• Title/Summary/Keyword: 서비스SW

Search Result 271, Processing Time 0.026 seconds

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

Predictive Modeling Design for Fall Risk of an Inpatient based on Bed Posture (침대 자세 기반 입원 환자의 낙상 위험 예측 모델 설계)

  • Kim, Seung-Hee;Lee, Seung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.51-62
    • /
    • 2022
  • This study suggests a design of predictive modeling for a hospital fall risk based on inpatients' posture. Inpatient's profile, medical history, and body measurement data along with basic information about a bed they use, were used to predict a fall risk and suggest an algorithm to determine the level of risk. Fall risk prediction is largely divided into two parts: a real-time fall risk evaluation and a qualitative fall risk exposure assessment, which is mostly based on the inpatient's profile. The former is carried out by recognizing an inpatient's posture in bed and extracting rule-based information to measure fall risk while the latter is conducted by medical staff who examines an inpatient's health status related to hospital fall risk and assesses the level of risk exposure. The inpatient fall risk is determined using a sigmoid function with recognized inpatient posture information, body measurement data and qualitative risk assessment results combined. The procedure and prediction model suggested in this study is expected to significantly contribute to tailored services for inpatients and help ensure hospital fall prevention and inpatient safety.

In-memory Compression Scheme Based on Incremental Frequent Patterns for Graph Streams (그래프 스트림 처리를 위한 점진적 빈발 패턴 기반 인-메모리 압축 기법)

  • Lee, Hyeon-Byeong;Shin, Bo-Kyoung;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.35-46
    • /
    • 2022
  • Recently, with the development of network technologies, as IoT and social network service applications have been actively used, a lot of graph stream data is being generated. In this paper, we propose a graph compression scheme that considers the stream graph environment by applying graph mining to the existing compression technique, which has been focused on compression rate and runtime. In this paper, we proposed Incremental frequent pattern based compression technique for graph streams. Since the proposed scheme keeps only the latest reference patterns, it increases the storage utilization and improves the query processing time. In order to show the superiority of the proposed scheme, various performance evaluations are performed in terms of compression rate and processing time compared to the existing method. The proposed scheme is faster than existing similar scheme when the number of duplicated data is large.

Personalized University Educational Contents Recommendation Scheme for Job Curation Systems (취업 큐레이션 시스템을 위한 개인 맞춤형 교육 콘텐츠 추천 기법)

  • Lim, Jongtae;Oh, Youngho;Choi, JaeYong;Pyun, DoWoong;Lee, Somin;Shin, Bokyoung;Chae, Daesung;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.134-143
    • /
    • 2021
  • Recently, with the development of mobile devices and social media services, contents recommendation schemes have been studied. They are typically applied to the job curation systems. Most existing university education content recommendation schemes only recommend the most frequently taken subjects based on the student's school and major. Therefore, they do not consider the type or field of employment that each student wants. In this paper, we propose a university educational contents recommendation scheme for job curation services. The proposed scheme extracts companies that a user is interested in by analyzing his/her activities in the job curation system. The proposed scheme selects graduates or mentors based on the reliability and similarity of graduates who have been employed at the companies of interest. The proposed scheme recommends customized subjects, comparative subjects, and autonomous activity lists to users through collaborative filtering.

Proposal of elevator calling intelligent IoT system using smartphone Bluetooth (스마트폰 블루투스를 이용한 승강기 호출 지능형 IoT 시스템 제안)

  • Si Yeon Kim;Sun-Kuk Noh
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.60-66
    • /
    • 2024
  • The Internet of Things, which began by connecting sensors through a network, is developing into an intelligent IoT by combining it with artificial intelligence technology. Elevators are essential for high-rise buildings in the city, and elevators move from floor to floor and perform the functions of transporting goods and moving users. It is necessary to provide safe and convenient services for elevator users in high-rise buildings or special environments (hospitals, etc.). In an environment where rapid patient transportation is important, such as large hospitals, there is a problem that hospital staff and the general public often use the elevator for patients. In particular, when moving patients where golden time is important, the waiting time to board the elevator is a major hindrance. In order to solve this problem, this study proposes an intelligent IoT system for elevator calling using smartphone Bluetooth. First, we experimented with the elevator calling IoT system using smartphone Bluetooth, and as a result of the experiment, it was confirmed that it can authenticate elevator users and reduce unnecessary waiting time for boarding. In addition, we propose an intelligent IoT system that connects with intelligent IoT.

