• 제목/요약/키워드: 클라우드 운영 모델

Search Result 61, Processing Time 0.028 seconds

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

A Database Design for Remote Maintenance of Navigation and Communication Equipments in a Vessel (선박 항해통신장비 원격유지보수를 위한 데이터베이스 설계)

  • Kim, Ju-young;Ok, Kyeong-suk;Kim, Ju-won;Cho, Ik-soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2052-2060
    • /
    • 2017
  • The SOLAS ship should carry at least 83 different types of equipment based on the SFI group codes and each of which consists of several to dozens of components. During ship operation, it is necessary to ensure the normal operation of such equipment, and remote maintenance is highly demanded for immediate repair in the event of a equipment fault. This study proposes to find suitable classification system and to derive database structure for remote maintenance of navigation and communication equipment. As a result of this study, the classification system of equipment should be layered into equipment type, model, and component, and main table in the database consists of FMEA, service history, case data through Q&A, Preventive Maintenance. A database was constructed for 140 navigation and communication equipment models and 750 components. In order to evaluate the practical effects, service engineer evaluated the usefulness using the cloud app.

Analyzing Characteristics of the Smart City Governance (스마트시티 거버넌스 특성 분석)

  • LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.86-97
    • /
    • 2016
  • This study aims to analyze the characteristics of the smart city governance through the multi-layer governance model, which includes administrative governance(AG), technological governance(TG), and global governance(GG). The results of the smart city governance are as follows. Multi-layered governance was modeled to enable cross-checking of each element of the propelling process and types of governance. AG has transitioned from a public partnership to a public-private people partnership(pppp) through a public-private partnership(ppp). TG has the characteristics of information communication technologies(ICTs) - eco technologies(EcoTs) - Spatial technology convergence including physical center, information software platforms such as the CCTV convergence center, and virtualization such as the cloud data center. GG aims at developing killer applications and ICTs-embedded space with intelligent buildings such as a smart city special zone to enable overseas exports. The smart city roadshow and forum have been developed as a platform for overseas exports with competition as well as cooperation.

Service Development Tool for Micro Grid Common Platform (마이크로 그리드용 공통플랫폼 서비스 개발 도구)

  • Lee, Hyun-Hee;You, Dae-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1455-1461
    • /
    • 2015
  • Micro Grid is a new concept of electrical grid to solve several problems of Mega-Grid and it is under research and development at the national level around the world. With this background, Micro Grid Common Platform has been developed for interoperability technology of devices-systems in Micro Grid and securing enabler for new market. For supporting business models, Micro Grid Common Platform provides electric power information to Third-Party licensee via Open API function. Licensee, who want to develop electric power application by connecting to Micro Grid Common Platform, needs IDE(Integrated Development Environment) for service development and distribution. The paper proposes a service development tool for developing applications of Micro Grid Common Platform as a PaaS (Platform as a Service).

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

The Design and Implementation of an Emergency Video Call Integrated Management System based on VoIP (VoIP기반 승강기 비상 화상통화 통합 관리 시스템 설계 및 구현)

  • Kim, Woon-Yong;Kim, SoonGohn
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.93-99
    • /
    • 2017
  • The elevator system combines various convergence technologies with the development of ICT technology. Emergency call devices which are safety related devices is applied as an obligation of the elevator and those scope also varies. In this paper, we propose an integrated model that overcomes the limitations of existing voice emergency call devices and efficiently manages and manages video call based service structures in VoIP based on wired and wireless environments. This method effectively manages and operates various lift data and video records in the elevator between the manager, the server and the user. And also It is possible to secure the quality of video call in VoIP and cloud service environment and increase the reliability of safety management and enhance various service environment by creating an integrated structure utilizing various data and additional services in the elevator.

