• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.029 seconds

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

The Emergence of International Ocean Regime and the Change of Power Concept in International Society -The Case of United Nations Convention on the Law of the Sea- (국제사회 힘의 변화와 해양레짐 출현에 관한 소고 -유엔 해양법협약을 중심으로-)

  • Kang, Ryang;Park, Seong-Wook;Yang, Hee-Cheol
    • Ocean and Polar Research
    • /
    • v.28 no.3
    • /
    • pp.273-285
    • /
    • 2006
  • As the political arguments on international power concept has gradually been deepened, the role of international regimes, defined as principles, norms, rules, and decision-making procedures around which nation-actors' expectations converge in a given issue-area, has also been reinforced. There are many ways of understanding about international regimes. In terms of realistic theories, international regimes are one of methods of maintaining hegemonic power order of hegemonic nation and in terms of liberalistic theories, international regimes are understood as the products of mutual inter-dependence of nations in changing international society. As a matter of fact, if we take structural causes and regime consequences into severe consideration, we can find not a few characteristics of international regimes, such as security regime, world trade and fiance regime, ocean regime, environmental regime, human right regime, etc. This paper will examine the changing concept of power after World War II in three categories of hard power (military power), meta power (regime creating power), and soft power (advanced in cultural, diplomatical, and technological power). This paper will provide the evidence of why the changing power concepts will be strongly related with the emergence of international regimes. The UN convention on the law of the sea will chosen as a standard case of the ocean regime and it's regime structure and role will also be analysed in both realistic :md liberalistic theories. Futhermore, the nations' interests involved in the UN convention on the law of the sea will be analytically classified and finally a future prospectus of the UN convention on the law of the sea as an ocean regime will be tested.

A Study on the Cases of Merchandising and Suggestions for Improving Competitive Power of Traditional Liquor (전통주류 상품화 사례 및 경쟁력 제고 방안 연구)

  • Jun Young-Mi;Ahn Yoon-Su;Kim Mi-Hee
    • The Korean Journal of Community Living Science
    • /
    • v.17 no.2
    • /
    • pp.3-14
    • /
    • 2006
  • This study intends to offer suggestions for improving the security and competitive power of traditional liquors by investing in the status of intellectual property rights. Merchandising and the marketing strategies of traditional liquor are also addressed. The data was collected through a questionnaire survey given to 101 CEOs of traditional liquor manufacturers. The major results of this study were as follows: The management types of traditional liquor manufacturers were classified as the company 57 (56.4%), the corporation or the union 29 (28.7%), domestic industry 10 (9.9%), and marketing community or technology center 5 (5.0%). The competitive power degree of traditional liquor products was classified as strength 30 (31.6%), usual 30 (31.6%), weakness 35 (36.8%). The elements of strong competitive power were taste, functional (wellbeing) character, and attractiveness of the brand name. On the other side, reasons for weakness in competitive power were the marketing system, price competitiveness, and advertisement. The trademark registration of the traditional liquor appeared with 53%. The reasons not to pursue a trademark registration included the complicated and unnecessary process of registration acquisition, high registration expenses, etc. The perceptions of CEOs about the consumer's brand awareness for their product were low with an average 2.97. Explanations included insufficient advertisement and public relations, unrefined trademark design, and the meaninglessness of brand names. The marketing strategy of traditional liquor manufacturers according to annual sales were as follows: Manufacturers with high sales emphasized marketing strategies that focused on functional character, traditional image, high quality in image and package materials and design, high price strategies based on quality, and various sale promotions.

  • PDF

User Identification System Based on Iris Information Using a Mouse (홍채 정보 기반 마우스를 활용한 사용자 인증 시스템)

  • Kim Sin-Hong;Rho Kwang-Hyun;Moon Soon-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.143-150
    • /
    • 2006
  • Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.