A Research on the Mid- and Long-term Strategic Plan for Developing Gangwon Metropolitan Office of Education (강원도 교육문화관(도서관) 운영 활성화를 위한 중·장기 발전계획 연구)

  • Kwack, Dong-Chul;Yoon, Cheong-Ok;Kim, Yong-hwan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.3
    • /
    • pp.21-39
    • /
    • 2020
  • The purpose of this research is to build a mid- and long-term strategic plan for strengthening the status of Gangwon Metropolitan Office of Education as public libraries with the main functions of education, knowledge and culture in the community and helping facilitate the local growth. The current status and needs of Gangwon Metropolitan Office of Education was analyzed with a review of literature and websites, various library statistics, and user surveys and professional focus group interviews conducted during November and December 2019. Based on this analysis, a mission, vision, objectives, strategies, and main tasks of Gangwon Metropolitan Office of Education were established, and 4 strategic goals and 16 major projects were drawn to strengthen the strategic basis of 22 libraries, build specialized collections with a focus on education, recreate user-friendly spaces, and promote services, distinguished from public libraries under the supervision of Gangwon local government. It was necessary for Gangwon Metropolitan Office of Education to enhance and strengthen all of Hardware, Software and Human-ware, equipped with well-organized library building and facilities, collection and services, and professional librarians. In this research, the direction of a mid- and long-term strategic plan was presented for its dynamic operation and sustainable development in the future.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

A Study on the Factors of Well-aging through Big Data Analysis : Focusing on Newspaper Articles (빅데이터 분석을 활용한 웰에이징 요인에 관한 연구 : 신문기사를 중심으로)

  • Lee, Chong Hyung;Kang, Kyung Hee;Kim, Yong Ha;Lim, Hyo Nam;Ku, Jin Hee;Kim, Kwang Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.354-360
    • /
    • 2021
  • People hope to live a healthy and happy life achieving satisfaction by striking a good work-life balance. Therefore, there is a growing interest in well-aging which means living happily to a healthy old age without worry. This study identified important factors related to well-aging by analyzing news articles published in Korea. Using Python-based web crawling, 1,199 articles were collected on the news service of portal site Daum till November 2020, and 374 articles were selected which matched the subject of the study. The frequency analysis results of text mining showed keywords such as 'elderly', 'health', 'skin', 'well-aging', 'product', 'person', 'aging', 'female', 'domestic' and 'retirement' as important keywords. Besides, a social network analysis with 45 important keywords revealed strong connections in the order of 'skin-wrinkle', 'skin-aging' and 'old-health'. The result of the CONCOR analysis showed that 45 main keywords were composed of eight clusters of 'life and happiness', 'disease and death', 'nutrition and exercise', 'healing', 'health', and 'elderly services'.

Models of Database Assets Valuation and their Life-cycle Determination (데이터베이스 자산 가치평가 모형과 수명주기 결정)

  • Sung, Tae-Eung;Byun, Jeongeun;Park, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.676-693
    • /
    • 2016
  • Although the methodology and models to assess the economic value of technology assets such as patents are being presented in various ways, there does not exist a structured assessment model which enables to objectively assess a database property's value, and thus there is a need to enhance the application feasibility of practical purposes such as licensing of DB assets, commercialization transfer, security, etc., through the establishment of the valuation model and the life-cycle decision logic. In this study, during the valuation process of DB assets, the size of customer demand group expected and the amount of demand, the size and importance of data sets, the approximate degree of database' contribution to the sales performance of a company, the life-cycle of database assets, etc. will be analyzed whether they are appropriate as input variables or not. As for most of DB assets, due to irregular updates there are hardly cases their life-cycle expires, and thus software package's persisting period, ie. 5 years, is often considered the standard. We herein propose the life-cycle estimation logic and valuation models of DB assets based on the concept of half life for DB usage frequency under the condition that DB assets' value decays and there occurs no data update over time.