• Title/Summary/Keyword: AI threats

Search Result 64, Processing Time 0.029 seconds

A Study on the Current Status of Domestic and International Cybersecurity Education and the Importance of Regular Cybersecurity Education for Teenagers according to the Development of AI (국내외 정보보안 교육의 현황 및 인공지능의 발전에 따른 청소년 정보보안 정규교육의 중요성에 대한 연구)

  • Dahye Jeong;Sanghoon Jeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.527-536
    • /
    • 2024
  • In the digital age, the growth of AI and digital technologies brings opportunities and cybersecurity risks. At the forefront of this change are teenagers, referred to as 'digital natives'. However, they may have difficulty using technology safely without proper information security knowledge. This paper highlights the need for information security education for teenagers in South Korea by referring to cases in the UK, Australia, and the US. These countries are already providing education that prepares young people for cyber threats and future societal needs. Reflecting this trend, South Korea should also establish comprehensive information security education for teenagers to equip them for the digital age.

Robot Journalism Research Trends and Future Prospects (로봇 저널리즘 연구 동향 및 미래 전망)

  • Cui, Jian-Dong;Song, Seung-keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.333-336
    • /
    • 2020
  • AI-powered robot news is drawing attention as artificial intelligence technology is fully spread in the news distribution field. Robot news still has many technical and ethical problems, but academic research on this is insufficient. This study analyzes the issue of robot writing in artificial intelligent based robot journalism industry using SWOT analysis. As a result, the advantages of big data processes, accurate information gathering, high efficiency and disadvantages such as lack of independent arguments and lack of evidence and opportunities for technical development, government support, academic development, and industrial applications, and threats such as uncritical acceptance and lack of talent have been found. This study suggests three future-oriented directions, such as human-machine collaboration, intelligent news, and chat-bot, through previous studies on the development direction of robot journalism-based article writing.

A Study on The Effects of Maritime Autonomous Surface Ships on the VTS Environment (자율운항선박이 VTS환경에 미치는 영향에 관한 연구)

  • Chul Son;Jihyun Oh;Jong-ik Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.25-25
    • /
    • 2023
  • 빅데이터, AI, 인공지능 등 기술이 발전함에 있어서 자율운항도입에 따른 VTS 체계변화에 대한 인식이 필요한 실정이다. 이 연구에서는 자율운항선박이 상용화함에 따라 요구되는 적합성을 제고하기 위해 영향을 미치는 내외적인 환경요인들을 전문가집단의 브레인스토밍, 설문조사, 인터뷰 등 다방면으로 조사하고, 해당 요소를 기반으로 TOWS분석을 통해 강점(Strength), 약점(Weakness), 기회(Opportunities), 위협(Threats)의 각 요소를 상호 결합해 전략주제 도출 및 새로운 관제절차와 관련 기술, 자율운항 교육프로그램, 사이버 보안조치, 자율운항 관련 알고리즘 구성 요소 등 구체적 실행계획을 제시함으로써 예측되는 변화 대응에 기여하고자 한다.

  • PDF

Forensic study of autonomous vehicle using blockchain (블록체인을 이용한 자율주행 차량의 포렌식 연구)

  • Jang-Mook, Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.209-214
    • /
    • 2023
  • In the future, as autonomous vehicles become popular at home and abroad, the frequency of accidents involving autonomous vehicles is also expected to increase. In particular, when a fully autonomous vehicle is operated, various criminal/civil problems such as sexual violence, assault, and fraud between passengers may occur as well as the vehicle accident itself. In this case, forensics for accidents involving autonomous vehicles and accidents involving passengers in the vehicles are also about to change. This paper reviewed the types of security threats of autonomous vehicles, methods for maintaining the integrity of evidence data using blockchain technology, and research on digital forensics. Through this, it was possible to describe threats that would occur in autonomous vehicles using blockchain technology and forensic techniques for each type of accident in a scenario-type manner. Through this study, a block that helps forensics of self-driving vehicles before and after accidents by investigating forensic security technology of domestic and foreign websites to respond to vulnerabilities and attacks of autonomous vehicles, and research on block chain security of research institutes and information security companies. A chain method was proposed.

