• Title/Summary/Keyword: security model

Search Result 3,960, Processing Time 0.036 seconds

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

A Study on the Models of Internal system users Authentication considering Multi Factors (다중요소 기반의 내부 사용자 인증모델에 관한 연구)

  • Lee, Jae-yun;Shim, Ho-sung;Han, Kyeong-Seok;Choi, Yong-Lak;Kim, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2044-2055
    • /
    • 2015
  • Financial information systems play such a pivotal role in the financial institution services that are provided for a large customers on the basis of various information including the personal information. As for the personal information collected during the transactions in the financial information systems, huge efforts and investment have been made to protect previously them from being inappropriately misused or illegally used if they could be released. Unfortunately, the frequent accidents on the leakage of sensitive personal information have occurred recently not only by external service users but even by internal system users. Therefore, the aim of this study is to suggest a model of advanced two-channel authentication for internal users in order to increase the stability of financial information systems with enhanced security.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Design and Implementation of Tree-based Reliable Dissemination Multicast Protocol With Differential Control and Key Management (차별 제어와 키 관리 기능을 통한 트리 기반의 신뢰성 있는 멀티캐스트 프로토콜의 설계 및 구현)

  • Kim, Yeong-Jae;Park, Eun-Yong;An, Sang-Jun;Hyeon, Ho-Jae;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.235-246
    • /
    • 2002
  • While the Internet is suffering from the massive data such as video stream, IP multicast can ease the load of the Internet by enabling one copy of digital information to be received by multiple computers simultaneously. But If multicast is based on UDP, packets are delivered using a best-effort Policy without any reliability, congestion control or flow control. Multicast group members can join or leave a multicast group at will, and multicast uses broadcast mechanism, it's very hard to keep security from unauthorized members. In this paper, we introduce a new reliable multicast protocol TRDMF proper for one-to-many multicast model with reliability, flow control, congestion control and key management.

An Analytical Evaluation on Buckling Resistance of Tapered H-Section Deep Beam (춤이 큰 웨브 변단면 H형 보의 휨내력에 대한 해석적 평가)

  • Lee, Seong Hui;Shim, Hyun Ju;Lee, Eun Taik;Hong, Soon Jo;Choi, Sung Mo
    • Journal of Korean Society of Steel Construction
    • /
    • v.19 no.5
    • /
    • pp.493-501
    • /
    • 2007
  • Recently, in the domestic amount of materials,curtailment and economic efficiency security by purpose, tapered beam application is achieved, but the architectural design technology of today based on the material non-linear method does not consider solutions to problems such as brittle fracture. So, geometric non-linear evaluation thatincludes initial deformation, width-thickness ratio, web stiffener and unbraced length is required. Therefore, in this study, we used ANSYS, a proven finite elementanalysis program,and material and geometric non-linear analysis to study existing and completed tapered H-section as deep beam's analysis model. Main parameters include the width-thickness ratio of web, stiffener, and flange brace, with the experimental result obtained by main variable buckling and limit strength evaluation. We made certain that a large width-thickness ratio of the web decreases the buckling strength and short unbraced web significantly improves ductility.

A Study on the Roles and Characteristics of Record Center(Jaryokwan) in Korea (한국 자료관 제도의 역할과 특징에 관한 연구)

  • Bang, Hyo-Soon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.2
    • /
    • pp.187-205
    • /
    • 2003
  • The purpose of this study is to seek the characteristics of Jaryokwan m Korea and suggest the direction of the development for the future, through the analysis of the work process for Record Center(Jaryokwan) regulated in the Law of Records and Archives Management(the Law). According tn the Law, Jaryokwan is supposed to cover the areas of the management of semi-current records, government publications, books, and other records. The analysis of the Law shows that Korean Jaryokwan has the characteristics of divisional management of the semi-current records of governments, pursuing the integrated records and archives management systems, tightening the control function from the current-records stage, emphasizing the protection of evidences and security, contribution to the decentralizing storage of archives and simplifying the access to semi-current records for promoting it's usage. For the future development of Jaryokwan in Korea, this study suggests the imminent needs of the development of ideal model for Korean Jaryokwan, the legal enforcement of posting an Archivist the more detailed regulation, procedures and methods of work, the close collaboration with Library and Information Science, the pursuit of developing as a regional information center, increasing the flexibility of establishing Jaryokwan.

Challenges and Solutions of Electronic Journal Consortium (전자저널 컨소시엄의 당면과제와 해결방안 모색)

  • Kim, Sang-Jun
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.93-118
    • /
    • 2010
  • This study was aimed to establish a workable strategies to operate KESLI consortium reliably. To encourage the research purposes, it was mainly investigated international literature on current challenges for the e-journals consortium in comparison with the domestic implications. Major issues and challenges are divided to six items by scholarly communication changes and e-journals percentage increase, a big deal for a contract -based consortium pricing model in vogue, a consortium of the price hikes and making budget difficulties, use the standard statistics by the results of the use, archiving and archive security uncertainty, and contracts public availability of such external conditions. As a result, the international challenges of E-journals consortium was similar to KESLI, but the depth of information and research on domestic was weaker than the international research. To see more research and a rational perception based on scientific evidence and alternatives that enable KESLI working in the field was needed to be.

Infrared Image Segmentation by Extracting and Merging Region of Interest (관심영역 추출과 통합에 의한 적외선 영상 분할)

  • Yeom, Seokwon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.6
    • /
    • pp.493-497
    • /
    • 2016
  • Infrared (IR) imaging is capable of detecting targets that are not visible at night, thus it has been widely used for the security and defense system. However, the quality of the IR image is often degraded by low resolution and noise corruption. This paper addresses target segmentation with the IR image. Multiple regions of interest (ROI) are extracted by the multi-level segmentation and targets are segmented from the individual ROI. Each level of the multi-level segmentation is composed of a k-means clustering algorithm an expectation-maximization (EM) algorithm, and a decision process. The k-means clustering algorithm initializes the parameters of the Gaussian mixture model (GMM) and the EM algorithm iteratively estimates those parameters. Each pixel is assigned to one of clusters during the decision. This paper proposes the selection and the merging of the extracted ROIs. ROI regions are selectively merged in order to include the overlapped ROI windows. In the experiments, the proposed method is tested on an IR image capturing two pedestrians at night. The performance is compared with conventional methods showing that the proposed method outperforms others.

Fraud and Error in the Social Assistance Program (국민기초생활보장제도 수급자격 적격성 연구 - 사각지대와 부정수급집단의 특성을 중심으로 -)

  • Park, Neung-hoo;Song, Mi-young
    • Korean Journal of Social Welfare Studies
    • /
    • no.39
    • /
    • pp.287-314
    • /
    • 2008
  • This paper tests the stigma hypothesis and administration hypothesis on the illegal take-up group and non take-up group in the National Livelihood Security Program. A set of survey data, using multinomial logistic model, was analyzed for this purpose. Compared with the legal take-up group, the feature of illegal take-up group which has more workable household supports the administration hypothesis - the low skill of means-test office would increase the possibility of benefit fraud. The features of non take-up group support both the stigma hypothesis - the stigma prevents eligible person from participating in the social assistance program, and the administration hypothesis - the administration office is apt to make error to deny the eligibility of person who has supposed family supporters.