• Title/Summary/Keyword: 내부네트워크

Search Result 1,018, Processing Time 0.031 seconds

The Effect of Centralities of Alliance Network on Innovation Performace in Korean Defense Industry (한국 방위산업 제휴네트워크 중심성이 혁신성과에 미치는 영향)

  • Ahn, Hoil;Kim, Changone;Lee, Heesang
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.2
    • /
    • pp.292-317
    • /
    • 2015
  • As modern science and technology and warfare become to be advanced and precise, the weapon systems becomes more complex based on state-of-the-art technology. Therefore, firms in the defense industry continue to accelerate research and development for up-to-date weapon systems with high complexity which urge the firms to collaborate with the external organizations to obtain the knowledge required and eventually to reduce costs and risk. This study tries an empirical study about the effect of collaboration on the innovation performances from the network analysis perspective. By surveying collaboration relationships among 530 firms in the Korean defense industry, we analyzed the alliance network of the defense industry. Network centrality including degree, closeness, and betweenness centralities is investigated and then the relationship among the network centrality property, internal R&D capabilities and innovation is analysed. The results show that firms with high internal R&D capabilities place the firm at center of the network. On the other hand, except for the firms with highly connected centrality, no relationship was found between the internal R&D capabilities and its performance and in turn. these capabilities had both direct and indirect effects on innovation performances through mediated collaboration among firms. This study implied that Korean firms with a high internal R&D capabilities in the defense industry which utilize knowledge, information and resources within the network more frequently show more innovative performance. This result claims the policy makers to participate more firms in fostering open innovation for the defense industry.

A Study on the Intrusion Detection System Using Internal Sensors (내부 센서를 이용한 침입 탐지 시스템에 관한 연구)

  • 장정숙;전용희
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.161-165
    • /
    • 2001
  • 효율적인 네트워크의 보호를 위해 네트워크를 경유한 공격에 대하여 알려진 공격과 새로운 공격에 대한 빠른 탐지와 적절한 대응을 할 수 있는 침입 탐지 시스템(Intrusion Detection System: IDS)에 대하여 최근 관심이 증대되고 있다. 기존의 침입 탐지 시스템들은 다양한 침입에 대한 능동적인 탐지에 어려움이 있다. 본 논문에서는 기존의 침입 탐지 시스템이 가지고 있는, 성능(fidelity) 문제, 자원 사용 문제 및 신뢰성 문제를 해결하기 위하여, 호스트에서 내부 센서를 사용하는 메커니즘에 대하여 고찰하고 분석한다. 그리고 침입 탐지 프레임워크를 구축하기 위한 내부 센서의 개념, 특징 및 능력에 대하여 기술한다.

  • PDF

VPN(Virtual Private Network)기술의 개요

  • 정태명
    • Review of KIISC
    • /
    • v.9 no.4
    • /
    • pp.3-10
    • /
    • 1999
  • 현재의 산업 상황은 제한적인 내부 네트워크의 사용만으로는 충분히 뒷받침할수 없 는 새로운 업무형태로 바뀌었다. 기업에서는 내부 네트워크의 구성뿐만 아니라 증가하는 지 사나 이동 근무자나 재택근무자들을 지원하기 위한 네트워크 확장이 필요하게 되었다. 그러 나 기존 네트워크 구성에서 사용하던 전용선이나 PSTN을 이용하는 방법은 많은 비용 때문 에 기업에 과중한 부담을 가져오게 되었으며 이에 대한 해결책으로 VPN이 제안되었다. VPN은 공중망을 매개로 한 가상적인 네트워크 구성으로서 네트워크 확장에 소요되는 비용 을 크게 절감하고 네트워크 관리를 용이하게 하였다. 특히 근래에 인터넷 사용자가 급격하 게 증가하면서 보안 솔루션으로서의 IP 기반 VPN에 대한 관심이 집중되고 있다, 본 고에서 는 VPN 기술의 전반적인 내용에 대해 소개하고 VPN의 핵심기술이라 할수 있는 터널링 기 술을 IPsec 중심으로 살펴보기로 한다.