  • PDF

Evaluation of Rainwater Utilization for Miscellaneous Water Demands in Different Types of Buildings Using Geographic Information System

  • Kim, Jinyoung;An, Kyoungjin;Furumai, Hiroaki
    • Environmental Engineering Research
    • /
    • v.18 no.2
    • /
    • pp.85-90
    • /
    • 2013
  • This study is an attempt to quantify rainwater utilization and miscellaneous water demand in Tokyo's 23 special wards, the core of the urban area in Tokyo, Japan, in order to elucidate the potential of further rainwater utilization. The rainwater utilization for miscellaneous appropriate water demands, including toilet flushing, air conditioning, and garden irrigation, were calculated for six different types of building: residential house, office, department store, supermarket, restaurant, and accommodation. Miscellaneous water demands in these different types of building were expressed in terms of equivalent rainfall of 767, 1,133, 3,318, 1,887, 16,574, and 2,227 (mm/yr), respectively, compared with 1,528 mm of Tokyo's average annual precipitation. Building types, numbers and its height were considered in this study area using geographic information system data to quantify miscellaneous water demands and the amount of rainwater utilization in each ward. Area precipitation-demand ratio was used to measure rainwater utilization potential for miscellaneous water demands. Office and commercial areas, such as Chiyoda ward, showed rainwater utilization potentials of <0.3, which was relatively low compared to those wards where many residential houses are located. This is attributed to the relatively high miscellaneous water demand. In light of rainwater utilization based on building level, the introduction of rainwater storage mechanisms with a storage depth of 50 mm for six different types of buildings was considered, and calculated as rainfall of 573, 679, 819, 766, 930, and 787 (mm), respectively. Total rainwater utilization using such storage facilities in each building from 23 wards resulted in the retention of 102,760,000 $m^3$ of water for use in miscellaneous applications annually, and this volume corresponded to 26.3% of annual miscellaneous water demand.

A Study on the Legislation Directions of FRAMEWORK ACT ON KOREA COAST GUARD(tentative name) ((가칭) 해양경찰기본법 입법방향에 관한 연구)

  • Son, Yeongtae
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.396-407
    • /
    • 2014
  • In 19th May 2014, the government announced that KCG(Korea Coast Guard) is dissolved regarding responsibility for recently accident which is Sewol ferry disaster. But KCG, a central administrative agency is responsible for protecting maritime sovereignty of South Korea; the most basic and indispensable organization. Furthermore, The purpose of KCG is to provide the safety of the public and keeping of public order by prescribing matters necessary for the securement of maritime security, maintenance of public order and protection of marine resources & facilities. Therefore, In this article, I would like to suggest tentatively named FRAMEWORK ACT ON KOREA COAST GUARD's management plan which could reflect the scope of functions. It means we examine the current state of KCG, and would like to signpost for the most ideal way of legal system in Korea Coast Guard. Finally, this treatise is expected that this research can be a guideline contribute to improving Korea Coast Guard relevant laws even a little.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

A Study on Improving Role of Firefighting Service Toward an Aging Society (고령화 사회에서의 소방인력 활용 및 서비스 개선방안)

  • Kang, Chang-Gon;Lee, Si-Young
    • Fire Science and Engineering
    • /
    • v.26 no.3
    • /
    • pp.49-59
    • /
    • 2012
  • This study is aimed to increase the fire-fighting manpower utilization and the increasing of its services in aging society. Due to continuous improvement of living standards and development of medical technology, the elderly population rate is being increased and it brings rapid progresses of aging society. Therefore, as a fire-fighting organization which is responsible for safety from various disasters, they should grasp comprehensively and systematically exact status of weak person from disaster in perspective of it with conjunction of all concerned department and at the same time proceed to speedy move as well as determine the appropriate emergency measures. In order to do this, safe life education for elderly people and the comprehensive measures of home security should be taken by transforming the policy from particular object-oriented policy to demand-driven policy. And through the expansion of one one nine services such as using grandeur of powerful IT nation out of old-fashioned promotion way, they should provide fire-fighting service for convenient and comfortable life of elderly people after retirement. A consideration of the elderly people is the best way to penetrate a advancement fire-fighting in aging society.