• Title/Summary/Keyword: Cyber intelligence

Search Result 247, Processing Time 0.026 seconds

A Case Study on the Effect of the Artificial Intelligence Storytelling(AI+ST) Learning Method (인공지능 스토리텔링(AI+ST) 학습 효과에 관한 사례연구)

  • Yeo, Hyeon Deok;Kang, Hye-Kyung
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.5
    • /
    • pp.495-509
    • /
    • 2020
  • This study is a theoretical research to explore ways to effectively learn AI in the age of intelligent information driven by artificial intelligence (hereinafter referred to as AI). The emphasis is on presenting a teaching method to make AI education accessible not only to students majoring in mathematics, statistics, or computer science, but also to other majors such as humanities and social sciences and the general public. Given the need for 'Explainable AI(XAI: eXplainable AI)' and 'the importance of storytelling for a sensible and intelligent machine(AI)' by Patrick Winston at the MIT AI Institute [33], we can find the significance of research on AI storytelling learning model. To this end, we discuss the possibility through a pilot study targeting general students of an university in Daegu. First, we introduce the AI storytelling(AI+ST) learning method[30], and review the educational goals, the system of contents, the learning methodology and the use of new AI tools in the method. Then, the results of the learners are compared and analyzed, focusing on research questions: 1) Can the AI+ST learning method complement algorithm-driven or developer-centered learning methods? 2) Whether the AI+ST learning method is effective for students and thus help them to develop their AI comprehension, interest and application skills.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Intrusion Detection Method Using Unsupervised Learning-Based Embedding and Autoencoder (비지도 학습 기반의 임베딩과 오토인코더를 사용한 침입 탐지 방법)

  • Junwoo Lee;Kangseok Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.8
    • /
    • pp.355-364
    • /
    • 2023
  • As advanced cyber threats continue to increase in recent years, it is difficult to detect new types of cyber attacks with existing pattern or signature-based intrusion detection method. Therefore, research on anomaly detection methods using data learning-based artificial intelligence technology is increasing. In addition, supervised learning-based anomaly detection methods are difficult to use in real environments because they require sufficient labeled data for learning. Research on an unsupervised learning-based method that learns from normal data and detects an anomaly by finding a pattern in the data itself has been actively conducted. Therefore, this study aims to extract a latent vector that preserves useful sequence information from sequence log data and develop an anomaly detection learning model using the extracted latent vector. Word2Vec was used to create a dense vector representation corresponding to the characteristics of each sequence, and an unsupervised autoencoder was developed to extract latent vectors from sequence data expressed as dense vectors. The developed autoencoder model is a recurrent neural network GRU (Gated Recurrent Unit) based denoising autoencoder suitable for sequence data, a one-dimensional convolutional neural network-based autoencoder to solve the limited short-term memory problem that GRU can have, and an autoencoder combining GRU and one-dimensional convolution was used. The data used in the experiment is time-series-based NGIDS (Next Generation IDS Dataset) data, and as a result of the experiment, an autoencoder that combines GRU and one-dimensional convolution is better than a model using a GRU-based autoencoder or a one-dimensional convolution-based autoencoder. It was efficient in terms of learning time for extracting useful latent patterns from training data, and showed stable performance with smaller fluctuations in anomaly detection performance.

Fraud Detection System Model Using Generative Adversarial Networks and Deep Learning (생성적 적대 신경망과 딥러닝을 활용한 이상거래탐지 시스템 모형)

  • Ye Won Kim;Ye Lim Yu;Hong Yong Choi
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.59-72
    • /
    • 2020
  • Artificial Intelligence is establishing itself as a familiar tool from an intractable concept. In this trend, financial sector is also looking to improve the problem of existing system which includes Fraud Detection System (FDS). It is being difficult to detect sophisticated cyber financial fraud using original rule-based FDS. This is because diversification of payment environment and increasing number of electronic financial transactions has been emerged. In order to overcome present FDS, this paper suggests 3 types of artificial intelligence models, Generative Adversarial Network (GAN), Deep Neural Network (DNN), and Convolutional Neural Network (CNN). GAN proves how data imbalance problem can be developed while DNN and CNN show how abnormal financial trading patterns can be precisely detected. In conclusion, among the experiments on this paper, WGAN has the highest improvement effects on data imbalance problem. DNN model reflects more effects on fraud classification comparatively.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

The Suggestion for Successful Factory Converging Automation by Reviewing Smart Factories in German (스마트 팩토리 사례를 통한 성공적 공장 융합 자동화 방안 도출)

  • Jeong, Tae-Seog
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.189-196
    • /
    • 2016
  • The ultimate goal of this study is to investigate the cases with respect to smart factory that has been introduced by German government. To do this, the study suggest implications for manufacturing version 3.0 that is one of manufacturing revolution agendas in Korea. The main point of smart factory is the convergence between manufacturing and information and communications technologies such as CPS(Cyber-Physical Systems), MES(Manufacturing Execution Systems), 3D Printer, AI(Artificial Intelligence), and so forth. It is hard to accomplish a complete manufacturing automation. In fact, German government had experienced the failure in pursuing the smart factory agenda. But now the agenda is gradually realized by a variety of success stories from German. Thus, this study is to investigate the well-known success stories that came from German.

