• Title/Summary/Keyword: 인터넷 강의

Search Result 594, Processing Time 0.032 seconds

Lightweight IP Traceback Mechanism on IPv6 Network Environment (IPv6 네트워크 환경에서의 경량화된 IP 역추적 기법)

  • Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.93-102
    • /
    • 2007
  • A serious problem to fight DDoS attacks is that attackers use incorrect or spoofed IP addresses in the attack packets. Due to the stateless nature of the internet, it is a difficult problem to determine the source of these spoofed IP packets. The most of previous studies to prevent and correspond to DDoS attacks using the traceback mechanism have been accomplished in IPv4 environment. Even though a few studies in IPv6 environment were introduced, those have no detailed mechanism to cope with DDoS attacks. The mechanisms for tracing the origin of attacks in IPv6 networks have so many differences from those of IPv4 networks. In this paper we proposed a lightweight IP traceback mechanism in IPv6 network environment. When marking for traceback is needed, the router can generate Hop-by-Hop option and transmit the marked packet. We measured the performance of this mechanism and at the same time meeting the efficient marking for traceback.

Image-based CAPTCHA Using Multi-Image Composition and Its Secure Operation (복수의 이미지를 합성하여 사용하는 이미지 기반의 캡차와 이를 위한 안전한 운용 방법)

  • Kang, Jeon-Il;Maeng, Young-Je;Kim, Koon-Soon;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.153-166
    • /
    • 2008
  • According to the growth of the internet and the usage of software agents, the CAPTCHA that is a method for taking apart humans and computers has been widely deployed and used. As the results of many research activities, the CAPTCHA, which is spoken for a distorted image material including random text, has known to be easily breakable via artificial intelligence techniques. As one of alternatives for those text-based CAPTCHAs, methods using photos are concerned and various image-based CAPTCHAs are suggested. However, image-based CAPTCHAs still have some problems. In this paper, we discuss what are the problems in each image-based CAPTCHA and propose a new image-based CAPTCHA using image composition as the solution of those problems. Furthermore, for the secure operation of the CAPTCHA, we suggest a communication protocol that works without the virtual session and consider possible security and usability problems in the protocol.

Password Authentication Scheme based on Operation of Alpha-numeric Characters on Matrix (행렬 상에서 문자 간 연산을 수행하는 패스워드 인증 기법)

  • Kang, Jeon-Il;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee;Jeun, In-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.175-188
    • /
    • 2009
  • Besides the passwords have low complexity, they can easily be revealed by the shoulder-surfing attack when they are inputted through the input devices such like keyboard. To overcome these problems, many new authentication schemes, which change the user secret different form or let users input their secrets through the more complex manners, have been suggested, but it is still hard to find the balanced point between usability and security. In this paper, we introduce a new authentication scheme that use the traditional alpha-numeric password as user secret based on operation of them on matrix. We show the security strength of our proposal through the analyses in the various aspects and confirm the difficulty that users feel from our proposal through the user study.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Digital Transformation of Education Brought by COVID-19 Pandemic

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.183-193
    • /
    • 2021
  • In this paper, the author found and analyzed the problems caused by the change of traditional teaching methods to online in classrooms and laboratories. Looking at the analysis of major problems, first, there were various technical problems, including not all environments and facilities being connected to the Internet. Second, the effectiveness of virtual classes, which were suddenly switched online, could also be questioned. Finally, in the face of a new environment, the stress of teachers to adapt rapidly to the new teaching methodology was a problem. The author proposed digital transformation as a way to address these problems. The author analyzed educational changes, learning modalities and various technical tools, and various tasks to enable digital transformation. First, the author investigated, analyzed, and presented the factors necessary to efficiently operate the classroom environment that will change to online. Next, the author analyzed the factors and problems needed to make the students' classes reliable and efficient, and proposed solutions. Finally, the author pointed out the problem that during online lectures, the responsibility of learning is excessively transferred from teachers to students, and proposed a solution to this problem. Subsequently, the author proposed future studies.

