• Title/Summary/Keyword: 공격 분류

Search Result 459, Processing Time 0.024 seconds

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.

Analysis on the Character shown in Frame Position (프레임 위치에서 나타난 등장인물 분석)

Sleep and Suicidal Risk Factors in Korean High School Students (고등학생 청소년들의 수면과 자살위험요인)

  • Jeong, Ja-Hyun;Jang, Yong-E;Lee, Hae-Woo;Shim, Hyun-Bo;Choi, Jin-Sook
    • Sleep Medicine and Psychophysiology
    • /
    • v.20 no.1
    • /
    • pp.22-30
    • /
    • 2013
  • Objectives: Sleep problems has been consistently reported as a suicidal risk factor in adults and, recently, also in adolescents. In this study, dividing study subjects by the previous suicidal behaviors (suicidal vs non-suicidal), we compared the group differences of suicidal risk factors, and examined the possibility of sleep as a suicidal risk factor. Methods: Study subjects were 561 (271 boys and 290 girls) from a community sample of high school students. Suicidal Risk Behavior Checklist, Center for Epidemiological Study-Depression (CES-D), Symptom Checklist-90-Revision (SCL-90-R) Anxiety and Aggression subscale, Pittsburg Sleep Quality Index (PSQI) were done. Results: Forty six students (8.1%) reported previous actual self-harm behavior as a suicidal attempt, 181 students (32.4%) reported having suicidal thought only. Three hundred thirty four students (59.5%) reported no previous suicidal behavior (thought and attempt, both). Suicidal behavior group showed higher score on risk behaviors such as school violence, substance use and internet addiction. CES-D, SCL-90-R, PSQI showed significant group difference. Logistic regression analysis showed suicidal risk were significantly associated with depression, stress in suicidal risk factors and sleep latency, daytime dysfunction in PSQI. Analysis of variance (ANOVA) shows the most prolonged sleep latency and increased index of all PSQI components except sleep efficiency in suicidal attempt group. Conclusions: Sleep Problems had a strong association with the suicidal risk behavior in adolescents. Sleep problems, especially, prolonged sleep latency, daytime dysfunction might be important markers for suicidal behavior. Screening for sleep problems in adolescents are encouraged for the parents, school teachers, and related medical physicians.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Intestine Bacterial Microbiota of Asian Hornet (Vespa Velutina Nigrithorax) and Honey Bee (등검은말벌과 꿀벌의 장내 세균 군집 비교)

  • Kim, Euyeon;Seo, Jeongwon;Yang, So Hee;Kim, In-Seon;Koo, Yeonjong
    • Korean Journal of Environmental Agriculture
    • /
    • v.37 no.2
    • /
    • pp.135-140
    • /
    • 2018
  • BACKGROUND: The Asian hornet (Vespa velutina nigrithorax), a wasp species, has attacked honey bee populations and affected the beekeeping industry in Korea over the past 15 years. However, little research has been done with this invasive species. In this study, we investigated the intestine bacterial microbiota of Asian hornets and honey bees to design an attractive trap for Asian hornets. METHODS AND RESULTS: Genomic DNAs isolated from the intestine microorganisms of Asian hornets and honey bees were utilized to amplify bacterial 16S rDNA for the comparative sequence analysis. The next generation sequencing analysis identified that the orders Flavobacteriales as the most abundant intestinal microorganisms in Asian hornets, showing a clear difference compared to honey bees in which Aeromonadales are dominant. We also report five newly identified 16S rDNA sequences of Asian hornet intestinal bacteria. According to the sequence blast search, these five bacteria belong to the genera Thalassomonas, Caedobacter, Vampirovibrio, Alkaliphilus and Calothrix. CONCLUSION: While Asian hornets and honey bees show similar intestine bacterial diversity, the relative ratio of bacterial populations is different. providing useful information to design pest control agents specifically targeting Asian hornets.

A research on improving client based detection feature by using server log analysis in FPS games (FPS 게임 서버 로그 분석을 통한 클라이언트 단 치팅 탐지 기능 개선에 관한 연구)

  • Kim, Seon Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1465-1475
    • /
    • 2015
  • Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.

