• Title/Summary/Keyword: 초연결 네트워크

Search Result 58, Processing Time 0.028 seconds

인공신경망 알고리즘을 통한 사물인터넷 위협 탐지 기술 연구

  • Oh, Sungtaek;Go, Woong;Kim, Mijoo;Lee, Jaehyuk;Kim, Hong-Geun;Park, SoonTai
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.59-66
    • /
    • 2019
  • 사물인터넷 환경은 무수히 많은 이기종의 기기가 연결되는 초연결 네트워크 구성을 갖는 특성이 있다. 본 논문에서는 이러한 특성을 갖는 사물인터넷 환경에 적합한 보안 기술로 네트워크를 통해 침입하는 위협의 효율적인 탐지 기술을 제안한다. 사물인터넷 환경에서의 대표적인 위협 행위를 분석하고 관련하여 공격 데이터를 수집하고 이를 토대로 특성 연구를 진행하였다. 이를 기반으로 인공신경망 기반의 오토인코더 알고리즘을 활용하여 심층학습 탐지 모델을 구축하였다. 본 논문에서 제안하는 탐지 모델은 비지도 학습 방식의 오토인코더를 지도학습 기반의 분류기로 확장하여 사물인터넷 환경에서의 대표적인 위협 유형을 식별할 수 있었다. 본 논문은 1. 서론을 통해 현재 사물인터넷 환경과 보안 기술 연구 동향을 소개하고 2. 관련연구를 통하여 머신러닝 기술과 위협 탐지 기술에 대해 소개한다. 3. 제안기술에서는 본 논문에서 제안하는 인공신경망 알고리즘 기반의 사물인터넷 위협 탐지 기술에 대해 설명하고, 4. 향후연구계획을 통해 추후 활용 방안 및 고도화에 대한 내용을 작성하였다. 마지막으로 5. 결론을 통하여 제안기술의 평가와 소회에 대해 설명하였다.

Study of Machine Learning Method for Anormaly Detection Using Multivariate Gaussian Distribution in LPWA Network Environment (LPWA 네트워크 환경에서 다변량 가우스 분포를 활용하여 이상탐지를 위한 머신러닝 기법 연구)

  • Lee, Sangjin;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.309-311
    • /
    • 2017
  • With the recent development of the Internet (IoT) technology, we have come to a very connected society. This paper focuses on the security aspects that can occur within the LPWA Network environment of the Internet of things, and proposes a new machine learning method considering next generation IPS / IDS that can detect and block unexpected and unusual behavior of devices.

  • PDF

3GPP 5G 보안 구조의 특징 및 주요 개선사항

  • Park, Jong-Geun;Kim, Jong-Hyun;Moon, Daesung;Kim, Ikkyun
    • Review of KIISC
    • /
    • v.29 no.5
    • /
    • pp.21-30
    • /
    • 2019
  • 우리나라는 세계 최초로 초고속 초연결 초저지연의 5G 이동통신 상용화에 성공하였다. 비록 아직은 4G LTE 코어망과 연계하여 5G 서비스를 제공하고 있지만, 향후 5G 코어망이 구축된 이후에는 완전한 5G 네트워크를 통해 5G 융합서비스가 본격화될 전망이다. 그러나, 우리 실생활과 밀접한 새로운 미래 혁신 서비스에 대한 기대와 열망 때문에 5G 네트워크 환경이 갖고 있는 잠재적 보안위협이나 취약점을 간과해서는 안된다. 보다 고도화되고 지능화되는 사이버 공격에 대응하기 위해 위협 대응전략 또한 고도화되어야 한다. 본 논문에서는 5G 보안 기술을 이해하기 위해 3GPP의 5G 보안 기술규격인 TS 33.501을 바탕으로 5G 보안의 근간을 이루는 구조적 특징과 4G 대비 주요 개선사항을 중심으로 소개한다.

AI and Network Trends for Manned-Unmanned Teaming (유‧무인 복합을 위한 AI와 네트워크 동향)

  • J.K. Choi;Y.T. Lee;D.W. Kang;J.K. Lee;H.S. Park
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.4
    • /
    • pp.21-31
    • /
    • 2024
  • Major global powers are investing heavily in artificial intelligence (AI) and hyper-connected networks, demonstrating their crucial role in future warfare. To advance and utilize AI in national defense, it is essential to have policy support at the governmental or national level. This includes establishing a research and development infrastructure, creating a common development environment, and fostering AI expertise through education and training programs. To achieve advancements in hyper-connected networks, it is essential to establish a foundation for a robust and resilient infrastructure by comprehensively building integrated satellite, aerial, and ground networks, along with developing 5G & edge computing and low-orbit satellite communication technologies. This multi-faceted approach will ensure the successful integration of AI and hyper-connected networks, strengthening national defense and positioning nations at the forefront of technological advancements in warfare.

