• Title/Summary/Keyword: 방어진

Search Result 145, Processing Time 0.023 seconds

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

Mechanical and environmental analysis for beneficial use of contaminant sediments (해양오염토 유효활용과 공학적 분석)

  • Yoon, Gil-Lim;Bae, Yoon-Shin;Yoon, Yeo-Won
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.1377-1380
    • /
    • 2010
  • 본 연구에서는 해양준설퇴적물의 유효활용을 위한 역학적, 환경적 실험을 통한 건설재료로서의 활용성을 검토하였다. 울산 방어진과 진해 행안만에서 수거한 준설토로 고화처리토 및 경량혼합토 공시체를 제작하여 압축특성 및 응력-변형 거동 등 공학적 실험을 실시하였다. 해양오염토 유효활용을 위한 활용방법도 예시하였다.

  • PDF

Linux System Security Using LIDS (LIDS를 이용한 리눅스 시스템 보안)

  • 정수진;김정녀;박승규;최경희;정기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.644-646
    • /
    • 2000
  • 리눅스의 활용 범위가 임베디드 시스템 혹은 웹 서버 등 다방면으로 넓어져 가면서 보안 문제도 이와함께 중요한 연구 및 개발 과제로 떠오르고 있다. Huagang은 Linux의 침입 감지 및 방어를 위하여 LIDS(Linux Intrusion Detection and Defense System)을 개발/발표하였다. LIDS는 시스템의 침입 감지 및 방어에 중점을 둔 시스템으로서 사용자별 파일을 보호하기 위한 개념이나 시스템 관리자를 비롯해 일반 사용자에 이르기까지 전체적인 보안을 만족시키기에는 여러 가지 부족한 면을 가지고 있다. 본 논문에서는 이러한 LIDS의 불편한 점을 보완하여 LIDS의 활용 가능성을 높이었다.

  • PDF

Record-Based Locality of Ulsan during the Joseon Dynasty: Focused on Ulsan Port (기록으로 본 조선시대 울산의 로컬리티: 울산항을 중심으로)

  • Kim, Seonmi;Song, Jung-Sook
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.1
    • /
    • pp.1-25
    • /
    • 2020
  • This study investigated Ulsan locality during Joseon by searching and analyzing various records related to the Ulsan port including old literature, documents, and maps, and oral records relating to traditional knowledge, as well as extracting keywords arranged by the time series and space to reenact Ulsan Port and Ulsan during Joseon. The study examined the characteristics of Yeompo, which served defense and trade functions through Waegwan in the former half of Joseon, Gaewoonpo, Seosaengpo, and Dosanseong, which underwent damage during Imjinwaeran and other wars in middle Joseon, and Bangeojin, which operated state-owned ranches and defense facilities including signal fires through to the latter half of Joseon, Jangsaengpo, which played the role of a whaling zone, and neahwang-naru, iron mine of Dalcheon, trying to reproduce the trajectory of the Ulsan during Joseon. Research on the locality transfiguration process of the port will help establish the locality of the entire Ulsan.

Radioprotective Effects of Propolis on the Mouse Testis Exposed to X-ray. (프로폴리스가 X-선에 노출된 마우스 정소에 미치는 방사선 방어 효과)

  • Ji, Tae-Jung;Kim, Jong-Sik;Jeong, Hyung-Jin;Seo, Eul-Won
    • Journal of Life Science
    • /
    • v.17 no.5 s.85
    • /
    • pp.664-670
    • /
    • 2007
  • The propolis is natural product produced by honeybees and is known to have many biologically useful properties such as anti-microbial, anti-oxidative and anti-tumorigenic activity. However, its radio-protective property has not been well studied. To investigate radio-protective effect of propolis on mouse testis, mice were supplemented with propolis after 5 Gy irradiation. The histological changes of testis were detected by TEM. The results indicate that propolis may protect tissue deformation which is induced by 5 Gy of ionizing radiation. Furthermore, to elucidate the potential molecular mechanisms involved in radio-protective property of propolis, we performed microarray experiments using oligo DNA microarray. We found 65 up-regulated genes and 224 down-regulated genes, whose expression levels were affected more than 2-fold by propolis treatment in mice irradiated at 5 Gy. We confirmed microarray data with reverse transcription-PCR using gene specific primers. The results of RT-PCR are highly correlated with those of microarray. These results may help understanding molecular mechanisms of radioprotective effects by propolis in mouse model.

Analysis for Flood control in Hwapocheon watershed using WashLand (천변저류지를 활용한 화포천 유역에서의 홍수조절능력에 관한 연구)

