• Title/Summary/Keyword: 공격 분류

Search Result 455, Processing Time 0.025 seconds

Development of Traffic Safety Behavioral Index on Elementary School Children (초등학교 어린이 교통안전 행동지수 검사도구 개발연구)

  • Hwang, Dae-Chul;Choi, Beom-Seok
    • International Journal of Highway Engineering
    • /
    • v.13 no.4
    • /
    • pp.187-198
    • /
    • 2011
  • Researches on children's traffic behavior have only focused on traffic accidents and the number of accidents, and therefore it's been impossible to deal with more broad field of study. In this research we can review the possibility of traffic accidents of children and provide them with traffic education. The goal of this research is to develop a device for measuring possibility of children in terms of traffic behavior. Around 600 elementary students of two schools involved in the pretest with 259 questions and about 3,500 students(junior level 53 questions & senior level 72 questions) involved in practical test. At the result of the research, junior level extracted 4 factors(Lack of behavioral control, Aggressive, Self-regulation, Impulsive Instinct) and 44 questions, and senior level extracted 4 factors(Lack of behavioral control, Depression, Sense-oriented, Aggressive) and 69 questions. We take the gender consideration in separate the groups whether the group has traffic behavioral problem or not. In these series of research, we got the standard score such as junior male student, 63 & female student, 50 and senior male student, 110 & female student, 99.

BEHAVIORAL CHARACTERISTICS IN ATTENTION DEFICIT HYPERACTIVITY DISORDER - COMPARISONS OF ATTENTION DEFICIT DISORDER WITH AND WITHOUT HYPERACTIVITY - (주의력 결핍 과잉활동장애의 행동 특성 - 과잉활동성 유무에 따른 임상적 특성의 비교 -)

  • Song, Dong-Ho;Joung, Yoo-Sook;Lee, Hong-Shick
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.4 no.1
    • /
    • pp.106-113
    • /
    • 1993
  • Using a reliable assessment procedure and according to the severity of hyperactivity, thirty-six clinic-referred outpatients, 6-12 years of age, were given a diagnosis of Attention Deficit Disorder with Hyperactivity(ADD+H) or without Hyperactivity(ADD-H). Comparisons of behavioral measurement by Conners Rating Scale(CRS) and Home/School Situations Questionnaire(HSQ/SSQ) revealed that the children with ADD+H displayed more pervasive behavior problems at home and school than the children with ADD-H. Also the children with ADD+H were more likely to be delinquent and aggressive compared to the children with ADD-H when using the Child Behavior Check-list(CBCL) for parents Hyperactivity symptom in ADHD is highly correlated with aggression scale on CBCL These finding suggest that ADD+H and ADD-H may differ in clinical disease entity.

  • PDF

A Study on Management Strategies and Management Performance According to Organizational Culture Types in the Digital Economy Era (디지털 경제 시대의 조직문화 유형에 따른 경영전략 및 경영성과에 관한 연구)

  • Lee, Sangho;Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.85-96
    • /
    • 2022
  • The purpose of this study was to investigate how the management strategies and organizational culture required in the digital economy have an effect on business performance. It provided basic data on management strategies and organizational culture necessary to approach as a digital leading country. For data collection, a survey was conducted from March 1 to May 30, 2022 for companies located in J province and engaged in industries related to the digital economy. The survey was conducted online and non-face-to-face, and a total of 225 companies participated in the survey. For statistical analysis, frequency analysis, exploratory factor analysis and reliability analysis, cluster analysis, independent sample t-test, and multiple regression analysis were performed. The research results are as follows. First, organizational culture was classified into high and low groups according to preference in innovation oriented, relationship oriented, task oriented, and hierarchical oriented. Second, the 4 types of organizational culture showed differences in prospectors strategy, analyzers strategy, defenders strategy, differentiation strategy, cost leadership strategy, financial performance, and non-financial performance according to preference. Third, management strategies affecting financial performance were found to be analyzers strategy, differentiation strategy, prospectors strategy, and cost leadership strategy. Fourth, management strategies affecting non-financial performance were found to be differentiation strategy, defenders strategy, analysis strategy, offensive strategy, cost leadership strategy, and focus strategy. Fifth, organizational culture affecting financial performance was found to be task oriented. Sixth, organizational culture affecting non-financial performance was found to be innovation oriented and relationship oriented. Through these studies, it is expected that the economy will be revitalized in the domestic market and a growth ecosystem that can take a new leap forward is created in the global market.

