• Title/Summary/Keyword: 표적융합

Search Result 139, Processing Time 0.026 seconds

Internal Network Response Plan through Cyber Threat Trend Analysis (사이버위협 동향 분석을 통한 내부망 대응 방안)

  • Byun, Ye-Eun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.258-259
    • /
    • 2020
  • 한국인터넷진흥원에서는 2020년 사이버 공격에 대한 7대 전망을 일상 속 보안 취약점, 공공기관·기업 대상 랜섬웨어, 가상동화 거래소를 통한 해킹 사고, 문자 메시지·이메일을 통한 악성코드 감염, 지능형 표적 공격, 소프트웨어 공급망 공격, 융합 서비스 보안 위협으로 제시하였다. 이에 본 논문에서는 신규 사이버위협에 대한 동향 분석을 통하여 기관의 정보보안을 위해 대응할 수 있는 방안에 대해 살펴보고자 한다.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

A Study of Multi-Target tracking for Radar application (레이더 응용을 위한 다중표적 추적 연구)

  • Lee Yang Weon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.138-144
    • /
    • 2000
  • This paper introduced a scheme for finding an optimal association matrix that represents the relationships between the measurements and tracks in multi-target tracking of Radar system. We considered the relationships between targets and measurements as MRF and assumed a priori of the associations as a Gibbs distribution. Based on these assumptions, it was possible to reduce the MAP estimate of the association matrix to the energy minimization problem. After then, we defined an energy function over the measurement space, that may incorporate most of the important natural constraints.

  • PDF

양자 컴퓨터 등장에 따른 랜섬웨어 대응 기술 동향

  • Dabin We;Han-gyeol Kim;Myungseo Park
    • Review of KIISC
    • /
    • v.34 no.2
    • /
    • pp.57-62
    • /
    • 2024
  • 전 세계적으로 막대한 피해를 주고 있는 랜섬웨어는 다양한 방법으로 주요 조직을 대상으로 표적 공격을 펼친다. 랜섬웨어는 일반적으로 공격 대상 시스템의 파일을 암호화하기 위해 블록 암호, 스트림 암호와 같은 대칭키 암호를 사용하고, 해당 파일을 암호화할 때 사용되었던 대칭키를 공개키 암호로 보호한다. 여기서, 대칭키를 암호화할 때 RSA, ECC와 같은 공개키 암호를 주로 사용하는데, 이는 현재 전 세계적으로 이슈가 되고 있는 양자 컴퓨터의 발전과 Shor 알고리즘을 이용하여 무력화할 수 있다. 이러한 이유로 랜섬웨어가 기존의 암호화 구성에서 공개키 암호를 대신하여 양자 후 암호를 적용한다면, 양자 컴퓨터를 통한 랜섬웨어 대응이 불가능해진다. 본 논문에서는 랜섬웨어의 최신 기술 동향을 분석하고, 랜섬웨어의 암호화 구성에 기존 공개키 암호 대신 양자 후 암호를 적용 시 발생하는 공격 대응 원리에 대해 설명한다.

Jamming Effect of Stand-Off Jammer to Main Lobe of LPI Radar (LPI 레이더에 대한 원격지원 재머의 주엽 재밍 효과)

  • Lim, Joong-Soo;Chae, Gyoo-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.3
    • /
    • pp.16-21
    • /
    • 2020
  • This paper describes the jamming characteristics of a stand-off jammer jamming the LPI radar. The LPI radar reduces the side lobes of the receiving antenna to reduce the effect of jamming. It is easy a radar to predict the effect of jamming on a self-protection jammer where the jammer is in the same position as the target. However, for stand-off jammer jamming at different locations from the target, the prediction of jamming effect is complex. In this paper, the jamming effect of LPI radar is analyzed using signal to jamming ratio and burn-through range. Also, when the antenna's side lobe decreases below -30 dB, the stand-off jamming effect in the side lobe direction is weak. So we proposed a new jamming method for the main lobe and analyzed the jamming effect. This study is expected to be useful for the design and operation of aircraft jammers.

Estimation of Drone Velocity with Sum of Absolute Difference between Multiple Frames (다중 프레임의 SAD를 이용한 드론 속도 측정)

  • Nam, Donho;Yeom, Seokwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.3
    • /
    • pp.171-176
    • /
    • 2019
  • Drones are highly utilized because they can efficiently acquire long-distance videos. In drone operation, the speed, which is the magnitude of the velocity, can be set, but the moving direction cannot be set, so accurate information about the drone's movement should be estimated. In this paper, we estimate the velocity of the drone moving at a constant speed and direction. In order to estimate the drone's velocity, the displacement of the target frame to minimize the sum of absolute difference (SAD) of the reference frame and the target frame is obtained. The ground truth of the drone's velocity is calculated using the position of a certain matching point over all frames. In the experiments, a video was obtained from the drone moving at a constant speed at a height of 150 meters. The root mean squared error (RMSE) of the estimated velocities in x and y directions and the RMSE of the speed were obtained showing the reliability of the proposed method.

