• Title/Summary/Keyword: security inspection

Search Result 224, Processing Time 0.023 seconds

An Efficient Update Algorithm for Packet Classification With TCAM (TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘)

  • Jeong Haejin;Song Ilseop;Lee Yookyoung;Kwon Taeckgeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.79-85
    • /
    • 2006
  • Generally, it is essential that high-speed routers, switches, and network security appliances should have an efficient packet classification scheme in order to achieve the high-speed packet forwarding capability. For the multi-gigabit packet-processing network equipment the high-speed content search hardware such as TCAM and search engine is recently used to support the content-based packet inspection. During the packet classification process, hundreds and thousands of rules are applied to provide the network security policies regarding traffic screening, traffic monitoring, and traffic shaping. In addition, these rules could be dynamically changed during operations of systems if anomaly traffic patterns would vary. Particularly, in the high-speed network, an efficient algorithm that updates and reorganizes the packet classification rules is critical so as not to degrade the performance of the network device. In this paper, we have proposed an efficient update algorithm using a partial-ordering that can relocate the dynamically changing rules at the TCAM. Experimental results should that our algorithm does not need to relocate existing rules feature until 70$\%$ of TCAM utilization.

A Study on Improving the System for Qualification of Personal Guardian: Mainly on Practical Examinations (신변보호사 자격검정제도의 개선방안: 실기시험을 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.277-293
    • /
    • 2020
  • The purpose of this study is to select the talented and competent personal caregiver personnel through a professional and rational inspection system, and to provide safer personal care services to the public so that the people who are eligible for service can lead a safe life. The purpose of this study is to cultivate qualified and competent personal guardian personnel and provide professional and stable services to the people so that the people who can use the service can lead a safer life. In order to grow into a system that meets the objectives of the personal guardian qualification screening system, it must be revised and supplemented from various evaluation methods. The improvement measures related to the practical test of the system for qualifying personal guardians are as follows. First, the fitness evaluation items should be added. Second, it is necessary to reestablish the test technology. (Remove technology that causes the second threat) (Adds skills that can be used as civilian status) Third, the fallout and application action must be added. Fourth, evaluation in various starting positions is necessary. Fifth, evaluation should be made by diversifying the distance and direction with the opponent.

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

A Study on a Secure Coding Library for the Battlefield Management System Software Development (전장정보체계 SW 개발을 위한 시큐어 코딩 라이브러리에 관한 연구)

  • Park, Sanghyun;Kim, Kwanyoung;Choi, Junesung
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.242-249
    • /
    • 2018
  • In this paper, we identify the code vulnerabilities that can be automatically detected through Visual Studio (VS) compiler and code analyzer based on a secure coding rule set which is optimized for development of battlefield information system. Then we describe a weak point item that can be dealt with at the implementation stage without depending on the understanding or ability of the individual programmer's secure coding through the implementation of the secure coding library. Using VS compiler and the code analyzer, the developers can detect only about 38% of security weaknesses. But with the help of the proposed secure coding library, about 48% of security weaknesses can be detected and prevented in the proactive diagnosis in the development stage.

The in-situ Assessment of GIS-Based Geotechnical Hazard Map (GIS기반 지반재해위험지도의 현장 적용성 평가)

  • Ryu, Ji Hyeob;Seo, Sang Hoon;Hwang, Ui Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.35-45
    • /
    • 2013
  • In recent years, increasing damage due to landslides. So the government is to create a geotechnical hazard map. This study was to evaluate the applicability of the geotechnical hazard map by using 4 years of landslide cases in Seoul and Busan. And the in-situ aseessment has been carried out in test-bad area with specialists. Study has shown dangerous grade in geotechnical hazard map is more dangerous than the actual. Thus we can utilize geotechnical hazrd map in the purpose of the geotechnical hazard preliminary assessment. However, the in-site inspection and evaluation is required for in order to select the hazard area.

A Study on the Improvement of the Unconditional Right to Informational Self-Access Based on the Status of Domestic and Foreign Legislation and It's Application to Domestic Corporations (무조건적 자기정보접근권 부여에 대한 국내외 규제현황 및 사례분석을 통한 개선방안 연구)

  • Bae, Jin-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.591-605
    • /
    • 2017
  • The right to informational self-determination refers to the constitutional right for an individual, which is approved by the constitutional court, to decide what contents the collected information comprises and to control the circulation of information relation to oneself. It contains claim for inspection of personal information(The right to informational self-access) as a right for individual to review information of current state and processing history which information holders have. To assure the right to informational self-access, individual must be notified of the processing history of information by information holders regardless of individual's request(The unconditional right to informational self-access). This study will analyse current status of domestic and foreign legislation and global regulation which are related to the unconditional right to informational self-access. In addition, the action of domestic corporations will be introduced. Finally, it will be concluded with relevant problems and solutions to solve the problems.

A Comparative Analysis of EU GDPR with Privacy Laws in South Korea (EU GDPR과 국내 개인정보보호 법제 비교분석)

  • Kim, Sung Hyun;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.83-92
    • /
    • 2018
  • The GDPR implemented since 25 May 2018 is common to all EU Member States and is legally binding. It is also important and legally valuable in that it takes into account the latest trends related to privacy protection. The purpose of this study is to propose a comprehensive review and improvement direction of the personal information protection laws in South Korea through a comparative analysis of EU GDPR and privacy related laws in South Korea. As a result of this study, the differences between the GDPR and privacy related laws in South Korea are Definition of personal sensitive information, Right to data portability, Data protection officer, Transfers of personal data to third countries, Supervisory authority, and Punishment, etc. The differences in these regulations were necessary to protect the rights and interests of data subjects and to properly handle personal information of personal information controllers. Therefore, based on the results of the comparative analysis of this study and suggestions on improvement direction of the law related to personal information protection, it is expected that it will contribute to the overall inspection and improvement of the law related to personal information protection in South Korea.

  • PDF

The Study on Reading Education Method to Improve the Cognitive Ability for the Petty officer Majoring Students in Community College (전문대학 부사관과의 인지 능력 향상을 위한 읽기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.123-131
    • /
    • 2018
  • The goal of this study is to look deeper into a reading education method for improving cognitive abilities of petty officer majoring students in community college level. Lack of the cognitive ability through the passing status of reading information processing highly can cause a problem for understanding information of context. Therefore, this study redefines the reading step to improve the cognitive ability. also, it sets up progress steps; material selection - learning - inspection - practice based on the cognitive abilities. To achieve those goals, there are two major ways. The first, setting up a proper reading assignment that is suitable for petty officer major students in community college level is a key step for this study. Second, the instructor leads the students to judge their own cognitive ability objectively by using a portfolio curriculum which contains a checking list of the portfolio, structuring a curriculum based on weekly achievements, self-checking, and setting up a direction of practice. The two presented ways are the most effective ways to develop students' cognitive ability based on continuous reading and checking. For the last, the study mentions a proposal for further tasks in this field of the study.

  • PDF

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.