• Title/Summary/Keyword: 주소정보산업

Search Result 81, Processing Time 0.033 seconds

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.

Machine Learning Based APT Detection Techniques for Industrial Internet of Things (산업용 사물인터넷을 위한 머신러닝 기반 APT 탐지 기법)

  • Joo, Soyoung;Kim, So-Yeon;Kim, So-Hui;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.449-451
    • /
    • 2021
  • Cyber-attacks targeting endpoints have developed sophisticatedly into targeted and intelligent attacks, Advanced Persistent Threat (APT) targeting the Industrial Internet of Things (IIoT) has increased accordingly. Machine learning-based Endpoint Detection and Response (EDR) solutions combine and complement rule-based conventional security tools to effectively defend against APT attacks are gaining attention. However, universal EDR solutions have a high false positive rate, and needs high-level analysts to monitor and analyze a tremendous amount of alerts. Therefore, the process of optimizing machine learning-based EDR solutions that consider the characteristics and vulnerabilities of IIoT environment is essential. In this study, we analyze the flow and impact of IIoT targeted APT cases and compare the method of machine learning-based APT detection EDR solutions.

  • PDF

Development of an Application for Life Safety Continuity Method based on National Point Numbers and NFC (국가지점번호와 NFC 기반의 생활안전 연속성 지원을 위한 APP 개발)

  • Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.282-291
    • /
    • 2019
  • Purpose: In recent, mobile technology, as an axis of the fourth industry paradigm, is evolving into our daily life, economic activities and disaster safety management. However, since the location information service is insufficient, it is difficult to response the emergency situation adequately in the golden time. The purpose of this study is to propose a method to fine precisely the location of people who are in need of an emergency in the event of accidents and disasters. Method: This study investigates and compares existing literature and safety apps for national index number NFC application development. In addition, the system structure and the design method through the element technology through analysis of necessary function of the demander were carried out. Results: The results of this study were developed as a design and system that can be implemented in both direction and function to inform the location for emergency situation or disaster reporting in mobile. Conclution: It is possible to provide the disaster safety location service which can be utilized by the citizens in case of crisis by unifying the address system and integrating the location information using NFC.

Hacking Countermeasures for Wireless Internet Service (무선 인터넷 서비스를 위한 해킹 대응 방안)

  • Kook, Jung Gak;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.79-90
    • /
    • 2016
  • Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.

Calculating the Sunlight Amount for Buildings Using SAS: A Case Study of Gyeongsan City (그림자 분석 시뮬레이션을 활용한 건축물별 일조량 산정 - 경산시를 사례로)

  • Kim, Do-Ryeong;Kim, Sung-Jae;Han, Soo-Hee;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.1
    • /
    • pp.159-172
    • /
    • 2014
  • As greenhouse gas emissions have been increasing in the world, global warming is being recognized as a cause of the global problems like climate change. This is closely associated the fossil fuels. Thus renewable energy has been brought to the attention of many people as the upcoming alternative energy source to cope with the fossil drain and increased environmental regulations. Especially, the solar energy among renewable energy has drastically increased. In this study, we calculate on daylight ratio about the solar energy for buildings based on digital surface model. The digital surface model was made using the spatial information data. And it was simulated the shadow analysis using SAS. Therefore, it was suitable places to utilize the solar energy in the Gyeongsan city. Consequently, the daylight ratio was considered important factor to select region of the industry of the solar light power generation.

Studying on Expansion of Realtime Blocking List Conception for Spam E-mail Filtering (스팸 메일 차단을 위한 RBL개념의 확장에 관한 연구)

  • Kim, Jong-Min;Kim, Hion-Gun;Kim, Bong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1808-1814
    • /
    • 2008
  • In addition to RBL function, which is used to applying for spam e-mail filtering, as an effective way to deal with the recently widespread spam types, this paper proposes how to extract URL that was comprised in the original e-mail, apply it to RBL, and expand it. The BotNet, which is used to using for sending spam mails these days, has a problem that it is not able to solve with the distributed addresses of sent mails in spam e-mails. In general, as these spam e-mails are sent from the infected Zombi PC of individual user, the sent address itself is not efficient and is meaningless to use in RBL. As an effective way to filter spam e-mail sent by BotNet, this paper analyzes URLs that contained in the original spam e-mail and proposes how to effectively improve filter rate, based on the distribution data of URL site tempting users. This paper proposes the sending mechanism of spam e-mails from BotNet and the methods to realize those types of spam e-mails. In order to gather analyzable spam e-mails, this paper also carries out an experiment by configuring trap system of spam e-mail. By analyzing spam e-mails, which have been received during the certain period of experiment, this paper shows that the expanded RBL method, using URLs that contained in spam e-mails, is effective way to improve the filter distribution of spam e-mail.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

SNP: A New On-Chip Communication Protocol for SoC (SNP : 시스템 온 칩을 위한 새로운 통신 프로토콜)

  • Lee Jaesung;Lee Hyuk-Jae;Lee Chanho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.465-474
    • /
    • 2005
  • For high density SoC design, on-chip communication based on bus interconnection encounters bandwidth limitation while an NoC(Network-on-Chip) approach suffers from unacceptable complexity in its Implementation. This paper introduces a new on-chip communication protocol, SNP (SoC Network Protocol) to overcome these problems. In SNP, conventional on-chip bus signals are categorized into three groups, control, address, and data and only one set of wires is used to transmit all three groups of signals, resulting in the dramatic decrease of the number of wires. SNP efficiently supports master-master communication as well as master-slave communication with symmetric channels. A sequencing rule of signal groups is defined as a part of SNP specification and a phase-restoration feature is proposed to avoid redundant signals transmitted repeatedly over back-to-back transactions. Simulation results show that SNP provides about the same bandwidth with only $54\%$ of wires when compared with AMBA AHB.

Implementation of An Embedded Communication Translator for Remote Control (원격 제어를 위한 임베디드 통신 변환기 구현)

  • Lee Byung-Kwon;Chon Young-Suk;Jeon Joong-Nam
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.445-454
    • /
    • 2006
  • Almost of industrial measuring instruments usually are equipped only with serial communication devices. In order to connect these instruments to internet, we implement an embedded translator. This device has the hardware components composed of one WAN port, two LAN ports, and two UARTs, and functions as a communication translator between serial and internet communication. it also provides web-based monitoring function that is absent from existing serial-to-ethernet converter. The hardware is implemented using the KS8695 network processor which s an ARM922T as processor core. We have installed the boa web server and utilized the CGI function for internet-based remote control, added the IP sharing function which allows the network with private IP addresses to access the internet, and developed a serial-to-ethernet translation program. Finally, we show an application example of the developed translator that remotely monitors the solar energy production system.

An Empirical Analysis of Coffee Franchise Location Strategies: Evidence from Gyeonggi Province (경기도 커피 전문점의 입점 전략에 대한 실증 연구)

  • Youn, Youngtae;Lee, Dongyoup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.192-199
    • /
    • 2016
  • This article examines the location strategies of coffee franchises in Gyeonggi province. Due to its large population, broad area, and diverse industrial structure, Gyeonggi province is an ideal dataset for empirical testing of the location strategies. We collect the addresses of five major coffee franchises stores, convert them into geographic coordinates using Google Maps Geocoding API, and compute Haversine distances both between stores of the same franchise and between stores of different franchises. This novel approach leads to three discoveries. First, coffee-consuming age population is positively related to the number of stores and more strongly for commercial areas with a large floating population. Second, one third of Starbucks stores have another Starbucks store within a radius of 300m, which empirically confirms the 'Focused Destroy Strategy' of Starbucks that has multiple stores in central business districts. Third, for 80% of Starbucks stores, we can find Ediya stores within 500m, which supports Ediya's 'Next-to-Starbucks Strategy'. Our research methods can be efficiently applied to the analyses of other retail businesses such as convenience stores, fast food restaurants, and mobile phone shops.