Comparison of Multi-Static Sonar Target Positioning Performance (다중상태 소나망 위치 추정 성능 비교)

  • Park, Chee-Hyun;Ko, Han-Seok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.166-172
    • /
    • 2007
  • In this paper, we address the target positioning performance of Multi-Static sonar with respect to target positioning method and measurement error. Based on the analysis on two candidate solution approaches, namely, Least Square (LS) using range and angular information simultaneously and Maximum Likelihood (ML) using only range information as the existing information fusion methods for possible application to Multi-Static sonar, we propose to employ ML using range and angular information. Assuming that each sensor can receive range and angular information, we conduct representative comparison experiments over the existing and proposed methods under various measurement noise scenarios. We also investigate the target positioning performance according to number of sensors, distance between transmitter and receiver. According to the experimental results, RMSE of the proposed ML with distance and direction information is found to be more superior to ML using distance alone and to LS in case distance between transmitter and receiver is longer and number of receiver is smaller.

Trend Analysis of Context-based Intelligent XDR (컨텍스트 기반의 지능형 XDR 동향 분석)

  • Ryu, Jung-Hwa;Lee, Yeon-Ji;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.198-201
    • /
    • 2022
  • Recently, new cyber threats targeting new technologies are increasing, and hackers' attack targets are becoming broader and more intelligent. To counter these attacks, major security companies are using traditional EDR (Endpoint Detection and Response) solutions. However, the conventional method does not consider the context, so there is a limit to the accuracy and efficiency of responding to an advanced attack. In order to improve this problem, the need for a security solution centered on XDR (Extended Detection and Response) has recently emerged. In this study, we present effective threat detection and countermeasures in a changing environment through XDR trends and development roadmaps using machine learning-based context analysis.

  • PDF

Prediction of Cognitive Impairment Using Blood Gene Expression Based on Machine Learning (혈액 유전자 발현을 이용한 기계학습 기반 인지장애 예측)

  • Lee, Seungeun;Zhou, Yu;Kang, Kyungtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.61-62
    • /
    • 2022
  • 알츠하이머성 치매는 현존하는 치료법이 없어 경도인지장애 단계에서의 예방이 중요하다. 지금까지의 알츠하이머 연구는 대부분이 뇌영상 마커와 뇌척수액 마커에 집중되어 있었으며, 경도 인지 장애 단계에서의 탐색은 더욱 적었다. 이러한 점에서 혈액 유전자 발현을 이용한 경도 인지장애 단계 예측은 인지 능력에 따른 관련 유전자 식별과 접근 가능한 진단 및 치료 바이오 마커 탐색에 기여할 수 있다. 그러나 유전자 발현 데이터의 경우 환자 수에 비해 높은 차원을 가지기 때문에 과적합을 막고 질병 관련 유전자를 식별하기 위해서는 데이터에서의 의미 있는 차원만을 뽑아내는 차원 축소가 선행되야 한다. 본 연구는 유전자 발현데이터에서의 인지장애 분류를 위해 차원 축소기법과 신경망을 적용하여 인지 장애 정도를 예측하였다. 그 결과, Lasso 이용 차원축소와 신경망을 이용하여 97%의 정확도로 정상과 조기 경도 인지장애, 후기 경도 인지장애 환자를 분류 할 수 있었으며, 더 적은 차원에서도 분류가 가능했다. 이는 혈액 유전자 발현을 이용해 경도 인지장애 단계를 예측한 첫 번째 연구이며, 인지능력 저하에 따른 혈액 유전자 발현의 연관성을 확인하고 향후 조기 진단, 치료 표적 탐색에 기여한다.

  • PDF

Suggestions for the Development of Internet-based Cognitive-Behavioral Therapy with a Trauma Focus (트라우마 초점의 인터넷 기반 인지행동치료 개발을 위한 제언)

  • Choi, Yun-Kyeung
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.261-274
    • /
    • 2020
  • Research on the development and effectiveness of internet-based cognitive-behavioral therapy with a trauma focus (iCBT-T) has been actively conducted in Western societies, but these studies have just begun in Korea. The purpose of this study was to suggest practical considerations to developing and managing the iCBT-T program. After reviewing previous studies on iCBT-T, this author suggested a model of convergence and collaboration between mental health knowledge and information and communication technologies (ICT) to develop the iCBT-T program. This article outlines practical considerations, including focus and target groups of iCBT-T, intervention types of iCBT-T (open access vs. guided), number of sessions, ethical issues, professional support, and degree of user involvement. Methods to complement the limitations of internet as a medium are also proposed in the iCBT-T program. The convergence model of CBT-T and ICT is expected to promote the development of programs that can contribute to improving the mental health of users who experience traumatic events.