• Title/Summary/Keyword: AI Security

Search Result 436, Processing Time 0.032 seconds

Analysis of AI Content Detector Tools

  • Yo-Seob Lee;Phil-Joo Moon
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.154-163
    • /
    • 2023
  • With the rapid development of AI technology, ChatGPT and other AI content creation tools are becoming common, and users are becoming curious and adopting them. These tools, unlike search engines, generate results based on user prompts, which puts them at risk of inaccuracy or plagiarism. This allows unethical users to create inappropriate content and poses greater educational and corporate data security concerns. AI content detection is needed and AI-generated text needs to be identified to address misinformation and trust issues. Along with the positive use of AI tools, monitoring and regulation of their ethical use is essential. When detecting content created by AI with an AI content detection tool, it can be used efficiently by using the appropriate tool depending on the usage environment and purpose. In this paper, we collect data on AI content detection tools and compare and analyze the functions and characteristics of AI content detection tools to help meet these needs.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

AI-Based Intelligent CCTV Detection Performance Improvement (AI 기반 지능형 CCTV 이상행위 탐지 성능 개선 방안)

  • Dongju Ryu;Kim Seung Hee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.117-123
    • /
    • 2023
  • Recently, as the demand for Generative Artificial Intelligence (AI) and artificial intelligence has increased, the seriousness of misuse and abuse has emerged. However, intelligent CCTV, which maximizes detection of abnormal behavior, is of great help to prevent crime in the military and police. AI performs learning as taught by humans and then proceeds with self-learning. Since AI makes judgments according to the learned results, it is necessary to clearly understand the characteristics of learning. However, it is often difficult to visually judge strange and abnormal behaviors that are ambiguous even for humans to judge. It is very difficult to learn this with the eyes of artificial intelligence, and the result of learning is very many False Positive, False Negative, and True Negative. In response, this paper presented standards and methods for clarifying the learning of AI's strange and abnormal behaviors, and presented learning measures to maximize the judgment ability of intelligent CCTV's False Positive, False Negative, and True Negative. Through this paper, it is expected that the artificial intelligence engine performance of intelligent CCTV currently in use can be maximized, and the ratio of False Positive and False Negative can be minimized..

Taxonomy and Countermeasures for Generative Artificial Intelligence Crime Threats (생성형 인공지능 관련 범죄 위협 분류 및 대응 방안)

  • Woobeen Park;Minsoo Kim;Yunji Park;Hyejin Ryu;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.301-321
    • /
    • 2024
  • Generative artificial intelligence is currently developing rapidly and expanding industrially. The development of generative AI is expected to improve productivity in most industries. However, there is a probability for exploitation of generative AI, and cases that actually lead to crime are emerging. Compared to the fast-growing AI, there is no legislation to regulate the generative AI. In the case of Korea, the crimes and risks related to generative AI has not been clearly classified for legislation. In addition, research on the responsibility for illegal data learned by generative AI or the illegality of the generated data is insufficient in existing research. Therefore, this study attempted to classify crimes related to generative AI for domestic legislation into generative AI for target crimes, generative AI for tool crimes, and other crimes based on ECRM. Furthermore, it suggests technical countermeasures against crime and risk and measures to improve the legal system. This study is significant in that it provides realistic methods by presenting technical countermeasures based on the development stage of AI.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

IoT industrial site safety management system incorporating AI (AI를 접목한 IoT 기반 산업현장 안전관리 시스템)