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

Technical Value Model and Evaluation for Smart In-vehicle Network (스마트 차량내(內) 네트워크 기술가치 모델 및 평가)

  • Kim, Byung-Woon
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.368-386
    • /
    • 2017
  • The purpose of this study is to present the technology value model based on profit approach and IITP practical guide for Ethernet network technology, which is the core technology of autonomous vehicles and connected cars in the hyper-connected industry. In-vehicle network, Ethernet technology, Ethernet port count, port pricing, and application data for technology assessment are sources of global market research organizations. The data on the company's COGS (Cost of Goods Sold), operating capital requirement, capital expenditure, and income statement data are used by the Bank of Korea's Business Analysis Report. According to the results of the study, the product market size was estimated to be US $470.3 billion and the technology market size was $52.1 billion over the seven years of economic life cycle of technology. The market value of the technology was estimated to be $260 million reflecting the possibility of entry into the market. In the case of the corporate management analysis report, the average value of the IITP and the top 25% were $0.7 million and $40.2 million, respectively. -27.8 million, and -73.6 million dollars respectively. This implies that government support for policy support is needed when conducting corporate R&D with high cost-to-sales ratio. The results of this study can be used as a reference for the evaluation of technology demand based ICT R&D technology in the industrial internet market in the fourth industrial revolution era.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

The Power of Connectivity: Cooperative Network and Firm Performance in the IT Industry (초연결시대의 협력: IT 기업 간 협력 네트워크와 성과에 관한 연구)

  • Ji Hye Park
    • Information Systems Review
    • /
    • v.19 no.2
    • /
    • pp.21-35
    • /
    • 2017
  • The advancement of IT and the "Fourth Industrial Revolution" blurred the boundary between industries. The importance of strategic cooperation between enterprises is emphasized. IT companies must consider their existing business areas and create new territories to drive changes in the industry. They must also secure their competitive edge and manage economic costs to enable them to compete with their global counterparts. By utilizing their resources effectively, these firms can create value through inter-firm cooperation. This study analyzes the collaborative network of global IT companies using social network analysis and examines the effect of this network on firm performance. Collaborative linkages and betweenness centrality, which represent the bridging position of a firm in a network, significantly affect firm performance. This result highlights the importance of the structural position of a firm in a cooperative network of IT companies. This study also characterizes clusters in a network of IT companies. Most of these clusters comprise a combination of IT companies in diverse IT industries. These clusters suggest that these companies engage in multilateral cooperation without boundaries to maximize their business capabilities. This study offers practical implications for establishing a cooperative strategy and framework that can capture business trends in the IT industry from a macroscopic view. This study also visualizes collaborative networks in a multifaceted way using social network analysis to provide researchers and business practitioners with an informative viewpoint.

Trends of Technology Developments for mmWave-based 5G Mobile Communications (밀리미터파 활용 5세대 이동통신 기술 개발 동향)

  • Hong, S.E.;Kim, I.K.;Bang, S.C.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.6
    • /
    • pp.107-117
    • /
    • 2013
  • 최근 모바일 스마트 기가 및 서비스의 새로운 패러다임 진화에 따른 초연결(Hyper connection) 사회로의 진입과 빅데이터 출현으로 인해, 모바일 트래픽은 해마다 2배씩 증가하여 10년 뒤 1,000배 이상 증가할 것으로 예상하고 있으며, 이처럼 급격히 증가하는 모바일 트래픽 증가로 인해 모바일 망 사업자의 부담이 가중되고 있다. 추가 주파수 확보가 제한된 기존의 4G 이동통신으로는 이러한 모바일 트래픽 폭증에 따른 1,000배 용량 증대를 수용할 수 없고, 따라서 광대역폭 확보가 가능한 밀리미터파 기반의 5세대 이동통신 기술 개발이 전 세계적으로 시작되고 있다. 본고에서는 비/저활용 되어 왔던 밀리미터파를 개척하여 5세대 이동통신 기술로 활용하는 기술 개발 동향을 살펴본다. 특히, 한국전자통신연구원에서 진행하고 있는 '중추 네트워크 원전기술 개발 과제' 내용을 중점적으로 소개하고자 한다.