• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.026 seconds

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.

A design of Optimized Vehicle Routing System(OVRS) based on RSU communication and deep learning (RSU 통신 및 딥러닝 기반 최적화 차량 라우팅 시스템 설계)

  • Son, Su-Rak;Lee, Byung-Kwan;Sim, Son-Kweon;Jeong, Yi-Na
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.2
    • /
    • pp.129-137
    • /
    • 2020
  • Currently, The autonomous vehicle market is researching and developing four-level autonomous vehicles beyond the commercialization of three-level autonomous vehicles. Because unlike the level 3, the level 4 autonomous vehicle has to deal with an emergency directly, the most important aspect of a four-level autonomous vehicle is its stability. In this paper, we propose an Optimized Vehicle Routing System (OVRS) that determines the route with the lowest probability of an accident at the destination of the vehicle rather than an immediate response in an emergency. The OVRS analyzes road and surrounding vehicle information collected by The RSU communication to predict road hazards, and sets the route for the safer and faster road. The OVRS can improve the stability of the vehicle by executing the route guidance according to the road situation through the RSU on the road like the network routing method. As a result, the RPNN of the ASICM, one of the OVRS modules, was about 17% better than the CNN and 40% better than the LSTM. However, because the study was conducted in a virtual environment using a PC, the possibility of accident of the VPDM was not actually verified. Therefore, in the future, experiments with high accuracy on VPDM due to the collection of accident data and actual roads should be conducted in real vehicles and RSUs.

A Study on the Development of Energy IoT Platform (에너지 IoT 플랫폼 개발에 관한 연구)

  • Park, Myung Hye;Kim, Young Hyun;Lee, Seung Bae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.311-318
    • /
    • 2016
  • IoT(Internet of Things areas) rich information based on the user easy access to service creation must be one of the power system of specificity due following: The IoT spread obstacle to the act be, and 'Smart Grid information of this is not easy under power plants approach the Directive on the protection measures, particularly when stringent security policies IoT technologies applied to Advanced Metering Infrastructure sector has been desired. This is a situation that occurs is limited to the application and use of IoT technologies in the power system. Power Information Network is whilst closed network operating is has a smart grid infrastructure, smart grid in an open two-way communication for review and although information security vulnerabilities increased risk of accidents increases as according to comprehensive security policies and technologies are required and can. In this paper, the IoT platform architecture design of information systems as part of the power of research and development IoT-based energy information platform aims. And to establish a standard framework for a connection to one 'Sensor-Gateway-Network-platform sensors Service' to provide power based on the IoT services and solutions. Framework is divided into "sensor-gateway" platform to link information modeling and gateways that can accommodate the interlocking standards and handling protocols variety of sensors Based on this real-time data collection, analysis and delivery platform that performs the role of the relevant and to secure technology.

The Structural Relationship among Trust in MIM, Attitude toward Emoticons, and the Intention to Purchase Emoticons in Kakao Talk (모바일 인스턴트 메신저에 대한 신뢰, 이모티콘 사용 태도와 이모티콘 구매의도 사이의 구조적 관계: 카카오톡 사례)

  • Jung, Bohee;Bae, Jungho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.311-325
    • /
    • 2016
  • The communication via MIM(Mobile Instant Messenger) has unique characteristics; one of them is use of emoticons. Although using emoticons in MIM is getting a lot of attention from business fields and emoticons markets in MIM is growing rapidly, there are little researches focused on emoticons in MIM in consumer behaviors and marketing area. So, the purpose of this study is to fill this theoretical and practical gap. For this purpose, we explore the effect of and trust in MIM system and attitude toward use of emoticons on purchase intention to emotions in MIM. Our study used structural equation modeling analysis; the results showed that perceived benefits and perceived risk to MIM affected trust in MIM system significantly, more specifically, while perceived benefits affected trust in MIM system positively, perceived risk affected trust in MIM system negatively. We also found that perceived usefulness of emoticon in MIM and flow experience influenced attitude toward use of emoticons positively. Lastly, trust in MIM system and attitude toward use of emoticons had positive effect on purchase intention to emoticons in MIM. The implication and limitations of this study are also discussed.

