Abstract:
The present invention relates to a vessel traffic service system and a method for extracting accident data, and more particularly, to a technique that search and extracts possible event traffic data automatically from data of a concerned area without knowing exact time when a marine accident occurs. The vessel traffic service system includes: an input unit receiving conditional information for extracting accident occurrence data from a user; a storage unit storing at least one of an automatic identification system (AIS) signal, a radar signal, and a camera image signal; and a control unit extracting an event occurrence part from at least one of the AIS signal, the radar signal, and the camera image signal of a point and a time at which an accident occurs in accordance with the conditional information to generate an accident candidate list.
Abstract:
An abnormal traffic detection apparatus and method based on Modbus communication pattern learning is provided. The abnormal traffic detection apparatus based on the Modbus communication pattern learning previously detects and responds to abnormal traffic on a Modbus/TCP protocol. According to the present invention, a communication service between control systems can be stably provided by previously detecting the abnormal traffic capable of interfering with a stable operation of the control system. Particularly, since the effective abnormal traffic on the Modbus/TCP protocol can be previously detected, security of the control system can be increased by rapid detection and response with respect to security threats on the Intranet of the control system, and availability can be secured.
Abstract:
Provided are a method and apparatus for a hardware-based accelerated arithmetic operation on homomorphically encrypted messages. The method of performing hardware-based modular multiplication on homomorphically encrypted messages according to the present invention includes receiving a plurality of homomorphically encrypted messages expressed in a polynomial form and a modulus for modular multiplication, decomposing the modulus into a product of a plurality of disjoint factors through CRT operation, and extracting a divided ciphertext from a plurality of homomorphically encrypted messages based on each of the disjoint factors, performing NTT transformation on each coefficient of the divided ciphertext, performing a pointwise multiplication operation between result values of the NTT transformation, performing INTT transformation on a result value of the pointwise multiplication operation to obtain the divided ciphertext, and merging the divided ciphertext obtained in the performing of the INTT transformation through ICRT operation to generate an output ciphertext.
Abstract:
Disclosed are a system and a method for controlling a vehicle at an intersection, and more particularly, disclosed is a technology that can efficiently control a start time of a vehicle that is waiting for a signal at an intersection. The system includes: a simultaneous starting group designating unit which designates vehicles of a simultaneous starting group, which are capable of starting simultaneously, among waiting vehicles when receiving an intersection entering state message from vehicles; a session key generating unit generating a session key for the simultaneous starting group; a message generating unit which generates a start request message for the simultaneous starting group; and a control unit which receives the intersection entering state message and transmits the session key and the start request message to the vehicles corresponding to the simultaneous starting group.
Abstract:
Provided is an integrity verification method performed in a virtualization system. Specifically, the integrity verification method may include receiving a security key for integrity verification from a mobile device, and verifying an integrity of a test target based on integrity verification information on the test target in a virtualization system using the received security key.
Abstract:
Provided are a system and method for detecting an abnormal behavior of a control system by analyzing flows of the control system. Flow information of the control network is collected, and flows are classified according to the collected flow information and a flow group is generated. An abnormal behavior of the control system is detected by analyzing flows of the generate flow group. That is, internal systems of the control network are grouped according to functions, and a situation of a system of a group performing the same function is managed to thus quickly detect an abnormal behavior of the control system.
Abstract:
Disclosed is a user authenticating method in a web mash-up circumstance, including: requesting, by a mash-up server, updating an access authority token for accessing a data server to an authentication server; requesting, by the authentication server, a user authentication to the mash-up server; and issuing, by the authentication server, the updated access authority token to the mash-up server based on a response result to the user authentication request.