An Efficient Data Collection Method for Deep Learning-based Wireless Signal Identification in Unlicensed Spectrum (딥 러닝 기반의 이기종 무선 신호 구분을 위한 데이터 수집 효율화 기법)

  • Choi, Jaehyuk
    • Journal of IKEEE
    • /
    • v.26 no.1
    • /
    • pp.62-66
    • /
    • 2022
  • Recently, there have been many research efforts based on data-based deep learning technologies to deal with the interference problem between heterogeneous wireless communication devices in unlicensed frequency bands. However, existing approaches are commonly based on the use of complex neural network models, which require high computational power, limiting their efficiency in resource-constrained network interfaces and Internet of Things (IoT) devices. In this study, we address the problem of classifying heterogeneous wireless technologies including Wi-Fi and ZigBee in unlicensed spectrum bands. We focus on a data-driven approach that employs a supervised-learning method that uses received signal strength indicator (RSSI) data to train Deep Convolutional Neural Networks (CNNs). We propose a simple measurement methodology for collecting RSSI training data which preserves temporal and spectral properties of the target signal. Real experimental results using an open-source 2.4 GHz wireless development platform Ubertooth show that the proposed sampling method maintains the same accuracy with only a 10% level of sampling data for the same neural network architecture.

GIS Management on Risk Evaluation of a Road Slope Using Terrestrial LiDAR (지상 LiDAR를 활용한 접도사면 위험평가에 따른 GIS관리)

  • Jang, Yong Gu;Kwak, Young Joo;Kang, In Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.169-175
    • /
    • 2006
  • Recently, slope failures are disastrous when they occur in mountainous area adjoining highways. The accidents associated with slope failures have increased due to rapid urbanization of mountainous area. Therefore, the inspection of slope is conducted to maintain road safety as well as road function. In this study, we apply to the remedy which is comparing existent description to advanced technology using GIS. We utilize a Terrestrial LiDAR, one of the advanced method, to generate precise and complete road slope model from expert point of view. In result, we extract hazardous slope information from external measurements referring to the evaluation criteria of external slope stability. We suggest not only the database but also the method of road risk evaluation based on internet GIS.

Study on Teaching Anxiety and Efforts for Professional Development of Beginning Secondary Science Teachers (초임 중등 과학 교사의 수업 불안 실태 및 전문성 발달 노력에 관한 연구)

  • Jeon, Hwa-Young;Yoo, Mi-Hyun;Hong, Hun-Gi;Park, Eun-I
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.1
    • /
    • pp.68-78
    • /
    • 2009
  • The purpose of this study was to investigate teaching anxiety and the professional development of beginning secondary science teachers. For this study, a survey was conducted among beginning science teachers (N=83) with under five years of experience, and in-depth interviews with these five teachers were carried out. The survey tackled beginning secondary science teachers' anxiety levels by asking about their difficulties in teaching science classes, and results showed that the teachers' levels of teaching anxiety marked high. Levels of teaching anxiety in physics among subjects and in chemistry among experiments marked highest. To overcome teaching anxiety, teachers searched for information on the Internet or received help from their colleagues and veteran teachers. They revealed that plans for professional development as science teachers included receiving in-service training and joining teacher communities. In addition, the best type of required training program for professional development appeared to be lectures about teaching know-how from veteran teachers.

Development and Research for the Professional Brand of TV Broadcasting Program -By focusing the actually proved study for news program brand- (TV 방송 프로그램의 전문 브랜드 개발 연구 -뉴스 프로그램 브랜드의 실증연구를 중심으로-)

  • Jeong, Bong-Keum;Chang, Dong-Ryun
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.39-48
    • /
    • 2005
  • In the age of digital culture, TV broadcasting is exercising more influence as a information and communication medium compared to past. With the appearance of satellite broadcasting service in 2002, the broadcasting environment became a diversified field of local TV, cable TV, satellite, internet, etc. and created the time of multi-media and multi-channel. This ongoing change of broadcasting environment made the passive audience of the past, active image makers and new accepters, participants and users of communications, who know how to choose and use media as the active centerpiece, The active acceptor as the centerpiece of channel selections has become the center of the broadcasting, whereby they pick up and enjoy their favorite TV programs and came to remember the list of their favorite channels and zap them finally. In this point of spotting their favorite channels and improving the degree of recognition for the channels, the development of the noticeable brand for a particular program has made a great contribution. The aim of this study, therefore, is to recognize the factors, which are important in the habits of watching TV and to develop professional brands for TV broadcasting programs. The range of the survey for this study was home news programs and broadcasting stations abroad, which were on air from March to May in 2004. The focus of the survey was universal and professional news programs. Through this study, it was ascertained that, in the case of news, developing a brand for an anchor as well as for a professional brand of TV program could be an important element.