  • PDF

A Study of RF Communications Security Threats of Intelligent Vehicle (지능형 자동차에서의 RF 통신 보안 위협에 관한 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.550-552
    • /
    • 2014
  • 차량 내부 네트워크는 LIN, CAN, FlexRay와 같은 제어 네트워크와 MOST와 같은 멀티미디어 네트워크가 있으며 이 내부 네트워크와 연결해 서비스를 사용하는 RF 통신으로는 대표적으로 블루투스, GSM, NFC가 있다. 그러나 능동 안전 시스템과 같은 지능형 기술의 지속적인 도입과 기계, 유압식 기기의 전자화에 따른 네트워크상의 통신량이 급격히 증가하면서 네트워크의 규모 및 통신 복잡도 등이 증가하고 있다. 따라서 차량 내/외부 네트워크의 최적화, 최소화 문제가 반드시 해결되어야하는 문제로 떠오르고 있다. 또한 이러한 통신환경이 갖추어진 이후에도 무선통신 기술의 성능향상 및 통신기술과 응용 서비스 분야와의 연계, 그리고 통신서비스를 위한 사업 모델 개발이 요구되는 등 앞으로 해결 해야하는 문제는 여전히 많이 남아 있다고 할 수 있다. 본 논문에서는 지능형 자동차의 RF 통신서비스에서 발생할 수 있는 지능형자동차의 보안위협 요소를 분석하고자 한다.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

Performance Evaluation of a Switch Router with Output-Buffer (출력 버퍼를 장착한 스위치 라우터의 성능 분석)

  • Shin Tae-zi;Yang Myung-kook
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.244-253
    • /
    • 2005
  • In this paper, a performance evaluation model of the switch router with the multiple-buffered crossbar switches is proposed and examined. Buffered switch technique is well known to solve the data collision problem of the crossbar switch. The proposed evaluation model is developed by investigating the transfer patterns of data packets in a switch with output-buffers. The performance of the multiple-buffered crossbar switch is analyzed. Steady state probability concept is used to simplify the analyzing processes. Two important parameters of the network performance, throughput and delay, are then evaluated. To validate the proposed analysis model, the simulation is carried out on a network that uses the multiple buffered crossbar switches. Less than $2\%$ differences between analysis and simulation results are observed. It is also shown that the network performance is significantly improved when the small number of buffer spaces is given. However, the throughput elevation is getting reduced and network delay becomes increasing as more buffer spaces are added in a switch.

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

Distributed Computing Models for Wireless Sensor Networks (무선 센서 네트워크에서의 분산 컴퓨팅 모델)

  • Park, Chongmyung;Lee, Chungsan;Jo, Youngtae;Jung, Inbum
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.958-966
    • /
    • 2014
  • Wireless sensor networks offer a distributed processing environment. Many sensor nodes are deployed in fields that have limited resources such as computing power, network bandwidth, and electric power. The sensor nodes construct their own networks automatically, and the collected data are sent to the sink node. In these traditional wireless sensor networks, network congestion due to packet flooding through the networks shortens the network life time. Clustering or in-network technologies help reduce packet flooding in the networks. Many studies have been focused on saving energy in the sensor nodes because the limited available power leads to an important problem of extending the operation of sensor networks as long as possible. However, we focus on the execution time because clustering and local distributed processing already contribute to saving energy by local decision-making. In this paper, we present a cooperative processing model based on the processing timeline. Our processing model includes validation of the processing, prediction of the total execution time, and determination of the optimal number of processing nodes for distributed processing in wireless sensor networks. The experiments demonstrate the accuracy of the proposed model, and a case study shows that our model can be used for the distributed application.

The Mediating Effect of Network Embeddedness on Investment Performance of Multinational Manufacturers in China (중국시장에 진출한 다국적제조기업의 투자성과에 미치는 네트워크 배태성의 매개효과 실증분석)

  • Song Gao;Sung-Hoon Lim
    • Korea Trade Review
    • /
    • v.48 no.2
    • /
    • pp.1-26
    • /
    • 2023
  • The purpose of this study is to demonstrate how internal capability adjustments made by subsidiaries in response to local market adaption and market changes, together with the use of internal and external networks, have an impact on the investment performance of such subsidiaries. From the empirical results, it was proven that the larger the extent of internal capability adjustment made by subsidiaries, and the more quickly and flexibly it is implemented, the more positive the investment performance is. The empirical findings also showed that in this process, the use of internal/external network embeddedness has a positive mediating impact on the investment performance. Additionally, the results of statistical analysis support the research hypothesis that external embeddedness has a greater mediating influence on multinational manufacturing companies entering Chinese market than internal embeddedness. It implies to the top managers of subsidiaries that the subsidiary should actively utilize external embeddedness to create a new locational competitive advantage in the local region, as well as develop a strategy to reduce foreignness costs such as cost of adapting to the local system.