  • Lee, Seul;Jo, So-Young;Yeo, Seung-Yeon;Lee, Hee-Soo;Kim, Sung-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.118-121
    • /
    • 2022
  • 국내 산업재해 사고 사망자의 상당수가 건설업에서 발생하고 있다. 건설 현장에는 굴삭기, 크레인과 같은 중장비가 많고 높은 곳에서 작업하는 경우가 흔해 위험 요소에 노출될 가능성이 높다. 물리적 사고 외에도 작업 중 발생하는 미세먼지에는 여러 유해 인자가 존재하여 건설근로자들에게 호흡기질환과 같은 직업병을 유발한다. 정부에서는 산업현장 안전 관리의 중요성이 증가함에 따라 각종 산업재해로부터 근로자를 보호하기 위한 법안을 마련하였다. 따라서 건설 현장의 경우 산업재해를 방지하기 위해서 위험요소를 사전에 인지하고 즉각 대응할 수 있는 기술이 필요하다. 본 연구에서는 인공지능(AI)과 사물인터넷(IoT)을 통한 자동화 기술을 활용하여 24시간 안전 관리 시스템을 제안한다. 제안하는 IoT 기반 통합안전 관리 시스템은 AI를 적용한 CCTV를 통해 산업 현장을 모니터링하고, 다수의 IoT 센서가 측정한 수치를 근로자 및 관리자가 실시간으로 확인할 수 있게 하여 산업 현장 내 안전사고를 예방한다. 구체적으로 어플리케이션을 통해 미세먼지 농도, 가스 농도, 온도, 습도, 안전모 착용 여부 등을 모니터링할 수 있다. 모니터링 중에 유해물질의 농도가 일정 수치를 넘기거나 안전모를 착용하지 않은 근로자가 발견될 경우 근로자 및 관리자에게 경고 알림을 발송한다. 유해물질 농도는 IoT 센서를 통해 측정하며 안전모 착용 여부는 카메라 센서에 딥러닝 모델을 적용하여 인식하였다. 본 연구에서 제시한 통합안전관리시스템을 통해 건설현장을 비롯한 산업현장의 산업재해 감소와 근로자 안전 증진에 기여할 수 있을 것으로 기대한다.

Chemical signalling within the rumen microbiome

  • Katie Lawther;Fernanda Godoy Santos;Linda B Oyama;Sharon A Huws
    • Animal Bioscience
    • /
    • v.37 no.2_spc
    • /
    • pp.337-345
    • /
    • 2024
  • Ruminants possess a specialized four-compartment forestomach, consisting of the reticulum, rumen, omasum, and abomasum. The rumen, the primary fermentative chamber, harbours a dynamic ecosystem comprising bacteria, protozoa, fungi, archaea, and bacteriophages. These microorganisms engage in diverse ecological interactions within the rumen microbiome, primarily benefiting the host animal by deriving energy from plant material breakdown. These interactions encompass symbiosis, such as mutualism and commensalism, as well as parasitism, predation, and competition. These ecological interactions are dependent on many factors, including the production of diverse molecules, such as those involved in quorum sensing (QS). QS is a density-dependent signalling mechanism involving the release of autoinducer (AIs) compounds, when cell density increases AIs bind to receptors causing the altered expression of certain genes. These AIs are classified as mainly being N-acyl-homoserine lactones (AHL; commonly used by Gram-negative bacteria) or autoinducer-2 based systems (AI-2; used by Gram-positive and Gram-negative bacteria); although other less common AI systems exist. Most of our understanding of QS at a gene-level comes from pure culture in vitro studies using bacterial pathogens, with much being unknown on a commensal bacterial and ecosystem level, especially in the context of the rumen microbiome. A small number of studies have explored QS in the rumen using 'omic' technologies, revealing a prevalence of AI-2 QS systems among rumen bacteria. Nevertheless, the implications of these signalling systems on gene regulation, rumen ecology, and ruminant characteristics are largely uncharted territory. Metatranscriptome data tracking the colonization of perennial ryegrass by rumen microbes suggest that these chemicals may influence transitions in bacterial diversity during colonization. The likelihood of undiscovered chemicals within the rumen microbial arsenal is high, with the identified chemicals representing only the tip of the iceberg. A comprehensive grasp of rumen microbial chemical signalling is crucial for addressing the challenges of food security and climate targets.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up (데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.439-449
    • /
    • 2019
  • The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF