• Title/Summary/Keyword: security event

Search Result 394, Processing Time 0.023 seconds

Review on Security Communication Environment in Intelligent Vehicle Transport System (지능형 차량 교통체계에서 보안 통신 리뷰)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.97-102
    • /
    • 2017
  • In this paper, we have interested in cooperative intelligent transport system and autonomous driving system, and focused on analysis of the characteristics of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Basis Service (DENM) message, which is key delivery message among cooperative intelligent transport system (C-ITS) characteristics for research objectivity. For research method, we also described V2X communication, and also analyzed the security certificate and header structure of CAM and DENM messages. We described CAM message, which is a message informing the position and status of the vehicle. And the DENM message is presented a message informing an event such as a vehicle accident, and analysis security communication, which is supported services. According to standard analysis result, 186 bits or 275 bits are used. In addition to the security header and the certificate format used for vehicle communication, we have gained the certificate verification procedure for vehicles and PKI characteristics for vehicles. Also We derived the characteristics and transmission capability of the security synchronization pattern required for V2X secure communication. Therefore when it is considered for communication service of DENM and CAM in the C-ITS environment, this paper may be meaningful result.

Security Framework for Intelligent Predictive Surveillance Systems (지능형 예측감시 시스템을 위한 보안 프레임워크)

  • Park, Jeonghun;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.77-83
    • /
    • 2020
  • Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study on Improving Precision Rate in Security Events Using Cyber Attack Dictionary and TF-IDF (공격키워드 사전 및 TF-IDF를 적용한 침입탐지 정탐률 향상 연구)

  • Jongkwan Kim;Myongsoo Kim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.9-19
    • /
    • 2022
  • As the expansion of digital transformation, we are more exposed to the threat of cyber attacks, and many institution or company is operating a signature-based intrusion prevention system at the forefront of the network to prevent the inflow of attacks. However, in order to provide appropriate services to the related ICT system, strict blocking rules cannot be applied, causing many false events and lowering operational efficiency. Therefore, many research projects using artificial intelligence are being performed to improve attack detection accuracy. Most researches were performed using a specific research data set which cannot be seen in real network, so it was impossible to use in the actual system. In this paper, we propose a technique for classifying major attack keywords in the security event log collected from the actual system, assigning a weight to each key keyword, and then performing a similarity check using TF-IDF to determine whether an actual attack has occurred.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

A Study on the Establish and Operating Plan of Reserve Components Emergency Response Forces (재난상황 시 예비군 긴급대응부대 창설 및 운용방안에 관한 연구)

  • Seo, SeungBae
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.1
    • /
    • pp.9-16
    • /
    • 2018
  • In the event of a disaster, we need people who specialize in rapid regional disaster recovery. However, in the present disaster response system, disaster relief is carried out at the level of public support, volunteer service, etc. There are various problems such as initial response due to lack of expertise, delays in disaster recovery, and inadequate response to disasters. Therefore, it is necessary to establish a unit with early ability to respond to local governments in the event of a disaster and expertise to enable rapid disaster recovery. Therefore, this study limited the preparation of the reserve forces emergency response units for the direction of local security, disaster relief and disaster relief through emergency disaster recovery under the disaster situation.

An Accuracy Improvement on Acquisition Time of SCADA RTU Status Event (SCADA RTU 상태이벤트 취득시간 정확도 개선)

  • Lee, Ju-Heon;Lee, Sang-Joong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.3
    • /
    • pp.332-341
    • /
    • 2013
  • SCADA RTU is a remote control unit equipped in substations for automatic operation of a power system. The RTU monitors and measures the operation status of remote substations to transmits the signals to upper SCADA system and receives control command signals from dispatch center to actuate corresponding apparatus. The RTU receives the standard time from GPS receiver to synchronize the times for all devices and acquires the status event of power apparatus using DIM. Without the time synchronization between GPS and RTU, stable operation of the power system and accurate analysis of the system fault are impossible due to the time error of SOE. In this paper, a test is performed to identify if the operation time of SCADA RTU DIM coincides with the standard time. And we tried to find the reason of error, to minimize the time discrepancy. Through this study, RTU operation time could be synchronized with the standard time within 10[ms] to improve the reliability of SOE data.