Response Methods against Acts of Terrorism That Utilize Unmanned Aircraft (무인항공기 테러의 대응방안)

  • OH, Jea-Hwan
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.61-83
    • /
    • 2012
  • Al-Qaeda follower who planned to attacks the Pentagon and the Assembly by unmanned aircraft equipped with explosives was caught in the dictionary in September 2011. In addition, high-performance unmanned aerial vehicles in the United States 'sentinel' of the technology being leaked to Iran in late 2011 was an accident. Terrorist attacks on the forces used unmanned aircraft will be the day the not too distant. The purpose of this research is to provide response plans against acts of terrorism utilizing unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. Discussing in detail, this research suggests revising and newly implementing the definition and categorization of unmanned aircrafts as well as relevant punishment in current aeronautics regulations as an initial response against acts of terrorism utilizing unmanned aircrafts. This is in order to newly implement and revise current relevant regulations that inadequately address the rapidly developing and changing unmanned aircrafts which will lead to increased sense of alarm for the potential terrorists, and also to introduce a systematic tool to punish those who commit such acts by clearly establishing the grounds for punishment. Also, under the binary operating system over airspace currently implemented globally, it is impossible to identify and control the infiltration of airspace by unmanned aircrafts. Recognizing such limitations, this research suggests a combined operation of airspace for unmanned and manned aircrafts as a second way of response for acts of terrorism utilizing unmanned aircrafts. A systematic integrated operation of airspace will appropriately control unmanned/ manned aircrafts that were not previously reported or otherwise have deviated from navigation routes, and will be able to prevent terrorism attempts utilizing aircrafts beforehand.

  • PDF

Analysis on the Comparison of Cartoon and Satirical Cartoon for Signification of Sign (카툰과 만평의 유머와 풍자 비교 분석)

  • Park, Keong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.31
    • /
    • pp.91-116
    • /
    • 2013
  • The accessibility and effect of cartoon on children are very significant. Since cartoon is a medium of conveying information through text and pictures, it has a characteristic of being easily approached by children than any other medium. Its accessibility to children is inevitably more exceptional than any other medium in the sense that it is a method of not only telling or reading stories but also showing stories. The main audience of is children. It has a characteristic of being easily accepted by children since it's mythology seen in cartoon than read in text. However, gods conducts are full of unethical expressions. Sexual expressions of intermarriages between mother and son, between brother and sister and between uncle and niece, as well as extramarital intercourse are very unethical that could have negative effects on children. This study analyzed the unethical expressions of gods that could have negative effects on children at current point in time. Zeus was often unfaithful to his wife with many stories about the children of Zeus that were created from extramarital intercourse. Standard of value on rational decision has been established for adult readers, but children can readily accept things since they lack their own rational decision on what's right and wrong. As an alternative to children's uncritical observatory study, there is a need for author's intervention to help children form desirable values. The purpose of this study is to analyze the sexual expressions of Zeus and gods in that could affect children's social study.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

A Detection Model using Labeling based on Inference and Unsupervised Learning Method (추론 및 비교사학습 기법 기반 레이블링을 적용한 탐지 모델)

  • Hong, Sung-Sam;Kim, Dong-Wook;Kim, Byungik;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.65-75
    • /
    • 2017
  • The Detection Model is the model to find the result of a certain purpose using artificial intelligent, data mining, intelligent algorithms In Cyber Security, it usually uses to detect intrusion, malwares, cyber incident, and attacks etc. There are an amount of unlabeled data that are collected in a real environment such as security data. Since the most of data are not defined the class labels, it is difficult to know type of data. Therefore, the label determination process is required to detect and analysis with accuracy. In this paper, we proposed a KDFL(K-means and D-S Fusion based Labeling) method using D-S inference and k-means(unsupervised) algorithms to decide label of data records by fusion, and a detection model architecture using a proposed labeling method. A proposed method has shown better performance on detection rate, accuracy, F1-measure index than other methods. In addition, since it has shown the improved results in error rate, we have verified good performance of our proposed method.