Methodology for Automate Negotiation for Order Transaction of Injection Mold Manufacturer (사출금형제조업체의 주문처리를 위한 자동협상방법론)

  • 박영재;최형림
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.47-63
    • /
    • 2004
  • Today, there are several markets in cyber space where companies trade electronically due to the development of Information Technology. On the other hand, the most important thing in trades is negotiation. So, in order to support current business practices as well as new ones on the Internet, electronic commerce systems need an ability to negotiate. In this paper, proposed is a method by which a seller can be supported by an agent which plays a role in negotiation process among small and medium companies especially injection mold manufacturer. If the manufacturing capacity cannot afford to produce all orders, the manufacturer may want to extend due dates and the buyers may want to discount prices. The negotiation agent discussed in this paper cooperates with the schedule agent to get due-date information, and performs a role in one (seller)-to-many (buyer) negotiation processes.

  • PDF

Wind Castle: The Natural Intelligence Control of Hallasan-Oreum-Batdam I (윈드캐슬: 한라산-오름-밭담의 자연지능 제어 I)

  • Lee, Moon-Ho;Kim, Jeong-Su
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.105-111
    • /
    • 2020
  • We defined Jeju Wind Castle and analyzed the relationship between Hallasan-Oreum-Batdam, the main subject, for the first time. In Jeju, 1.5m high Batdam(Black Silk Road), 368 Oreums, Hallasan Mountain 1950m are all unique scenery. The verification of this paper demonstrates that Samdasoo's groundwater extraction sea level is equal to the height of Hallasan and that this problem is mathematically complete in neutral plane theory. Donnaeko(700meters above sea level)-Baeknokdamdongneung-Jindallebat-Seongpanak-Gyorae(453 meters)-Witsaeoreum(1700meters) is a rain belt that hits the low-air pressure air-conditioned North Pacific humidity rising from the southeast and the high-pressure cold air of Hallasan Peak. It rains a lot because - and + are neutral plane, which adds to zero. Hallasan is called Jinsan in Jeju history. The answer is Wind Castle. The number of Oreum in Jeju is 369 including Hallasan, and Batdam, which is about 1.5m high, does not collapse even with a typhoon blowing over 50m/s. Because the wind castle's core is 1.5 meters of Batdam and it is a triangular number.

Analysis on the Current Status of the Fourth Industrial Revolution-Oriented Curriculum of the Computer and Software-Related Majors Based on the Standard Classification (표준분류에 기준한 컴퓨터 및 소프트웨어 관련 전공의 제4차 산업혁명중심 교육과정 운영 현황 분석)

  • Choi, Jin-Il;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.587-592
    • /
    • 2020
  • This paper analyzed the curriculum of computer and software-related majors educating the core IT-related skills needed for the 4th Industrial Revolution. The analysis was conducted on 158 majors classified as applied software, computer science and computer engineering according to the standard classification of university education units by the Standard Classification Committee of the Korean Council of University Education. The current status of introduction of curricular divided into the fields of Internet of Things(IoT) & mobile, cloud & big data, artificial intelligence(AI), and information security was analyzed among the contents of education in the relevant departments. According to the analysis, an average of 81.6% of the majors for each group of curricular organized related subjects into the curriculum. The Curriculum Response Index for the 4th industrial revolution(CRI4th) by major, calculated by weighting track operations by education sector, averaged 27.5 point out of 100 point. And the IoT & mobile sector had the highest score of 42.3 points.

Big Data Governance Model for Effective Operation in Cyberspace (효과적인 사이버공간 작전수행을 위한 빅데이터 거버넌스 모델)

  • Jang, Won-gu;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • With the advent of the fourth industrial revolution characterized by hyperconnectivity and superintelligence and the emerging cyber physical systems, enormous volumes of data are being generated in the cyberspace every day ranging from the records about human life and activities to the communication records of computers, information and communication devices, and the Internet of things. Big data represented by 3Vs (volume, velocity, and variety) are actively used in the defence field as well. This paper proposes a big data governance model to support effective military operations in the cyberspace. Cyberspace operation missions and big data types that can be collected in the cyberspace are classified and integrated with big data governance issues to build a big data governance framework model. Then the effectiveness of the constructed model is verified through examples. The result of this study will be able to assist big data utilization planning in the defence sector.

  • PDF