• Title/Summary/Keyword: security window

Search Result 118, Processing Time 0.021 seconds

Research about the Identification and Gathering of Digital Forensic Evidence by Cyber Intrusion Accident Types (사이버 침해사고 유형별 디지털 포렌식 증거의 식별 및 수집에 관한 연구)

  • Shin, Kyung-Jun;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.93-105
    • /
    • 2007
  • A digital forensic technology and tools are used much in the rapidly increased cyber intrusion accident investigation. But, almost the identification and gathering tools of digital forensic evidence are very difficultly integrated and simply poor-skill. Thereby, Important digital evidences at intrusion accident investigation of public institution and a private enterprise can be omitted or demaged. In this paper, therefore, we refer to 'The digital forensic tool for identification and gathering evidence' based only Window OS by using 'Log Parser', discuss the methodology for the identification and gathering of digital forensic evidence by cyber intrusion accident types.

  • PDF

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit (경호무도 정신특성 요인의 상대적 중요도 평가)

  • Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.7-32
    • /
    • 2012
  • This study aimed to evaluate the relative status using Analytic Hierarchy Process(AHP) on the spiritual factors of the security martial arts for the guards to perform the best security service. There were 540 participants who were students majored in security martial arts, workers for security and specialists of practical and theoretical security martial arts for this study. The exploratory and confirmatory factor analysis were carried out using the selecting data through literature reviews in the level of the factor-extraction about the spiritual characteristics. The specialists' survey was conducted on the relative status among factors using the spiritual concept structure based on the studied above. Selected data was calculated with SPSS 18.0 for windows, AMOS 5.0, and Expert Choice 2000 software. The conclusion can be made through those process above. First, 4 general factors and 20 detailed factors were found as the result of the factor exploration related to the spiritual characteristics of the security martial arts. The result which was verified on Construction validity of searched factors had stable figures on every standard. In other words, the participants for survey on this study "Spiritual characteristic concepts of the security martial arts" can be evaluated it is valid. The general factors of security martial arts' spirit were conceptualized with Psychological spirit, ethical spirit, martial art spirit, practical spirit through the naming process on the general factors of the security martial arts' spiritual characteristic concepts. The detailed factors of security martial arts' spirit were concentration, self-confidence, self-management, immersion, self-esteem in psychological spirit and sacrifice, justice, royalty, peace, sense of duty in ethical spirit and courtesy, toughness, defense, balance of mind and body, bravery in martial arts and responsibility, cooperation, modesty, determination, professionalism in practical spirit of security martial arts. That is, the conceptualization of security martial arts' spirit was verified that it had validity. Second, the hierarchical model of the security martial arts was composed with 4 superordinate concepts and 20 subordinate concepts. As the result of evaluating relative status based on Spiritual characteristics-hierarchy model, the impotance was proven in order of ethical spirit(.482), martial art spirit(.248), practical spirit(.188), psychological spirit(.083). Also the importance related to spiritual characteristics of security martial arts on subordinate concepts was proven in order of sacrifice(.252), courtesy(.110), sense of duty(.108), responsibility(. 073), royalty(.053), toughness(.052), justice(.049), defense(.038), professionalism(.038), determination(.035), cooperation(.029), self-confidence (.026), bravery(.025), self-esteem(.024), balance of mind and body(.023), peace(.019), concentration(.014), modesty(.013), self-management(.011), flow (.007). To sum up, the spiritual factor related to ethics such as sacrifice, justice, royalty, peace, sense of duty was the most important for the security martial arts.

  • PDF

Design of Area-efficient Feature Extractor for Security Surveillance Radar Systems (보안 감시용 레이다 시스템을 위한 면적-효율적인 특징점 추출기 설계)

  • Choi, Yeongung;Lim, Jaehyung;Kim, Geonwoo;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.200-207
    • /
    • 2020
  • In this paper, an area-efficient feature extractor was proposed for security surveillance radar systems and FPGA-based implementation results were presented. In order to reduce the memory requirements, features extracted from Doppler profile for FFT window-size are used, while those extracted from total spectrogram for frame-size are excluded. The proposed feature extractor was design using Verilog-HDL and implemented with Xilinx Zynq-7000 FPGA device. Implementation results show that the proposed design can reduce the logic slice and memory requirements by 58.3% and 98.3%, respectively, compared with the existing research. In addition, security surveillance radar system with the proposed feature extractor was implemented and experiments to classify car, bicycle, human and kickboard were performed. It is confirmed from these experiments that the accuracy of classification is 93.4%.

