• Title/Summary/Keyword: 정보출처

Search Result 181, Processing Time 0.019 seconds

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

Toward Developing a Provenance Conceptual Model for Data-driven Electronic Records (데이터형 전자기록을 위한 출처 개념 모델 개발 방향)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.305-341
    • /
    • 2024
  • This study explored the possibilities of a new approach to developing the provenance concept to electronic records in the data-driven digital environments by reviewing and adopting data provenance concepts and models. It then conducted basic literature review to develop a ground for a model representing the provenance of data-driven electronic records. In particular, it proposed to embrace to the concepts of retrospective and prospective provenance, and to develop a different model for representing provenance from records management metadata. If the model can be developed that can represent provenance independently while maintaining a dynamic relationship with records, it can be ensure the fluidity of records and even support to secure the record's attributes and play the roles of provenance. Eventually, it proposed the direction to develop the provenance model which can support the fixity of records, the reproducibility of activities, and the trustworthiness of representations. It is expected to be a fit provenance model in the data-driven digital environment.

Deniable Authentication with Verifiable Evidence based on Ring Signature (환 서명에 기반한 부인가능 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1397-1399
    • /
    • 2009
  • 부인가능 인증은 수신자가 전송된 메시지에 대한 출처를 확인할 수 있지만, 제 3 자에게는 전송된 메시지의 출처를 증명할 수 없는 인증 메커니즘이다. 이러한 부인가능 인증을 통하여 프라이버시 노출 가능한 전자투표와 전자상거래에서 메시지 전송에 대한 익명성을 보장할 수 있다. 본 논문에서는 그룹 멤버의 익명성을 보장하기 위한 환 서명을 이용하여 부인 가능한 서명을 제안함으로써 서명자의 프라이버시를 보호한다. 또한 추후에 서명에 대한 출처 확인이 필요할 경우, 서명자가 서명 생성을 위한 지식을 증명함으로써 서명에 대한 출처를 제 3 자에게 증명할 수 있다.

A Study on Developing a Provenance Conceptual Model for Data-driven Electronic Records Based on Extending W3C PROV (PROV의 확장에 기초한 데이터형 전자기록의 출처 모델 연구)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.80
    • /
    • pp.5-41
    • /
    • 2024
  • This study was conducted to develop a provenance representation model for data-type electronic records. It supports the distinction between provenance and context for the creation and management of data-type electronic records. To express both, it aims to design an extensible provenance model. For this purpose, W3C PROV is utilized as a basic model, with P-Plan and ProvONE for designing prospective provenance area. Afterward, the provenance model was extended by mapping the record management requirements. The provenance model proposed in this study is designed to represent and connect both retrospective and prospective provenance of data-type electronic records. Based on this study, it is expected to discussing the concept of provenance in the records management and archival studies area and to extending the model in the future.

A Study on the Source and History Management of Records According to Administrative Organizational Changes-Focused on D Regional Local Government (행정조직의 변동에 따른 기록물 출처 및 이력 관리-D광역지방자치단체를 중심으로)

  • Sujin Choi;Seongsin Lee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.1
    • /
    • pp.27-45
    • /
    • 2023
  • A source of records is critical and highly valuable for records management. The compositions and functions of an administrative organization, which is the source of public records, are changing according to its frequent reorganizations. In particular, changes in local governments are frequent, and the possibility of change increases over time. The processing department is responsible for various records management tasks as the source and producer of records; however, its scope of qualifications is unclear. As such, this study aims to clarify these sources of records and suggest ways to improve their management. For the objective, this study selected D regional local government and analyzed the forms and frequency of its administrative organizational changes. In particular, the processing department's modified organizational functions and compositions due to reorganizations were also examined. Through the analysis, problems concerning records sources that could arise from changes in the administrative organization and processing department were identified, and improvement plans for records management were suggested.

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT) (공개출처정보의 정량화를 이용한 인공신경망 기반 사이버위협 예측 모델)

  • Lee, Jongkwan;Moon, Minam;Shin, Kyuyong;Kang, Sungrok
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.115-123
    • /
    • 2020
  • Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.

A Verification Strategy for the Origin of Electronic Records (전자기록의 출처확인 지원전략)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.47-89
    • /
    • 2010
  • The target of managing electronic records should be the trusted record services to the end-users. The natural characteristics of electronic records yields the drawback in the authenticity aspect and in the integrity aspect, and current standards and methodologies have beed developed to treat this drawback. However the authenticity and the integrity concepts is hardly separated each other and too completed, so alternative "source" concept is introduced and a verification strategy for the origin of electronic records is discussed in this paper. According to this concept, current standards and methodologies may be criticized for the negligence of necessary information organizing/verification, the doubtful long-term verification, and the missing counter-strategy for the verification-failed records. To solve this, needed facters for origin verification is described, new preservation format divided into temporally-fluctuating (variable) part and immutable (fixed) part is proposed, and a strategy to prevent, avoidance, and detection/recovery important records is suggested.

An Analysis of Discourses on Interpreting and Applying the Principle of Provenance in Archival Organization (기록관리 원칙의 해석과 적용에 관한 담론 분석 출처주의를 중심으로)

  • Seol, Moon-won
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.59-117
    • /
    • 2017
  • This study aims to logically investigate the changing interpretation and implementation of the principle of provenance by using an argument model for discourse analysis. First, it divides the history of discourses on the principle from the Dutch Manual publication of 1989 up to the present into four areas, which includes establishing, diffusing, transforming, and expanding or deconstructing, and articulates the core discourses of each. Second, it designs the argument model for analyzing the discourses on the principle by applying Toulmin's argument model and Dunn's policy argument model. Third, it selects the articles and books that cover the core discourses of the principle, and analyzes their contents in consideration of the argument model. Fourth and finally, it presents four argument models corresponding to each area of the discourses.

A Study of Today's Concept and Application of the Principle of the Provenance in Archives management (출처주의의 새로운 경향과 적용에 관한 연구)

  • Bang, Hyo-Soon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.69-92
    • /
    • 2002
  • The objective of this study is to examine the re cent trend of the interpretation of the Principle of the Provenance in today s new environment of Archives Management and to identify the effective way of the application of the Principle of Provenance to Archives Management. Because of the continued change and the flexibility of the administrative organization and the development of information network, the traditional concept of the Principle of Provenance which put emphasis on a single creator and the physical entity of the archives has been gradually modified to a rather conceptual, abstract and realistic one. A method to apply the recent concept of the Principle of Provenance is to separate the descriptions of the record entity, the creators and the context and use the organic linkage of the separated description areas. Also we can control the provenance from the current stage or even from the pre-current stage by utilizing the classification scheme and the retention schedule. In case of the electronic records, we can manage the provenance and the context by using metadata inherent in the computerized information system. Above all it is critical that we need to structure and control the provenance by building the Korean rules for archival description corresponding to the international standards. And it is another an essential point that we have to develop a guideline for constructing the fond and maintaining its consistency.

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).