Development of an AI Analysis Service System based on OpenFaaS (OpenFaaS 기반 AI 분석 서비스 시스템 구축)

  • Jang, Rae-young;Lee, Ryong;Park, Min-woo;Lee, Sang-hwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.97-106
    • /
    • 2020
  • Due to the rapid development and dissemination of 5G communication and IoT technologies, there are increasing demands for big data analysis techniques and service systems. In particular, explosively growing demands on AI technology adoption are also causing high competitions to take advantages of machine/deep-learning models to extract novel values from enormously collected data. In order to adopt AI technology to various research and application domains, it is necessary to prepare high-performance GPU-equipped systems and perform complicated settings to utilze deep learning models. To relieve the efforts and lower the barrier to utilize AI techniques, AIaaS(AI as a service) platform is attracting a great deal of attention as a promising on-line service, where the complexity of preparation and operation can be hidden behind the cloud side and service developers only need to utilize the high-level AI services easily. In this paper, we propose an AIaaS system which can support the creation of AI services based on Docker and OpenFaaS from the registration of models to the on-line operation. We also describe a case study to show how AI services can be easily generated by the proposed system.

A case study of blockchain-based public performance video platform establishment: Focusing on Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do (블록체인 기반 공연영상 공공 플랫폼 구축 사례 연구: 경기도 뉴미디어 예술방송국 경기아트온을 중심으로)

  • Lee, Seung Hyun
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.108-126
    • /
    • 2023
  • This study explored the sustainability of a blockchain-based cultural art performance video platform through the construction of Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do. In addition, the technical limitations of video content transaction using block chain, legal and institutional issues, and the protection of personal information and intellectual property rights were reviewed. As for the research method, participatory observation methods such as in-depth interviews with developers and operators and participation in meetings were conducted. The researcher participated in and observed the entire development process, including designing and developing blockchain nodes, smart contracts, APIs, UI/UX, and testing interworking between blockchain and content distribution services. Research Question 1: The results of the study on 'Which technology model is suitable for a blockchain-based performance video content distribution public platform?' are as follows. 1) The blockchain type suitable for the public platform for distribution of art performance video contents based on the blockchain is the private type that can be intervened only when the blockchain manager directly invites it. 2) In public platforms such as Gyeonggi ArtOn, among the copyright management model, which is an art based on NFT issuance, and the BC token and cloud-based content distribution model, the model that provides content to external demand organizations through API and uses K-token for fee settlement is suitable. 3) For public platform initial services such as Gyeonggi ArtOn, a closed blockchain that provides services only to users who have been granted the right to use content is suitable. Research question 2: What legal and institutional problems should be reviewed when operating a blockchain-based performance video distribution public platform? The results of the study are as follows. 1) Blockchain-based smart contracts have a party eligibility problem due to the nature of blockchain technology in which the identities of transaction parties may not be revealed. 2) When a security incident occurs in the block chain, it is difficult to recover the loss because it is unclear how to compensate or remedy the user's loss. 3) The concept of default cannot be applied to smart contracts, and even if the obligations under the smart contract have already been fulfilled, the possibility of incomplete performance must be reviewed.

A Study on Construction & Management of Urban Spatial Information Based on Digital Twin (디지털트윈 기반의 도시 공간정보 구축 및 관리에 관한 연구)

  • Lih, BongJoo
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.1
    • /
    • pp.47-63
    • /
    • 2023
  • The Seoul Metropolitan Government is building and operating digital twin-based urban spatial information to solve various problems in the city and provide public services. Two essential factors to ensure the stable utilization of spatial information for the implementation of such a digital twin city are the latest and quality of the data. However, it is time-consuming and costly to maintain continuous updating of high-quality urban spatial information. To overcome this problem, we studied efficient urban spatial information construction technology and the operation, management, and update procedures of construction data. First, we demonstrated and applied automatic 3D building construction technology centered on point clouds using the latest hybrid sensors, confirmed that it is possible to automatically construct high-quality building models using high-density airborne lidar results, and established an efficient data management plan. By applying differentiated production methods by region, supporting detection of urban change areas through Seoul spatial feature identifiers, and producing international standard data by level, we strengthened the utilization of urban spatial information. We believe that this study can serve as a good precedent for local governments and related organizations that are considering activating urban spatial information based on digital twins, and we expect that discussions on the construction and management of spatial information as infrastructure information for city-level digital twin implementation will continue.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.