Research for the Security Studies in the Universities of U. S. A. (미국 대학 시큐리티 교육내용에 관한 연구 -한국 대학교육과 비교를 중심으로-)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.35-43
    • /
    • 2011
  • In the universities of U.S.A., Criminal Justice is the interdisciplinary study of the institutions and policies that constitute the criminal justice system, as well as theories of human behavior and philosophies of justice related to the maintenance of social order, the control of crime, and the achievement of a just society. There are 103 American Universities have Criminal Justice department and they provide about 180 differents courses as a pre-requisition or optional subject in the major. The most 10 courses that those colleges adopted are Introduction to Criminal Justice, Criminal Law, Criminology, Criminal Procedures, Research Methods in Criminal Justice, Criminal Investigation, Juvenile Justice, Terrorism, Ethical Issues in Criminal Justice, Introduction to Psychology or Introduction to Sociology. Also, 10 fields more important in the major if we group together similar courses those are Criminal Justice and Procedures Sequences, Law, Justice and corrections, Theory and Methods Sequences, Homelend Security and Security Operations, Forensics and Cybercrime, Management and Administration, Police, Race and Ethnicity, General Requirements, Other Social Science Fields. The combined degree program leading to Bachelor of Arts Degree in Criminal Justice and Master in Public Administration provides a concentration in criminal justice, management, administration, and leadership. They have big different courses between USA and Korea event though they have similar educative goal and way of approach to the target in the major.

Development of a Flood Disaster Evacuation Map Using Two-dimensional Flood Analysis and BIM Technology (2차원 침수해석과 BIM 기술을 활용한 홍수재난 대피지도 작성)

  • Jeong, Changsam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.53-63
    • /
    • 2020
  • In this study, the two-dimensional flow analysis model Hydro_AS-2D model was used to simulate the situation of flooding in Seongsangu and Uichang-gu in Changwon in the event of rising sea levels and extreme flooding, and the results were expressed on three-dimensional topography and the optimal evacuation path was derived using BIM technology. Climate change significantly affects two factors in terms of flood damage: rising sea levels and increasing extreme rainfall ideas. The rise in sea level itself can not only have the effect of flooding coastal areas and causing flooding, but it also raises the base flood level of the stream, causing the rise of the flood level throughout the stream. In this study, the rise of sea level by climate change, the rise of sea level by storm tidal wave by typhoon, and the extreme rainfall by typhoon were set as simulated conditions. The three-dimensional spatial information of the entire basin was constructed using the information of topographical space in Changwon and the information of the river crossing in the basic plan for river refurbishment. Using BIM technology, the target area was constructed as a three-dimensional urban information model that had information such as the building's height and location of the shelter on top of the three-dimensional topographical information, and the results of the numerical model were expressed on this model and used for analysis for evacuation planning. In the event of flooding, the escape route is determined by an algorithm that sets the path to the shelter according to changes in the inundation range over time, and the set path is expressed on intuitive three-dimensional spatial information and provided to the user.

Comparison of Airport Emergency Plans in Korea and Japan and Survey of Emergency Response of Airline Employees at Check-in Counter (한·일 공항비상계획 비교 및 체크인카운터의 항공사 직원 비상대응 실태조사)

  • Kwon, Kyum;Kwon, Byung Hwa;Cheung, ChongSoo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.11-25
    • /
    • 2020
  • This study is a basic study to improve responsiveness in the event of a disaster in the landside area of the Airport Passenger Terminal, and it investigated the airport emergency plan and the status of emergency response in the event of a disaster by the airline's ground staff. The Airport Emergency Plan examined the airport evacuation plan of Korea's Gimpo Airport and Japan's Ministry of Land, Infrastructure, and Transport, confirming that the domestic airport emergency plan was not specific. In addition, a survey of 100 airline ground employees working at check-in counters found that 69% of the respondents were unaware of their role in disaster situations, 90% were not educated in emergency response and 98% were not trained in disaster training in landside areas. Cross-analysis confirmed significant results in the safety of the airport where the service life worked and whether it was a role in the event of a disaster. Therefore, it is suggested that the airport emergency response plan should be improved to improve the ability to respond to disaster sites in the landside area of the airport passenger terminal and that the airline's ground staff should be educated and trained to enhance disaster response.