• Title/Summary/Keyword: 사전취약화

Search Result 81, Processing Time 0.026 seconds

A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis (소셜 네트워크 분석 기반의 금융회사 불법대출 이상징후 탐지기법에 관한 연구)

  • Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.851-868
    • /
    • 2012
  • After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.

An Implementation of Embedded Speaker Identifier for PDA (PDA를 위한 내장형 화자인증기의 구현)

  • Kim, Dong-Ju;Roh, Yong-Wan;Kim, Dong-Gyu;Chung, Kwang-Woo;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.286-289
    • /
    • 2005
  • 기존의 물리적 인증도구를 이용한 방식이나 패스워드 인증 방식은 분실, 도난, 해킹 등에 취약점을 가지고 있다. 따라서 지문, 서명, 홍채, 음성, 얼굴 등을 이용한 생체 인식기술을 보안 기술로 적용하려는 연구가 진행중이며 일부는 실용화도 되고 있다. 본 논문에서는 최근 널리 보급되어 있는 임베디드 시스템중의 하나인 PDA에 음성 기술을 이용한 내장형 화자 인증기를 구현하였다. 화자 인증기는 음성기술에서 널리 사용되고 있는 벡터 양자화 기술과 은닉 마코프 모델 기술을 사용하였으며, PDA의 하드웨어적인 제약 사항을 고려하여 사용되는 벡터 코드북을 두 가지로 다르게 하여 각각 구현하였다. 처음은 코드북을 화자 등록시에 발성음만을 이용하여 생성하고 화자인증 시에 이용하는 방법이며, 다른 하나는 대용량의 음성 데이터베이스를 이용하여 코드북을 사전에 생성하여 이를 화자 인증시에 이용하는 방법이다. 화자인증기의 성능평가는 5명의 화자가 10번씩 5개의 단어에 대하여 실험하여, 각각 화자종속 코득북을 이용한 인증기는 88.8%, 99.5%, 화자독립 코드북을 이용한 인증기는 85.6%, 95.5%의 인증율과 거절율을 보였으며, 93.5%와 90.0%의 평균 확률을 보였다.. 실험을 통하여 화자독립 인증기의 경우가 화자종속 인증기의 경우보다 낮은 인식율을 보였지만, 화자종속 인증기에서 나타나는 코드북 훈련시에 발생하는 메모리 문제를 해결 할 수 있었다.

  • PDF

A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation (m-ary 멱승 연산에 대한 새로운 단순 전력 분석 공격)

  • Ahn, Sung-Jun;Choi, Doo-Ho;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.261-269
    • /
    • 2014
  • There are many researches on fast exponentiation algorithm which is used to implement a public key cryptosystem such as RSA. On the other hand, the malicious attacker has tried various side-channel attacks to extract the secret key. In these attacks, an attacker uses the power consumption or electromagnetic radiation of cryptographic devices which is measured during computation of exponentiation algorithm. In this paper, we propose a novel simple power analysis attack on m-ary exponentiation implementation. The core idea of our attack on m-ary exponentiation with pre-computation process is that an attacker controls the input message to identify the power consumption patterns which are related with secret key. Furthermore, we implement the m-ary exponentiation on evaluation board and apply our simple power analysis attack to it. As a result, we verify that the secret key can be revealed in experimental environment.

Procedural Model of XML Schema Framework for Digitalizing Disaster Information Management for Construction Facility (시설물 재해정보관리 전자화를 위한 XML스키마 구축 방법의 절차적 모형 구성)

  • Kang, Leen-Seok;Park, Seo-Young;Moon, Hyoun-Seok
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.3 s.31
    • /
    • pp.56-64
    • /
    • 2006
  • The current disaster management manual is being utilized as a book or document-based type. It causes a low applicability and interoperability in practical business because each information has a different document format and it is difficult to recycle those information as common disaster information. The information reading by text type without electronic data and visual object also has a limitations in guaranteeing a quickness of disaster management business. Accordingly, the electronic document management system with visual information is necessary and the system needs to tie framed by XML schema because the electronic document standard will be changed from DTD to XML schema. This study attempts to develop a procedural methodology of an electronic document management system based on XML for disaster management. The applicability of the proposed results is verified by the simulated scenario.

A Study on Cost Management at the Pre-construction Phase in the Korean Construction Market (공공건설사업 시공 전 단계 사업비관리 개선에 관한 연구)

  • Kim Min-Kee;Shin Sung-Hoon;Hyun Chang-Taek
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.265-270
    • /
    • 2002
  • Frequent design changes or unnecessary project executions due to illogical practice, lack of feasibility study and, hasty drive have raised problems of budget waste in Korean construction projects. Since the MOCT (Ministry of Construction & Transportation) published Master Plan for budget efficiency for government projects, there have been a lot of policy efforts for budget saving. However, it has been pointed out that cost management at the pre-construction phase, which greatly influences the cost still remains imperfect. The target cost for government clients is not being estimated reasonably, and cost controlling at the pre-construction phase is not yet being carried out properly for keeping the budget. Therefore, improved construction cost management at the pre-construction phase was proposed in this paper. The cost management systems of advanced countries were investigated for it, and the issues were drawn from the cost management systems of these countries. On the basis of the issues, the present conditions and problems of domestic construction cost management at the pre-construction phase were analyzed for suggestion.