Methods for Enhancing Reliability of On-Ground IoT Applications (지상용 IoT 애플리케이션의 신뢰성 향상 기법)

  • Shin, Dong Ha;Han, Seung Ho;Kim, Soo Dong;Her, Jin Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.151-160
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing environment to provide valuable services by interacting with multiple devices, where diverse devices are connected within the existing Internet infrastructure and acquire context information by sensing. As the concern of IoT has been increased recently, most of the industries develop many IoT devices. And, many people are focused on the IoT application that is utilizing different technologies, which are sensor network, communication technologies, and software engineering. Developing on-ground IoT application is especially even more active in progress depending on increasing of on-ground IoT devices because it is possible for them to access dangerous and inaccessible situation. However, There are a few studies related IoT. Moreover, since on-ground IoT application, which is different from typical software application, has to consider device's characteristics, communication, and surround condition, it reveal challenges, decreasing reliability. Therefore, in this paper, we analyze reliability challenges related to maturity and fault tolerance, one of reliability attributes, occurring in developing on-ground IoT applications and suggest the effective solutions to resolve the challenges. To verify proposed the challenges and solutions, we show result that is applying the solutions to applications. By presenting the case study, we evaluate the effectiveness of applying the solutions to the application.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Appropriateness of Location of Nuclear Accident Evacuation Shelters based on Population Characteristics and Accessibility -The Case of Busan Gijang-gun, Geumjeong-gu and Haeundae-gu in Korea- (인구특성과 접근성을 고려한 방사능재난 대피시설 입지 적정성 분석 -부산광역시 기장군, 금정구, 해운대구를 대상으로-)

  • DONG, Ah-Hyeon;LEE, Sang-Hyeok;KANG, Jung-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.131-145
    • /
    • 2019
  • Korea has set up a radiation emergency planning zone based on the 「Act on Physical Protection and Radiological Emergency」 to protect residents living near nuclear power plants in the event of nuclear disasters. Little research has been conducted on the appropriateness of existing nuclear evacuation facilities because of a general lack of interest in nuclear accidents. This research addresses this gap by analyzing the location adequacy of evacuation facilities in Busan's emergency protection planning area based on vulnerable populations and accessibility analyses. The Gijang-gun which has the greatest risk, shows that only 4.05% of the total urban area was included in the evacuation service area within 5 minutes while only 36.93% of Geumjeong-gu and 37.23% of Haeundae-gu were included in the evacuation-enabled area. In addition, evaluation facilities in the elderly population hotspots were lacking, and there was a wide gap between dongs within the same Gu. Thus, additional evacuation facilities need to be designated and installed considering the spatial equity between areas and safety of both the public and vulnerable populations.

IPv6 기반의 정보 공유 P2P 개발

  • 이재준;김유정;안철현;이영로
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.21-27
    • /
    • 2003
  • 분산컴퓨팅, 다자간 협업, 대용량 고품질의 컨텐츠 교환을 지원하는 P2P는 차세대 인터넷의 핵심 어플리케이션이 될 것이다. 본래 인터넷의 근본이었던 IP 라우팅도 P2P 방식이었다. 장비가 다양해지고, PC가 증가하게 됨에 따라 동적 IP를 사용하거나, 하나의 IP를 여러 사람이 공유하여 사용하는 복잡한 방식을 취하기 시작했다. 그러나 새로운 IP 주소들이 충분히 공급될 수 있다면, 하나의 장치 당 하나의 주소 체제가 다시 각광을 받게 될 것이고, 지금처럼 불규칙적인 동적 IP 주소를 활용하지 않아도 될 것이다. 그런 의미에서 IPv6는 풍부한 주소자원을 각 단말에 부여할 수 있어, IPv16 기반의 P2P 구축은 P2P의 성능을 최적화하는 방법이 될 것이다. 현재 P2P는 콘텐츠 공유 및 전달, 네트워크/장치(하드디스크, CPU) 리소스 공유, 다자간 원격협업, 검색, 호스팅 및 프로젝트 관리 등 다양한 방법으로 활용되고 있다. 2000년경부터 대두되기 시작한 P2P 애플리케이션은 지난 2년 동안 급속하게 늘어났으며, 특히 인터넷 사용자들은 컨텐츠를 공유/전달할 목적으로 P2P를 많이 사용하고있다. 그러나 컨텐츠의 공유에 있어 MP3, 동영상, 이미지의 전달 및 공유에 그치고 있어, P2P를 기업 환경에서 지식공유 및 전달을 위한 시스템으로 활용하는 경우는 아직 미약하다. 그러므로 본 논문에서는 조직 내에서 정보활용 능력을 제고하기 위한 방안으로 P2P 시스템을 정보 공유 시스템으로 팔용하고, P2P의 성능을 최적화 할 수 있는 IPv6 기반의 개발 방안을 제안하고자 한다. 본 IPv6 기반의 정보 공유 P2P는 IPv6 전문가 그룹을 통해 시범적으로 적응하는 것으로 시작해, 학교 및 연구소를 통한 정보지식 공유 그리고 기업 정보화 솔루션으로 활용 될 수 있다.을 제시한다. 이렇게 함으로써 최대한 고객 납기를 만족하도록 계획을 수립할 수 있게 된다. 본 논문에서 제시하는 계획 모델을 사용함으로써 고객 주문에 대한 대응력을 높일 수 있고, 계획의 투명성으로 인한 전체 공급망의Bullwhip effect를 감소시킬 수 있는 장점이 있다. 동시에 이것은 향후 e-Business 시스템 구축을 위한 기본 인프라 역할을 수행할 수 있게 된다. 많았고 년도에 따른 변화는 보이지 않았다. 스키손상의 발생빈도는 초기에 비하여 점차 감소하는 경향을 보였으며, 손상의 특성도 부위별, 연령별로 다양한 변화를 나타내었다.해가능성을 가진 균이 상당수 검출되므로 원료의 수송, 김치의 제조 및 유통과정에서 병원균에 대한 오염방지에 유의하여야 할 것이다. 확인할 수 있었다. 이상의 결과에 의하면 고농도의 유기물이 함유된 음식물쓰레기는 Hybrid Anaerobic Reactor (HAR)를 이용하여 HRT 30일 정도에서 충분히 직접 혐기성처리가 가능하며, 이때 발생된 $CH_{4}$를 회수하여 이용하면 대체에너지원으로 활용 가치가 높은 것으로 판단된다./207), $99.2\%$(238/240), $98.5\%$(133/135) 및 $100\%$ (313)였다. 각각 두 개의 요골동맥과 우내흉동맥에서 부분협착이나 경쟁혈류가 관찰되었다. 결론: 동맥 도관만을 이용한 Off pump CABG를 시행하여 감염의 위험성을 증가시키지 않으면서 영구적인 신경학적 합병증을 일으키지 않았고 좋은 혈관 개존율을 보여주었다. 따라서 동맥 도관을 이용한 Off pump CABG는 관상동맥의 협착의 정도에 따라 효율적으로 시행 시 좋은 임상결과를 얻을 수 있을 것으로 생각된다.였다. 그러나 심근 기능이나

  • PDF

Study on Application of Big Data in Packaging (패키징(Packaging) 분야에서의 빅데이터(Big data) 적용방안 연구)

  • Kang, WookGeon;Ko, Euisuk;Shim, Woncheol;Lee, Hakrae;Kim, Jaineung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.23 no.3
    • /
    • pp.201-209
    • /
    • 2017
  • The Big Data, the element of the Fourth Industrial Revolution, is drawing attention as the 4th Industrial Revolution is mentioned in the 2016 World Economic Forum. Big Data is being used in various fields because it predicts the near future and can create new business. However, utilization and research in the field of packaging are lacking. Today packaging has been demanded marketing elements that effect on consumer choice. Big data is actively used in marketing. In the marketing field, big data can be used to analyze sales information and consumer reactions to produce meaningful results. Therefore, this study proposed a method of applying big data in the field of packaging focusing on marketing. In this study suggest that try to utilize the private data and community data to analyze interaction between consumers and products. Using social big data will enable to understand the preferred packaging and consumer perceptions and emotions in the same product line. It can also be used to analyze the effects of packaging among various components of the product. Packaging is one of the many components of the product. Therefore, it is not easy to understand the impact of a single packaging element. However, this study presents the possibility of using Big Data to analyze the perceptions and feelings of consumers about packaging.

A Comparative Study of Entrepreneurial Motivation, Entrepreneurship and Entrepreneurial Intention between the Students of Experiential Entrepreneurship Class and Theory Centered Class (체험형 창업강좌와 이론형 창업강좌 학습자간의 창업동기, 기업가정신 및 창업의지 비교 연구)

  • Kim, Yong Tae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.4
    • /
    • pp.49-58
    • /
    • 2018
  • In recent years, various studies have been carried out on various types of entrepreneurship and comparative activities according to policy efforts and support such as the activation of a bachelor's degree in the establishment of a university, and attention has been paid to the fact that the participation and the educational effect of the students may be different depending on the type. The purpose of this study is to investigate entrepreneurial motivation, entrepreneurship, and entrepreneurial intention in the case of experiential entrepreneurship class focusing on the theoretical-oriented general entrepreneurship class, And the effect of entrepreneurship on entrepreneurial intention. The data were collected and empirical analysis was conducted to compare the difference between the two groups. The results of this study are as follows: First, out of the motivation factors of entrepreneurs, entrepreneurship education, achievement desire, human network, self - esteem, etc. We can confirm that the motivation of entrepreneurs is recognized more greatly. Second, the entrepreneurship factor was not significantly different from the perception between experiential entrepreneurship lecture and theoretical entrepreneurship learner. Third, experiential entrepreneurship learner perceived more willingness to start business than theoretical entrepreneurship learner. Finally, among the entrepreneurship motivation factors, among the entrepreneurship education, achievement desire and entrepreneurship factor, the risk sensitivity affects the entrepreneurial will. This study suggests that the direction of entrepreneurial education focused on quantitative expansion and the creation of qualitative effects of entrepreneurship education are needed. In the future, it will provide policy implications for revitalizing experiential entrepreneurship education In addition, it can contribute to the diffusion of research on the effect of entrepreneurship education.