  • PDF

The Analysis of Kinetic Parameters for BNR Process Simulation in Domestic Wastewater (국내하수에 적합한 BNR 공정 시뮬레이션을 위한 최적 동력학적 계수 산출)

  • Kim, Dae-Sung;Park, Myung-Gyun;Ahn, Ho-Chul;Ahn, Won-Sik;Lee, Eui-Sin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1385-1390
    • /
    • 2006
  • 외국에서 ASM 모델의 BNR 적용 연구결과를 국내 하수에 적용하기에는 하수농도, 온도, 슬러지농도 등이 국내와는 달라 적용상 무리가 있다. 본 연구에서 BNR 시뮬레이션을 위한 입력 자료로 활용되는 인자들은 IAWPRC task group에서 제안하는 값들을 사용하되 국내 하수성상에서 필요로 하는 인자들은 직접 실험을 통하여 부분적으로 구해냄으로써 모델 시뮬레이션의 신뢰도를 높이고자 하였다. F/M비의 변화량과 1/SRT과의 관계로부터, 종속영양미생물 생산계수 $Y_H$값을 구한결과, 0.40mg VSS/mg COD였다. 이것을 ASM No.2d에 적용하기 위하여 mg cell COD formed/mg COD oxidized 단위로 환산한 결과 0.58을 나타냈다. H 하수처리장의 1차 침전지 하수를 이용하여 호기성상태에서 OUR Test를 통한 미생물에 의한 유기물 섭취시 산소섭취율 변화를 측정하였다. 호기성상태와 무산소상태에서 구한 쉽게 분해되는 용존성유기물(Ss)값을 비교해보면 각각 35.5mg/L와 39.9mg/L로 약간의 차이는 있으나 유사한 값을 보여주고 있다. 시뮬레이션을 위한 동력학적 계수 중 무산소 상태에서 종속영양미생물의 ${\mu}_{max,H}$$3.56d^{-1}$로 나타났고, 호기성상태에서는 구하면 ${\mu}_{max,H}$$4.2d^{-1}$로 산출되었다. 종속영양미생물의 사멸계수 $b_H$를 구하기 위한 실험에서 초기 OUR의 10%이내가 될 때까지 걸린 시간은 7일정도가 걸렸으며, 사멸률 $b_H$$0.043hr^{-1}$로 나타났다. 독립영양미생물의 최대비성장률 ${\mu}_{max,A}$는 최대암모니아 섭취률을 이용하여 구한 결과 $0.65d^{-1}$로 나타났다.EX>$60%{\sim}87%$가 수심 10m 이내에 분포하였고, 녹조강과 남조강이 우점하는 하절기에는 5m 이내에 주로 분포하였다. 취수탑 지점의 수심이 연중 $25{\sim}35m$를 유지하는 H호의 경우 간헐식 폭기장치를 가동하는 기간은 물론 그 외 기간에도 취수구의 심도를 표층 10m 이하로 유지 할 경우 전체 조류 유입량을 60% 이상 저감할 수 있을 것으로 조사되었다.심볼 및 색채 디자인 등의 작업이 수반되어야 하며, 이들을 고려한 인터넷용 GIS기본도를 신규 제작한다. 상습침수지구와 관련된 각종 GIS데이타와 각 기관이 보유하고 있는 공공정보 가운데 공간정보와 연계되어야 하는 자료를 인터넷 GIS를 이용하여 효율적으로 관리하기 위해서는 단계별 구축전략이 필요하다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 상습침수구역관련 정보를 검색, 처리 및 분석할 수 있는 상습침수 구역 종합정보화 시스템을 구축토록 하였다.N, 항목에서 보 상류가 높게 나타났으나, 철거되지 않은 검전보나 안양대교보에 비해 그 차이가 크지 않은 것으로 나타났다.의 기상변화가 자발성 기흉 발생에 영향을 미친다고 추론할 수 있었다. 향후 본 연구에서 추론된 기상변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은 존재하므로 이러한 전략을 개발 및 활용할 수 있으며, 특히, 한국주식시장에 적합한 거래전략은 반전거래전략이고, 이 전략의 유용성은 투자자가 설정한 투자기간보다 더욱 긴 분석기간의 주식가격정보에 의하여 최대한 발휘될 수 있음을 확인하였다.(M1), 무역적자의 폭, 산업의 생산

  • PDF