  • Park, Chang-Kun;Park, Jae-Hyeon;Lee, Jong-Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.331-335
    • /
    • 2007
  • 본 연구에서는 과거 홍수 피해가 빈번히 발생 하였던 김해 화포천 유역의 홍수 위험도를 산정하고 이를 통해 천변 저류지의 기능인 홍수조절과 생태적인 기능을 검토하고 제시하고자 한다. 화포천의 경우 과거 홍수에 취약한 지역으로 화포천의 수위가 낙동강 본류의 수위보다 낮아 내수배제의 방식으로 홍수를 대비하여 왔다. 하지만 최근 늘어난 집중호우와 이상기후 등으로 배수 용량 증설과 제방고 상승과 같은 구조적인 방법을 통해 대비를 하고 있으나 많은 문제점을 가지고 있어 잠재적인 피해위험에 노출되어 있는 실정이다. 따라서 본 연구에서는 김해시 화포천 유역을 연구대상 유역으로 하여 내수배제의 유역에서 천변저류지 설치를 고려할 경우 어떠한 문제점이 있으며, 위치에 따라 수문학적으로 어떠한 효과가 다르게 나타나는지 분석하였다. 이를 위해 본 연구에서는 우선 과거 홍수 피해가 빈번히 발생 하였던 김해 화포천 유역의 홍수 위험도를 산정하였으며, 이를 방어하기 위한 천변 저류지 설치 시나리오를 설정하고 각 경우에 따른 홍수조절특성을 분석하여 화포천과 같이 내수배제 하천에서 홍수방어를 위해 고려해야 할 조건들을 검토하였다.

  • PDF

Defense Style and Insomnia (방어유형과 불면증)

  • Joo, Sun-Sik;Cho, Seong-Jin;Lee, Yu-Jin;Lee, So-Jin;Kim, Seog-Ju
    • Sleep Medicine and Psychophysiology
    • /
    • v.19 no.1
    • /
    • pp.42-46
    • /
    • 2012
  • Introduction: The objective of the present study was to investigate the defense style of insomnia patients and to grasp the differences in defense style between primary insomnia patients and insomnia patients with history of major depressive disorder. Methods: Forty three subjects with insomnia (11 subjects with primary insomnia and 32 subjects with major depressive disorder) and 138 control subjects participated in this study. To diagnose insomnia and major depressive disorder, interviews including structured clinical interview for DSM-IV (SCID-IV) were done. To assess the defense style, self-reported Korean version of Defense Style Questionnaire (K-DSQ) were completed by the participants. Results: Compared to normal controls, subjects with insomnia used more acting out (t=3.25, p<0.01), consumption (t=2.66, p<0.01), fantasy (t=3.51, p<0.001), resignation (t=5.42, p<0.001), suppression (t=3.28, p<0.01), projection (t=3.92, p<0.01), splitting (t=4.31, p<0.01), undoing (t=2.66, p<0.01), withdrawal (t=6.72, p<0.001) and isolation (t=3.80, p<0.001), and less omnipotence (t=4.08, p<0.001) and humor (t=3.20, p<0.01). Compared to normal controls, subjects with primary insomnia used more undoing and withdrawal. Compared to subjects with primary insomnia, subjects with insomnia with history of major depressive disorder used more resignation and withdrawal, and less humor. Conclusion: In the current study, there were differences in defenses between primary insomnia patients and insomnia patients with major depressive disorder history. To evaluate the pattern of defenses through the K-DSQ might provide important clues to differentiate these two conditions.

A Study on the Outport for the conquest of Usanguk through the Location Analysis of Natural Environment in the Port of the East Coast (동해안 항포구의 자연환경 입지분석을 통한 우산국 정벌의 출항지 검토)

  • JANG, Dong-Ho;KIM, Jang-soo
    • Journal of The Geomorphological Association of Korea
    • /
    • v.17 no.3
    • /
    • pp.59-75
    • /
    • 2010
  • In this study, location evaluation of the natural environment of ports in the Joseon Dynasty was carried out to investigate the outport of east coast for the conquest of Usanguk. As a result of study, there were 55 ports and naval stations in the Joseon Dynasty, including the Yeongokpo, Aninpo, Samcheokpo, Susanpo, and Wolsongpo. As a result of the restoration work in the sea level that was done in the sixth century, the sea level at that time was about 1m higher than that at present. In terms of the location type, three types were identified via natural-environment analysis. Location type I consists of a total of 21 ports suitable for defense due to the sand spit in all the sides and because it is located in the bay of small and medium rivers. Location type II is composed of 22 ports close to the open seas, and location type III consists of a total of 12 ports centering on the bay. A total of nine ports satisfied the location factor in the shortest distance analysis(targeting location type I), 15 ports in the slope analysis, 13 ports in the hinterland analysis, 13 ports in the visibility analysis, and 11 ports in the ocean current analysis. It was found in the final evaluation that the I level regions consist of two ports(Obunjin and Mangyangjin). Obunjin has a location characteristic that is advantageous for defense and that makes it suitable to serve as an anchorage harbor for a large-scale fleet as its water level is deep and as it has a wide embayment. In conclusion, Obunjin is considered the outport that has the highest possibility of serving as Isabu's departure port for the conquest of Usanguk.

Detection Model based on Deeplearning through the Characteristics Image of Malware (악성코드의 특성 이미지화를 통한 딥러닝 기반의 탐지 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.137-142
    • /
    • 2021
  • Although the internet has gained many conveniences and benefits, it is causing economic and social damage to users due to intelligent malware. Most of the signature-based anti-virus programs are used to detect and defend this, but it is insufficient to prevent malware variants becoming more intelligent. Therefore, we proposes a model that detects and defends the intelligent malware that is pouring out in the paper. The proposed model learns by imaging the characteristics of malware based on deeplearning, and detects newly detected malware variants using the learned model. It was shown that the proposed model detects not only the existing malware but also most of the variants that transform the existing malware.