Case Study of Building a Malicious Domain Detection Model Considering Human Habitual Characteristics: Focusing on LSTM-based Deep Learning Model (인간의 습관적 특성을 고려한 악성 도메인 탐지 모델 구축 사례: LSTM 기반 Deep Learning 모델 중심)

  • Jung Ju Won
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • This paper proposes a method for detecting malicious domains considering human habitual characteristics by building a Deep Learning model based on LSTM (Long Short-Term Memory). DGA (Domain Generation Algorithm) malicious domains exploit human habitual errors, resulting in severe security threats. The objective is to swiftly and accurately respond to changes in malicious domains and their evasion techniques through typosquatting to minimize security threats. The LSTM-based Deep Learning model automatically analyzes and categorizes generated domains as malicious or benign based on malware-specific features. As a result of evaluating the model's performance based on ROC curve and AUC accuracy, it demonstrated 99.21% superior detection accuracy. Not only can this model detect malicious domains in real-time, but it also holds potential applications across various cyber security domains. This paper proposes and explores a novel approach aimed at safeguarding users and fostering a secure cyber environment against cyber attacks.

The Effect of Job Anxiety of Replacement by Artificial Intelligence on Organizational Members' Job Satisfaction in the 4th Industrial Revolution Era: The Moderating Effect of Job Uncertainty (4차 산업 혁명 시대의 인공 지능의 직업 대체 불안감이 구성원들의 직무만족에 미치는 영향: 직무 불확실성의 조절효과)

  • Rhee, TaeSik;Jin, Xiu
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.1-9
    • /
    • 2021
  • The core competencies such as technology have been rapidly developing with advent of the fourth industrial revolution. One of the representative technologies in the era of the 4th Industrial Revolution is artificial intelligence(AI). In particular, AI makes human life richer and more comfortable and has many positive aspects. The negative aspect is that AI is likely to replace the organizational members' job and has the ability to replace skills associated with it. These threats may increase the level of perception that organizational members may loss their job. Moreover, it may lead to a sense of anxiety. In addition, organizational members who perceive job uncertainty highly, the job substitution anxiety may be become highly. According to this, their job satisfaction can be lower. Overall, this research emphasized the negative aspects of AI in contrast to the positive aspects of the fourth industrial era. It is also emphasized that the organization should need to recognize such problems and seek solutions to reduce workers' anxiety. Finally, practical implications and research directions of future study were presented through the research results.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Research on Data Tuning Methods to Improve the Anomaly Detection Performance of Industrial Control Systems (산업제어시스템의 이상 탐지 성능 개선을 위한 데이터 보정 방안 연구)

  • JUN, SANGSO;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.691-708
    • /
    • 2022
  • As the technology of machine learning and deep learning became common, it began to be applied to research on anomaly(abnormal) detection of industrial control systems. In Korea, the HAI dataset was developed and published to activate artificial intelligence research for abnormal detection of industrial control systems, and an AI contest for detecting industrial control system security threats is being conducted. Most of the anomaly detection studies have been to create a learning model with improved performance through the ensemble model method, which is applied either by modifying the existing deep learning algorithm or by applying it together with other algorithms. In this study, a study was conducted to improve the performance of anomaly detection with a post-processing method that detects abnormal data and corrects the labeling results, rather than the learning algorithm and data pre-processing process. Results It was confirmed that the results were improved by about 10% or more compared to the anomaly detection performance of the existing model.

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

Topic Modeling to Identify Cloud Security Trends using news Data Before and After the COVID-19 Pandemic (뉴스 데이터 토픽 모델링을 활용한 COVID-19 대유행 전후의 클라우드 보안 동향 파악)

  • Soun U Lee;Jaewoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.67-75
    • /
    • 2022
  • Due to the COVID-19 pandemic, many companies have introduced remote work. However, the introduction of remote work has increased attacks on companies to access sensitive information, and many companies have begun to use cloud services to respond to security threats. This study used LDA topic modeling techniques by collecting news data with the keyword 'cloud security' to analyze changes in domestic cloud security trends before and after the COVID-19 pandemic. Before the COVID-19 pandemic, interest in domestic cloud security was low, so representation or association could not be found in the extracted topics. However, it was analyzed that the introduction of cloud is necessary for high computing performance for AI, IoT, and blockchain, which are IT technologies that are currently being studied. On the other hand, looking at topics extracted after the COVID-19 pandemic, it was confirmed that interest in the cloud increased in Korea, and accordingly, interest in cloud security improved. Therefore, security measures should be established to prepare for the ever-increasing usage of cloud services.