• Title/Summary/Keyword: 전산망

Search Result 328, Processing Time 0.023 seconds

A Study on the Performance Evaluation Method of the Spatial Information Network based on GIS (인터넷 기반의 공간정보유통망 성능분석 방법에 관한 연구)

  • Jin, Heui-Chae;Si, Jong-Yik
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.1 s.1
    • /
    • pp.29-37
    • /
    • 1999
  • Recently, brisk up the construction of the spatial information, many people highly concern to tile information circulation of GIS. Each system like GIS has a structure of the information circulation to itself. In this paper, we study on the performance evaluation method of tile structure which to circulate tile spatial information based on the internet. To do this, we hypothesize values of content and scale of the geo-spatial information on each internet network and volumes of the information to circulate between internet networks. Then we suggest a method to evaluate the performance of the structure to aid the circulation of spatial information based on queueing model. Henceforth, with the volumes of data stored and circulated information of each GIS, this method can help to design the structure to circulate the GIS information more efficiently.

  • PDF

A Study on the Improvement Model for Invigorating Cyber Threat Information Sharing (사이버위협정보 공유 활성화를 위한 관리적·기술적 개선모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • This paper shall suggest the improvement model for invigorating cyber threat information sharing from the national level, which includes, inter alia, a comprehensive solutions such as the legislation of a guideline for information sharing, the establishment of so-called National Center for Information Sharing, the construction and management of a integrated information system, the development of techniques for automatizing all the processes for gathering, analyzing and delivering cyber threat information, and the constitution of a private and public joint committee for sharing information, so much so that it intends to prevent cyber security threat to occur in advance or to refrain damage from being proliferated even after the occurrence of incidents.

The Study of Information System Creation and Internal Audit Controls (정보시스템 구축과 내부 감사 제어에 대한 고찰)

  • 변진식
    • KSCI Review
    • /
    • v.11 no.1
    • /
    • pp.9-17
    • /
    • 2003
  • Along with trends of other countries, the Ministry of Information and Communication in Korea decided to operate an Information System Audit Institution for raising qualify of computer network facilitated in state organ and public institution, and to construct effective construction of information system. The aim of the audit institution is applying it to public information business, establishing an information system audit qualification system, and upbringing Private audit organs. The Ministry of Information and Communication realized that although the demand of information system area audit is explosively expanding, the National Computerization Agency cannot satisfies the demand and realize to have audit control for the information of national business as well. The Ministry of Information and Communication plan to enforce the audit on public information business by correlate with information business. The ministry enforce that the supervisory company has major roll to audit and national import business decided by the Information Promotion Committee is subject to have audit control. Therefore, in this paper, the contents of internal audit among internal/external audit will be presented.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

A Case Study on Logical Network Separation through HCI method (HCI 방식을 통한 논리적 망분리 사례 연구)

  • Choi, Seoung Pyo;Shin, Sang Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.747-749
    • /
    • 2017
  • To protect financial services against danger of financial accidents and customer information leakage caused by malware, injection attack and so on, Financial Services Commission announced "Financial Networks Security Enhancement Comprehensive Plan", which suggests the guideline of protecting customer information and providing secure financial services by separating network topology and then makes the financial company use network partitioning system. In consequence of this policy, financial companies respectively chose between the physical partitioning mechanism or the logical partitioning mechanism according to their IT environment. This paper suggests an efficient infrastructure configuration plan for making the logical network partition, by comparison of a construction of traditional general equipment and an integrated HCI(Hyper Converged Infrastructure) through 'Hyper Converged' which is one of virualization techniques for developing currently, and the case study of the integrated HCI method.

  • PDF

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Analysis and Design of IP Traceback for Intrusion Response (침입대응을 위한 IP 역추적 시스템 분석 및 설계)

  • 이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.412-415
    • /
    • 2004
  • As computers and networks become popular, corporation or country organization composes security network including various kinds information protection system to protect informations and resources from internet and is operating system and network. But current firewall and IDS(Intrusion Detection System) of the network level suffers from many vulnerabilities in internal computing informations and resources. In this paper, we design of ICMP-based Traceback System using a ICMP Traceback Message for efficiently traceback without change structure of routers. ICMP-based Traceback System. Create of ICMP message is managed by “Traceback Agent” mirroring port for router. Victim's systems that are received the message store it and “Traceback Manager” is detect a attack(like a DDoS). Using a information of this message starting a traceback and detecting a source of attacker, so response a attack.

  • PDF

Training of Artificial Neural Network for water level forecasting (하천수위 예측을 위한 인공신경망 학습에 관한 연구)

  • Jung, Ji Won;Ler, Lian Guey
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.563-563
    • /
    • 2016
  • 국내 강우발생은 기상학적인 영향으로 인하여 장마기간(6~8월)에 집중되어있으며, 최근에는 기후변화의 영향으로 짧은 시간에 많은 양의 강우가 발생하는 집중호우의 발생빈도가 증가하고 있다. 또한, 시간과 지역에 관계없이 국지성호우의 발생빈도 역시 높아지고 있다. 집중호우와 국지성호우는 짧은 시간에 하천수위를 상승시키므로 홍수로 인한 물적 피해가 크게 발생된다. 국토교통부에서는 그동안 홍수예보에 필수적인 우량, 하천수위 등 기초자료를 확보하기 위해 관측소(500여개) 및 홍수량 측정지점(80여개)을 확대하였으며, 관측된 자료는 모두 전산망에 기록, 보관하고 있다. 또한 한강, 금강, 낙동강, 영산강의 경우 홍수통제소에서 홍수량 예측 계산 등을 통해 홍수 예경보를 실시하고 있다. 하지만 4대강을 제외한 중소하천의 홍수예경보에 대한 정보를 찾아볼 수 없으며, 현재 연구가 진행중이다. 강우-유출모형을 활용하여 중소하천의 강우와 유출의 관계를 해석하는 과정은 다양한 인자를 고려해야하지만 중소하천의 경우 하천단면 등 하천자료가 충분히 구축되어 있지 못하므로 유출량 계산에 많은 어려움을 겪고 있다. 이에 본 연구에서는 중소하천의 홍수위 예측을 위해 한강의 과거 수위와 현재 수위만을 활용하여 인공신경망(Artificial Neural Network, ANN)의 학습을 진행하였다. 첫 번째로 ANN을 활용하여 한강유역 중 홍수예보지점(잠수교)의 수위변화에 직접적으로 연관이 있는 5개 수위관측소를 선정하였으며, 과거 장마기간(6~8월)관측 자료를 활용하였다. 두 번째로 홍수예보지점(잠수교)과 5개 수위관측소의 과거 관측수위(2009~2014년)를 인공신경망의 학습자료로 활용하여 모델을 훈련시켰으며, 마지막으로 2015년의 관측수위를 이용하여 ANN의 학습정확도에 대한 검증을 하였다. 본 과정은 수위예측을 위한 ANN의 훈련단계로 Training/Test를 반복하였으며, 학습결과와 2015년 관측수위 비교시 $R^2=0.987$과 상관계수 r=0.994로 유사한 패턴을 보였으나 최대치와 최소치에 대한 오차가 있음을 확인하였다.

  • PDF