• Title/Summary/Keyword: Cyber intelligence

Search Result 239, Processing Time 0.027 seconds

Cyber threat intelligence analysis technology to prevent the diffusion of cyber attacks (사이버 공격 확산 방지 및 신속한 대응을 위한 사이버 위협 인텔리전스 분석 기술)

  • Kim, Byung-Ik;Lee, Seul-Gi;Kim, Kyeong-Han;Park, Soon-Tai
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.420-423
    • /
    • 2019
  • 최근 국내에서 발생되고 있는 사이버 공격들의 대부분은 기존 보안장비로 탐지가 어려운 지능형 공격으로 2017년 한 해 동안 발생한 사이버 공격의 경제적 피해액은 약 77조원에 달하고 있다. 또한 이러한 공격을 탐지하는데 평균 145일 정도가 소요되고 있으며 국내 기업 중 약 70% 가량은 사이버 공격을 적극적으로 대응하고 있지 않다. 이러한 공격들은 대부분 과거에 발생한 공격의 변형이거나, 특정 공격 집단이 수행하는 유사/변종 공격들이다. 이러한 사이버 공격을 사전에 탐지하거나 이미 발생된 공격의 변형된 공격을 신속하게 탐지하기 위해서 본 논문에서는 기존 사이버 공격에 사용된 다양한 정보들을 능동적으로 수집하여, 이들 간의 연관성을 분석하고, 실시간으로 유입되는 공격 의심정보와 비교분석하는 기술을 제시한다.

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej;Al omrani, Faten;Alzahrani, Taghreed;alFahhad, Rehab;Alotaibi, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.155-162
    • /
    • 2022
  • Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

The Influence of Learning Commitment and Interest by Repetitive Education Activities of Adult Learners on Satisfaction in Online Learning Using Flip Learning Pedagogy (플립러닝을 활용한 온라인 학습에서 중·장년층 학습자의 반복학습에 따른 학습몰입과 흥미가 학습만족도에 미치는 영향)

  • Kang, Tae-Gu;Lim, Gu-Won
    • Journal of Industrial Convergence
    • /
    • v.19 no.3
    • /
    • pp.27-34
    • /
    • 2021
  • In the era of the 4th industrial revolution, the age of artificial intelligence, the development of ICT technology is having various effects on the online and offline educational environment. The universal access of online education changes the educational paradigm and converts it to a learner-centered service. At the time when a new educational environment is required to change, interest in flip learning is increasing. Even adult learner's online learning needs is also shown very high. The purpose of this study was to investigate how repetitive learning activities through flip learning for middle-aged online learners of K-Cyber University has a relationship and structural relationship between the effects of learning immersion and learning interest on learning satisfaction. Through this study, there is significance in research to suggest direction for learning satisfaction based on flip learning. For further studies, if a model of analysis of various factors that can be measured is specified and applied, it can be used as a research background that can maximize learning satisfaction based on flip learning.

A Study on the Role of Local Governments in the Era of Generative Artificial Intelligence: Based on Case Studies in Gyeonggi-do Province, Seoul City, and New York City (생성형 인공지능 시대 지방정부의 역할에 대한 연구: 경기도, 서울시, 뉴욕시 사례연구를 바탕으로)

  • S. J. Lee;J. B. Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.809-818
    • /
    • 2024
  • This paper proposes an action plan for local governments to safely utilize artificial intelligence technology in various local government policies. The proposed method analyzes cases of application of artificial intelligence-related laws and policies in Gyeonggi Province, Seoul City, and New York City, and then presents matters that local governments should consider when utilizing AI technology in their policies. This paper applies the AILocalism-Korea analysis methodology, which is a modified version of the AILocalsm analysis methodology[1] presented by TheGovLab at New York University. AILocalism-Korea is an analysis methodology created to analyze the current activities of each local government in the fields of legal system, public procurement, mutual cooperation, and citizen participation, and to suggest practical alternatives in each area. In this paper, we use this analysis methodology to present 9 action plans that local governments should take based on safe and reliable use of artificial intelligence. By utilizing various AI technologies through the proposed plan in local government policies, it will be possible to realize reliable public services.

A Study on the Digital Convergence Paradigm and Participation in Digital Contents Services (디지털컨버전스 패러다임과 디지털콘텐츠 서비스 참여에 관한 연구)

  • Kim, Yeon-Jeong
    • Journal of Families and Better Life
    • /
    • v.27 no.6
    • /
    • pp.243-253
    • /
    • 2009
  • This study identifies the concept of a digital convergence paradigm, which deals with the relationship among convergence and consumer participation, digital contents services, and the culture of consumption (web 2.0). This research was conducted using a quantitative method involving focus group interviews (FGI) and literature reviews. This research examines the relationship between convergence and consumer participation and the adoption of a concept of "convergence culture", which is categorized as "collective intelligence" and "intellectual community participation". The role of the consumer has changed from one of a "consuming consumer" to that of a "collaborating consumer" and finally to the concept of a consumers as the originator of a new consumption culture. In the study, the consumption culture of web participants indicated the characteristics of funology, self-expression, life-catching, quick-tempered, immersion(arousal), sharing culture, multitasking, and cyber justice. The recognition level of networking on the "digital convergence" of the consumer was identified as that of the combination of IT(information technology); product and multi-services or alliance of industry groups(telecom, broadband, IPTV service); or the use of one source with multiple devices.

Admission Consultation System based on Intelligent Multi-Agent System (지능형 멀티 에이전트 시스템 기반의 진학 상담 시스템)

  • Choi Dong-Oun;Kim Soo-Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.43-55
    • /
    • 2006
  • Cyber education fields have been changed a lot with the internee development. One of them is the field of consultation for university admission. As for the business of university admission, there were two ways applicants handed in their applications directly to school which they applied to and to each place to receive applications or sent them through FAX. Recently, highlighted is the internee environment to receive the application for admission which integrated organically the two ways. This paper aims to design and implement a multi-consulting-agent system having intelligence which helps applicants make their right applications for colleges or universities through internet system after guiding a proper department to them.

  • PDF

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2020
  • In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.