• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.023 seconds

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

A Research on Designing an Autonomic Control System Towards High-Reliable Cyber-Physical Systems (고신뢰 CPS를 위한 자율제어 시스템에 관한 연구)

  • Park, Jeongmin;Kang, Sungjoo;Chun, Ingeol;Kim, Wontae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.347-357
    • /
    • 2013
  • Cyber-Physical system(CPS) is characterized by collaborating computational elements controlling physical entities. In CPS, human desire to acquire useful information and control devices anytime and anywhere automatically has increased the necessity of a high reliable system. However, the physical world where CPS is deployed has management complexity and maintenance cost of 'CPS', so that it is impossible to make reliable systems. Thus, this paper presents an 'Autonomic Control System towards High-reliable Cyber-Physical Systems' that comprise 8-steps including 'fault analysis', 'fault event analysis', 'fault modeling', 'fault state interpretation', 'fault strategy decision', 'fault detection', 'diagnosis&reasoning' and 'maneuver execution'. Through these activities, we fascinate to design and implement 'Autonomic control system' than before. As a proof of the approach, we used a ISR(Intelligent Service Robot) for case study. The experimental results show that it achieves to detect a fault event for autonomic control of 'CPS'.

A Study on the Formations and Compositions of the Cyber Museum -Focusing on the case of oversea natural history museum- (사이버 뮤지엄의 형식과 구성에 관한 고찰 -자연사 박물관 분야에 대한 해외사례를 중심으로-)

  • 임경부;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 1999.04a
    • /
    • pp.7-10
    • /
    • 1999
  • The organization of modern society is suddenly changing from the modern society to the ultra modern informationalized society. Various social members must satisfy cultural and artistic desires to serve museum concept and function to move the informationalized society. A lot of natural history museum in the world build cyber space exhibition lines. Audiences do not directly visit but they view but they view the exhibit, get an education, participate in the cultrue programs and earn the museum's informations. Especially, in the case of national and public museums in Korea, they do not concerned the museum architecture before processing the character and collections of the museum. Cyber museums determine museum character, policy, information, collections converge of opinion voluntary collection and grasp of location, because cyber museum can be finished be4fore the work of the future museum.

  • PDF

A Usability Evaluation of VR Go-Game using CyberGlove (CyberGlove를 이용한 VR 바둑 게임의 사용성 평가)

  • Lee, Jae-Jin;Kim, Jeong-Sik;Choi, Soo-Mi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.819-822
    • /
    • 2004
  • 본 논문에서는 가상환경에서의 바둑 게임을 위하여 CyberGlove와 트랙킹 장비를 이용한 사용자 인터페이스를 구축하고 이의 사용성을 평가하였다. 먼저 바둑 게임을 위한 3차원 객체들을 생성한 후, WorldTookit을 이용하여 가상환경을 구축하였다. 그리고 트래킹 리시버가 부착된 CyberGlove를 끼고 바둑함으로부터 "바둑알 집기"와 바둑판 위의 화점에 "바둑알 두기"를 통해 가상환경에 익숙치 않은 사용자들을 대상으로 인터페이스의 사용성을 평가하였다. 실험 결과 현실 세계와 같이 손과 손가락을 움직여 바둑을 두는데 매우 흥미로와 했고, 사용자의 2가지 뷰에 따라 실험한 결과 직교 top 뷰에서의 정확도가 대각 원근 뷰 보다 높게 나타났다. 또한 주변 화점에 바둑알을 둘때의 정확도가 현저히 저하됨을 알 수 있었다. 장기간 사용시 불편함 호소 등 해결해야할 문제가 있음에도 불구하고 가상현실 인터페이스는 보다 몰입적이고 현실감 있는 게임을 위해 필요한 요소임을 확인할 수 있었다.

  • PDF

Applying Model to Real World through Robot Reinforcement Learning in Unity3D (Unity3D 가상 환경에서 강화학습으로 만들어진 모델의 효율적인 실세계 적용)

  • Lim, En-A;Kim, Na-Young;Lee, Jong-lark;Weon, Ill-yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.800-803
    • /
    • 2020
  • 실 환경 로봇에 강화학습을 적용하기 위해서는 가상 환경 시뮬레이션이 필요하다. 그러나 가상 환경을 구축하는 플랫폼은 모두 다르고, 학습 알고리즘의 구현에 따른 성능 편차가 크다는 문제점이 있다. 또한 학습을 적용하고자 하는 대상이 실세계의 하드웨어 사양이 낮은 스마트 로봇인 경우, 계산량이 많은 학습 알고리즘을 적용하기는 쉽지 않다. 본 연구는 해당 문제를 해결하기 위해 Unity3D에서 제공하는 강화학습 프레임인 ML-Agents 모듈을 사용하여 실 환경의 저사양 스마트 로봇에 장애물을 회피하고 탐색하는 모델의 강화학습을 적용해본다. 본 연구의 유의점은 가상 환경과 실 환경의 유사함과 일정량의 노이즈 발생 처리이다. 로봇의 간단한 행동은 원만하게 학습 및 적용가능함을 확인할 수 있었다.

The Study of Criminal Lingo Analysis on Cyberspace and Management Used in Artificial Intelligence and Block-chain Technology

  • Yoon, Cheolhee;Lee, Bong Gyou
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.54-60
    • /
    • 2020
  • Online cybercrime has various causes. The criminal guilty language, Criminal lingo is active in the shaded area with the bilateral aspect of the word on cyber. It has been continuously producing massive risk factors in cyberspace. Criminals are shared and disseminated online. It has been linked with fake news and aids to suicide that has recently become an issue. Thus the criminal lingo has become a real danger factor on cyber interface. Recently, Criminal lingo is shared and distributed as cyber hazard information. It is transformed that damaging to the youth and ordinary people through the internet and social networks. In order to take action, it is necessary to construct an expert system based on AI to implement a smart management architecture with block-chain technology. In this paper, we study technically a new smart management architecture which uses artificial intelligence based decision algorithm and block-chain tracking technology to prevent the spread of criminal lingo factors in the evolving cyber world. In addition, through the off-line regular patrol program of police units, we proposed the conversion of online regular patrol program for "cyber harem area".

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF