• Title/Summary/Keyword: 대응 지능화

Search Result 161, Processing Time 0.022 seconds

Information Security Strategy by Risk Factors based on Smart Railway Communications (스마트 철도 통신기반 위험요인에 따른 정보보호 방안)

  • Park, Eun-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.695-702
    • /
    • 2022
  • Smart railway system, which has been actively studied in recent years, is entering the intelligent stage beyond the automation stage based on ICT (Information & Communication Technology) such as communication technology and information technology. ICT technology used in smart railways is generally supported by various information protection technologies as it is vulnerable to information infringement. As a means of high-speed/mass transportation, it is essential to devise an information protection plan for ICT technology that forms the basis for smartening the railway system. Therefore, this paper presents the necessity of step-by-step information protection that measures for smart railway communication by examining potential risk factors of smart railway communication base and considering information protection factors that can respond to them.

Issues and Roles of the Transportation Technology under the Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 교통기술의 이슈와 역할)

  • Lee, Chungwon;Byun, Wanhee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.2D
    • /
    • pp.259-263
    • /
    • 2006
  • As the concept of Ubiquitous Computing has become an important issue, we need to have a voice in the field of Transportation. Ubiquitous Computing means that IT network based on realization of 5 Any(Anytime, Anywhere, Anything, Anynetwork, Anydevice) is deeply penetrated into our daily life. As ITS has developed with the aid of IT and Transportation Technology together, we need to discuss u-Transportation concept with Ubiquitous Computing and Transportation Technology. According to the recent papers and studies, Transportation or Transportation Information sector is mentioned as a major application of Ubiquitous Computing. However, most of the studies are limited to the basic concept without any in-depth understanding about Transportation. This paper present the implementation of u-Transportation and the role of Transportation Technology based on recent technology trend.

스마트 항로표지 수집정보의 연동 시험 시나리오 설계

  • 오세웅;김윤지;강동우;박세길;장준혁
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.311-313
    • /
    • 2023
  • 자율운항선박, 스마트 해상물류 등 미래 해상환경의 패러다임 변화에 대응하여 항로표지 현장시설을 고도화하고 신해상교통인프라 지능화 및 정보서비스 개발을 위해 스마트 항로표지 및 연계기술 개발 사업을 수행하고 있다. 본 사업의 1단계 연구 성과로 스마트 항로표지 통합플랫폼과 항로표지 서비스 성능시험환경이 구축되는데, 본 연구에서는 스마트 항로표지 통합 플랫폼에 설치된 각종 센서에서 수집된 정보를 육상의 성능시험환경으로 연동 시험에 관한 시나리오를 설계하였다. 스마트 항로표지 통합 플랫폼 및 장착되는 센서에 사전에 설계된 해양자원명을 부여하고 항로표지 정보관리시스템의 등록하는 절차를 제시하였고, 실시간으로 수집되는 항로표지 정보를 연동하여 빅데이터 분석 플랫폼으로 저장하고, 저장한 정보를 항로표지 서비스로의 적용과 활용에 관한 시나리오 설계 결과를 검토하였다.

  • PDF

The role of Forensic Nurse in the situation of Sexual Assault (성폭력 발생시 법의간호사의 역할)

  • Youk, Gi-Young;Kwak, Jyung-Sik
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.31-44
    • /
    • 2006
  • The importance regarding the notion of immediate medical treatment and nursing for the victims of sexual crimes is not widely recognized yet in Korea. Throughout this research is focused on the nursing systems and the system of foreign countries in reference to sexual crime victims, and the conclusion is as follows. In Korea, there are currently no educational or medical institutes for the medical handling for the victims of sexual crimes, and the role of nurses in the medical institutes is insufficient. In addition, the basis for the standard of operation regarding the initial response, evidence collection, pursuit of systematical evidence and data is not established even in the sexual assault counseling/advocacy center. Therefore, it is necessary to foster the sexual assault nurse examiner for the sexual crime victims, and to develop adequate training programs based on the present situation in Korea. Though the cooperation among government, medical institutes, and social movement groups, it is essential to initiate effective and publicly-trusted specialized training programs for forensic nurses who will be fully charged with the treatment of sexual crime victims. By introducing the sexual assault nurse examiner system, it can be possible to develop advanced treatment for the child or adolescent victims of sex crimes.

  • PDF

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

A Comparative Study of Smart Manufacturing Innovation Supply Industry in Germany and Korea (독일과 한국의 스마트 제조혁신 전략에 대한 비교분석 및 시사점 - 양국의 공급산업 전략을 중심으로 -)

  • Sang-Jin Lee;Yun-Hyeok Choi;Jae Kyu Myung
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.601-608
    • /
    • 2022
  • This study examines the current status of smart manufacturing innovation policies in Germany and Korea, compares and analyzes the supply industry strategies of both countries, and suggests the direction for Korea's smart manufacturing innovation supply industry. Germany's supply industry strategy aims to strengthen the market dominance of domestic suppliers through high technology, compatibility, and high reliability based on reference for global demanding companies. On the other hand, the Korea's supply industry strategy remains at the level improvement of the demanding companies by stage, so it is time to take a long-term and consistent response with the goal of implementing smartization at the advanced level. By referring to Germany's supply industry strategy for the advancement of smart factories, it was intended to help in establishing government support policies and supplier strategies. In addition, based on the analysis results of the supply industry strategies of both countries, improvement measures for the advancement of Korea's smart factories were presented. Ultimately, the contents of this study can be used as basic data for policy establishment to strengthen the industrial competitiveness of Korea's small and medium-sized suppliers.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.

Detection of Abnormal Traffic by Pre-Inflow Agent (사전유입 에이전트가 발생하는 이상트래픽 탐지 방안)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1169-1177
    • /
    • 2018
  • Modern society is a period of rapid digital transformation. This digital-centric business proliferation offers convenience and efficiency to businesses and individuals, but cyber threats are increasing. In particular, cyber attacks are becoming more and more intelligent and precise, and various attempts have been made to prevent these attacks from being discovered. Therefore, it is increasingly difficult to respond to such attacks. According to the cyber kill chain concept, the attacker penetrates to achieve the goal in several stages. We aim to detect one of these stages and neutralize the attack. In this paper, we propose a method to detect anomalous traffic caused by an agent attacking an external attacker, assuming that an agent executing a malicious action has been introduced in advance due to various reasons such as a system error or a user's mistake.