The Intelligent Intrusion Detection Systems using Automatic Rule-Based Method (자동적인 규칙 기반 방법을 이용한 지능형 침입탐지시스템)

  • Yang, Ji-Hong;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.531-536
    • /
    • 2002
  • In this paper, we have applied Genetic Algorithms(GAs) to Intrusion Detection System(TDS), and then proposed and simulated the misuse detection model firstly. We have implemented with the KBD contest data, and tried to simulated in the same environment. In the experiment, the set of record is regarded as a chromosome, and GAs are used to produce the intrusion patterns. That is, the intrusion rules are generated. We have concentrated on the simulation and analysis of classification among the Data Mining techniques and then the intrusion patterns are produced. The generated rules are represented by intrusion data and classified between abnormal and normal users. The different rules are generated separately from three models "Time Based Traffic Model", "Host Based Traffic Model", and "Content Model". The proposed system has generated the update and adaptive rules automatically and continuously on the misuse detection method which is difficult to update the rule generation. The generated rules are experimented on 430M test data and almost 94.3% of detection rate is shown.3% of detection rate is shown.

Cyber Security Governance Analysis in Major Countries and Policy Implications (주요국 사이버보안 거버넌스 분석과 정책적 시사점)

  • Joo, Moon-ho;Kwon, Hun-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1259-1277
    • /
    • 2018
  • This study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Under this goal, this study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Based on the results of this analysis, this study suggests suggestions and directions for improvement of domestic cyber security governance.

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.

A tamper resistance software mechanism using MAC function and dynamic link key (MAC함수와 동적 링크키를 이용한 소프트웨어 변조 방지 기법)

  • Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.11-18
    • /
    • 2013
  • In order to prevent tampering and reverse engineering of executive code, this paper propose a new tamper resistant software mechanism. This paper presents a cryptographic MAC function and a relationship which has its security level derived by the importance of code block instead of by merely getting the encryption and decryption key from the previous block. In this paper, we propose a cryptographic MAC function which generates a dynamic MAC function key instead of the hash function as written in many other papers. In addition, we also propose a relationships having high, medium and low security levels. If any block is determined to have a high security level then that block will be encrypted by the key generated by the related medium security level block. The low security block will be untouched due to efficiency considerations. The MAC function having this dynamic key and block relationship will make analyzing executive code more difficult.

Policy of packet dropping for enhancing IDS performance (IDS의 성능 향상을 위한 패킷 폐기 방안)

  • Moon, Jong-Wook;Kim, Jong-Su;Jung, Gi-Hyun;Yim, Kang-Bin;Joo, Min-Kyu;ChoI, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.473-480
    • /
    • 2002
  • Although many researches on IDS (Intrusion Detection System) have been performed, the most of them are limited to the algorithm of detection software. However, even an IDS with superior algorithm can not detect intrusion, if it loses packets which nay have a clue of intrusions. In this paper, we suggest an efficient wav to improve the performance of IDS by reducing packet losses occurred due to hardware limitation and abundant processing overhead introduced by massive detection software itself. The reduction in packet losses is achieved by dropping hacking-free packets. The result shows that this decrease of packet losses leads an IDS to improve the detection rate of real attack.

A Design of a Korean Programming Language Ensuring Run-Time Safety through Categorizing C Secure Coding Rules (C 시큐어 코딩 규칙 분류를 통한 실행 안전성을 보장하는 한글 언어 설계)

  • Kim, Yeoneo;Song, Jiwon;Woo, Gyun
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.487-495
    • /
    • 2015
  • Since most of information is computerized nowadays, it is extremely important to promote the security of the computerized information. However, the software itself can threaten the safety of information through many abusive methods enabled by coding mistakes. Even though the Secure Coding Guide has been proposed to promote the safety of information by fundamentally blocking the hacking methods, it is still hard to apply the techniques on other programming languages because the proposed coding guide is mainly written for C and Java programmers. In this paper, we reclassified the coding rules of the Secure Coding Guide to extend its applicability to programming languages in general. The specific coding guide adopted in this paper is the C Secure Coding Guide, announced by the Ministry of Government Administration and Home Affairs of Korea. According to the classification, we applied the rules of programming in Sprout, which is a newly proposed Korean programming language. The number of vulnerability rules that should be checked was decreased in Sprout by 52% compared to C.

Scenarios for Effective Fire Fighting Operations during Tunnel Fires (도로터널 화재시 효과적인 소방활동전략 수립을 위한 시나리오 연구)

  • Kim, Hak kuen;Lee, Ji-hee
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.107-116
    • /
    • 2017
  • Fires in tunnels are an international concern and fatal accidental fires in tunnels seem to occur on annual. They have the potential to become much worse int the future as more and longer tunnels are constructed and as traffic densities increase. This is a serious problem. The main purpose of this study is to develop operational procedures for fire brigades in road tunnel fires. This study discussed the past to see what can be learned from the incidents that have already done in tunnels. 73 cases of road tunnel fires domestic and outside of Korea were investigated and classified into 4 incident categories. Among them, 4 tunnel fires are highlighted, focusing on the activities of fire brigades and operation. Regarding the establishment of the strategies for fire fighting, 6 kinds of fire scenario curves have been deducted with regard to the relation between intervention time and heat release rate. It made the choice from the defensive or aggressive fire fighting activities depending on two criteria i.e. response limit and maximum response time. Road Tunnel Classification models can be useful when a fire brigade evaluates fire risk levels in the tunnels under its jurisdiction from the firefighting point of view and sets up preventive measures.