A Research on Virtual Disk Reconstruction Method on Windows Storage Space (윈도우 저장소 공간 시스템 상의 가상 디스크 재구성 방법 연구)

  • Kim, Junho;Choi, Hoyong;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.27-38
    • /
    • 2018
  • Recently, as the amount of digital data rapidly increases, a large storage space is required. RAID is a system that can manage large capacity storage space. Storage space provided by Windows is a type of software RAID. Storage space has been supported since Windows 8, Windows Server 2012, and no analysis has been done on the functionality. To analyze system using storage space, analysis of storage space function and reconstruction method of virtual disk should be studied. In this paper, we briefly describe the layout of existing RAID, explain the layout and metadata of storage space of software RAID, present reconstruction method of virtual disk by disk layout, and verify the result through experiments.

SAD : Web Session Anomaly Detection based on Bayesian Estimation (베이지언 추정을 이용한 웹 서비스 공격 탐지)

  • 조상현;김한성;이병희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.115-125
    • /
    • 2003
  • As Web services are generally open for external uses and not filtered by Firewall, these result in attacker's target. Web attacks which exploit vulnerable web-applications and malicious users' requests cause economical and social problems. In this paper, we are modelling general web service usages based on user-web-session and detect anomal usages with Bayesian estimation method. Finally we propose SAD(Session Anomaly Detection) for detection unknown web attacks. To evaluate SAD, we made an experiment on attack simulation with web vulnerability scanner, whisker. The results show that the detection rate of SAD is over 90%, which is influenced by several features such as size of window or training set, detection filter method and web topology.

Development of Expert System for Operation in Distribution Systems with Graphic Integrated Environments (그래픽 통합 환경을 갖춘 배전계통 운용 전문가 시스템 개발)

  • Kim, Se-Ho;Seo, Ki-Sung;Kim, Jeong-Keun;Park, Byoung-Youn;Woo, Kwang-Bang
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.9
    • /
    • pp.960-972
    • /
    • 1992
  • This paper deals with the development of expert system in distribution system which combined with graphic user interface. The proposed expert system can recognize and adjust to the system change, and includes the rule bases of security monitoring. Also it provides load transfer algorithm for efficient load distribution. The graphic user environment for expert system is implemented in the mouse-oriented user interface with overlapped window functions and pull-down menus. Therefore, the developed graphic integrated expert system can afford to assist system operators very conveniently through the various graphic function in proposing an optimal plan of load transfer for fault restoration and outage schedule.

Graphic User Interface Scheme for Wireless Universal Serial Bus

  • Lee, Hyun-Jeong;Kim, Jong-Won;Huh, Jae-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.183-186
    • /
    • 2005
  • WUSB is a new technology which combines the speed and the security of wired USB with the easy use of wireless technology. In this paper, GUI for WUSB is designed and implemented to show the connectivity and contents of the WUSB devices. Also, the proposed GUI shows the log window while content transfers occur between the host and device. The proposed GUI can be used for various wireless technologies which provide wireless function with existing USB hosts and devices.

  • PDF

A Study on the Current Operation and Activation of Online Alternative Dispute Resolution (온라인 ADR의 운영현황과 활성화 방안에 관한 연구)

  • Choi, Seok-Beom
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.91-116
    • /
    • 2008
  • E-Commerce constitutes an important part of all commercial activities. Online Alternative Dispute Resolution(Online ADR) or Online Dispute Resolution(ODR) is a new method of dispute, resolution which, is provided online. Most Online ADR services are alternatives to litigation. In this respect, they are the online transposition of the methods developed in the ADR movement such as negotiation, mediation and arbitration. But there are also online courts which are really normal courts in which the contesting parties communicate essentially online. This paper deals with the current operation of Online ADR and the ways to, activate it. They include (1) die establishment of legal stability regarding Online ADR, (2) the enhancement of system security in providing Online ADR services, (3) the introduction of Online ADR service platform for providing the various services through single window on a national, or global basis, and (4) the introduction of Online ADR online monitoring system for systematic dispute resolution services.

  • PDF

A fast exponentiation with sparse prime (Sparse 소수를 사용한 효과적인 지수연산)

  • 고재영;박봉주;김인중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.1024-1034
    • /
    • 1998
  • Most public cryptosystem widely used in communication network are based on the exponentiation-arithmetic. But, cryptosystem has to use bigger and bigger key parameter to attain an adequate level of security. This situation increases both computation and time delay. Montgomery, yang and Kawamura presented a method by using the pre-computation, intermediately computing and table look-up on modular reduction. Coster, Brickel and Lee persented also a method by using the pre-computation on exponentiation. This paper propose to reduce computation of exponentiation with spare prime. This method is to enhance computation efficiency in cryptosystem used discrete logarithms.

  • PDF