had a deep and long connection with North Korea through 1st Chinese Civil War, war against Japan imperialism, and 2nd Chinese Civil War. China has consulted with Kim Il-sung on his invasion of South Korea at the initial stage of development and played a casting vote role in the execution of the invasion plan. During the Korean War, the PLA supported the North Korea's regime by its action, and made the Korea Peninsula divide into two semi-permanently. Even after the war, China continues to maintain relations with North Korea by helping North Korea build the Kim Il-sung's Kingdom. Currently, whenever any issue related to North Korea rises in the international society, China definitely gets involved in those issues and exercises its power. Conditionally 'either armed aggression or, and wartime' in North Korea, China would follow the "Clause of Military Auto Intervention." In addition, China is very likely to establish refugee camps for North Koreans in the Northeastern-Three-Province and to provide rear bases or guerrilla camps for pro-Chinese sects. Furthermore, voluntarily playing a role as spokesman of North Korean Regime in the international society, China will exercise enormous influence on the reunification of the Korean Peninsula.

  • PDF

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

RFID Ubiquitous Public Information Documental Administration System construction and Security research (RFID 유비쿼터스 영구기록물관리시스템 구축과 보안 연구)

  • Jang, Young-Sang;Lee, Sung-Yooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.111-121
    • /
    • 2009
  • Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through. research of this treatise.