  • PDF

A Study of Cutting Method of H-Pile for Explosive Demolition of SRC Structure (철골구조물 발파해체를 위한 H형강 절단방법에 대한 연구)

  • Min Hyung-Dong;Lee Yun-Jae;Song Young-Suk;Kim Hyo-Jin
    • Explosives and Blasting
    • /
    • v.23 no.3
    • /
    • pp.83-89
    • /
    • 2005
  • It follows in deterioration of the steel frame structure and becomes remodeling and removal. The construction work characteristic, economical efficiency and stability environment characteristic are planned and considered hereafter control plan of the steel frame structure which is deteriorated currently to cutting mettled plentifully sued on gas cutting of H beam. However it will not be able to apply from the explosives demolition which is makes a weak instantaneously and then collapses the building at the time. In this study, shape charge was used for cutting of the H-beam. That is the element testing to estimate explosives demolition for steel frame structure. As a result, it is found for single-side rutting method, both-sides rutting methods by H-beam thickness and pre-rutting process. It confirmed an affix method and an ease characteristic by fixing tool. Also, it is shown that air blasting decreased about 8dB(A) in order to reduce air blasting used by sand box. However, it will be required to reduce air blasting little more because explosives demolition will be done in urban site.

Signal Interlocking System of a Programmable Logic Controller Improvement Report (신호보안설비 전자연동장치(PLC) 개선 관련 보고)

  • Seok, Tae-Woo;Ko, Yang-Og;Yoo, Do-Gyun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.623-628
    • /
    • 2007
  • Metro Subway System is widely known as the leader of public transportation in a metropolitan area. The signal interlocking is one of the most important organs that plays a major role in the system. By improving the quality of signal interlocking on of the traffic system and keeping its maintenance on a high level will not only repair the current state, but it will also let the PLC(Programmable Logic Controller). The Non-Vital relay of No. 3, 4 Line are the most one of the unstable system, device, which underwent a process of fine manufacture establishment and a close examination, obtained as a new device. Utilizing the equipment with cautious preservation on the system will enhance the current state of the signal device. Especially, the test for improvement and development based upon the technique that decreases the frequency of defect produced will further precipitate its efficiency. With authorization of imposing the newly made equipment will bring improvement to the signal technology and to the industry at largest extent.

  • PDF

Development of Safety Equipment Database for Effective Management in Wooden Cultural Heritage (효율적 목조 문화재 방재관리를 위한 방재설비 데이터베이스구축)

  • Kim, Donghyun;Lee, Ji-hee;Yi, Myungsun
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.46-53
    • /
    • 2016
  • Wooden cultural heritage is vulnerable to fire, flooding and other hazards. Therefore, an effective disaster prevention and mitigation strategy for them should include preventive measures in a full range of management. These were used to construct a disaster safety system for 508 wooden cultural heritage items by the Cultural Heritage Administration. According to the type of ownership and administration, national and public heritage is controlled by personal management or commissional management. Among them, it is arranged with the safety security institute for important cultural properties. In addition, they have problems of field management with no computerization about the management information for a disaster facility system. Therefore, this study aimed to develop a DB platform that can share information with many users who need to manage cultural heritage. Through a field survey, it is feasible to develop a disaster facility system to provide the information, such as the main data, quantity and location.

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System (검색 정보 사전 동기화를 이용한 저비용 RFID 인증 방식)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.77-87
    • /
    • 2008
  • Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.

A preliminary study on factors affecting cognitive function and cognitive training effects (인지기능 및 인지훈련효과의 관련변인에 관한 예비연구)

  • Kim, Youngkyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.343-351
    • /
    • 2020
  • The present study investigated the related variables of cognitive function, subjective cognitive decline and cognitive training effects. The cognitive training was composed of mete-cognitive education and cognitive task performing. Twenty older adults attended for 14 weeks and were tested before and after the training. Results show that their cognitive level was related with age, self-esteem and personality traits. And subjective cognitive decline was related depression, anxiety, personality traits, self-efficacy, self-esteem and subjective age, but it does not reflect objective cognitive impairments. Their cognitive test scores were enhanced after training in MMSE, memory and executive function, and enhanced scores were related with age, subjective cognitive decline, anxiety, self-efficacy, self-esteem, subjective age and personality traits. Findings suggest one's personality and psychological state need to be considered for the effects of cognitive training.