• Title/Summary/Keyword: CyberSecurity

Search Result 1,611, Processing Time 0.033 seconds

BlockChain Technology Core Principle Education of Elementary School Student Using Gamification (게이미피케이션을 활용한 초등학생 블록체인기술 핵심원리 교육 탐구)

  • Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.2
    • /
    • pp.141-148
    • /
    • 2019
  • We proposed a curriculum that can learn the principle of blockchain by using the gamification which can bring up the interest and concentration of the students by connecting the contents of the class with the game. The proposed method is to educate the blockchain in a game format and to solve the problem that can be easily accessed in everyday life by applying the blockchain. By strengthening the thinking ability of computing, By growing information processing capacity, communication capacity, and community capacity, students can naturally enhance their education capacity. It is expected that the blockchain curriculum using the proposed gamification can be used to improve the information curriculum.

A Study on Maritime Communication LINKS for Emergency Disaster (비상 재난에 대비한 해양 연계통신 연구)

  • Yoo, Jae-won;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.375-378
    • /
    • 2014
  • Marine disaster, such as 'the sinking of the Sewol ferry', on the ocean needs emergency communication with land post and Rescue services. Especially, It needs of emergency comomunication system has increased in Korea peninsula with the sea on three side. The system will be more fully equipped to deal with disasters linked to communication so alone sailing ship is at sea. Research is needed on communication links to submarines operated by submarine to sink a ship, as well as immersion in the sea with. And it is necessary in the study of the land in preparation for the emergency disaster ship and submarine communication links for offshore and subsea oil and associated communication systems. Will be studied in preparation for the communication protocols and emergency and disaster location and land the plane or for a career in the satellite systems are linked through this. It is necessary for this purpose is research on the integrated emergency disaster communication ecosystem.

  • PDF

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

Detection The Behavior of Smartphone Users using Time-division Feature Fusion Convolutional Neural Network (시분할 특징 융합 합성곱 신경망을 이용한 스마트폰 사용자의 행동 검출)

  • Shin, Hyun-Jun;Kwak, Nae-Jung;Song, Teuk-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1224-1230
    • /
    • 2020
  • Since the spread of smart phones, interest in wearable devices has increased and diversified, and is closely related to the lives of users, and has been used as a method for providing personalized services. In this paper, we propose a method to detect the user's behavior by applying information from a 3-axis acceleration sensor and a 3-axis gyro sensor embedded in a smartphone to a convolutional neural network. Human behavior differs according to the size and range of motion, starting and ending time, including the duration of the signal data constituting the motion. Therefore, there is a performance problem for accuracy when applied to a convolutional neural network as it is. Therefore, we proposed a Time-Division Feature Fusion Convolutional Neural Network (TDFFCNN) that learns the characteristics of the sensor data segmented over time. The proposed method outperformed other classifiers such as SVM, IBk, convolutional neural network, and long-term memory circulatory neural network.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Design Study of a Brazed Plate Heat Exchanger Condenser Through Two-Phase Flow Analysis (이상유동 해석을 통한 브레이징 판형 응축기 설계 연구)

  • Hwang, Dae-jung;Oh, Cheol;Park, Sang-kyun;Jee, Jae-hoon;Bang, Eun-shin;Lee, Byeong-gil
    • New & Renewable Energy
    • /
    • v.18 no.2
    • /
    • pp.73-81
    • /
    • 2022
  • This study was aimed at designing a condenser, as a component of the organic Rankine cycle system for ships. The condenser was manufactured through press molding to achieve a bent shape to enhance the heat transfer performance, considering the shape of the heat transfer plate used in a brazing plate heat exchanger. The heat transfer plate was made of copper-nickel alloy. The required heat transfer rate for the condenser was 110 kW, and the maximum number of layers was set as 25, considering the characteristics of high-temperature brazing. Computational fluid dynamics techniques were used to perform the thermal fluid analysis, based on the ANSYS CFX (v.18.1) commercial program. The heat transfer rate of the condenser was 4.96 kW for one layer (width and length of 0.224 and 0.7 m, respectively) of the heat transfer exchanger. The fin efficiency pertaining to the heat transfer plate was approximately 20%. The heat flow analysis for one layer of the heat exchanger plate indicated that the condenser with 25 layers of heat transfer plates could achieve a heat transfer rate of 110 kW.

Study on Equivalent Consumption Minimization Strategy Application in PTI-PTO Mode of Diesel-Electric Hybrid Propulsion System for Ships

  • Lee, Dae-Hong;Kim, Jong-Su;Yoon, Kyoung-Kuk;Hur, Jae-Jung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.3
    • /
    • pp.451-458
    • /
    • 2022
  • In Korea, five major ports have been designated as sulfur oxide emission control areas to reduce air pollutant emissions, in accordance with Article 10 of the "Special Act on Port Air Quality" and Article 32 of the "Ship Pollution Prevention Regulations". As regulations against vessel-originated air pollutants (such as PM, CO2, NOx, and SOx) have been strengthened, the Ministry of Oceans and Fisheries(MOF) enacted rules that newly built public ships should adopt eco-friendly propulsion systems. However, particularly in diesel-electric hybrid propulsion systems,the demand for precise control schemes continues to grow as the fuel saving rate significantly varies depending on the control strategy applied. The conventional Power Take In-Power Take Off(PTI - PTO) mode control adopts a rule-based strategy, but this strategy is applied only in the low-load range and PTI mode; thus, an additional method is required to determine the optimal fuel consumption point. The proposed control method is designed to optimize fuel consumption by applying the equivalent consumption minimization strategy(ECMS) to the PTI - PTO mode by considering the characteristics of the specific fuel oil consumption(SFOC) of the engine in a diesel-electric hybrid propulsion system. To apply this method, a specific fishing vessel model operating on the Korean coast was selected to simulate the load operation environment of the ship. In this study, a 10.2% reduction was achieved in the MATLAB/SimDrive and SimElectric simulation by comparing the fuel consumption and CO2 emissions of the ship to which the conventional rule-based strategy was applied and that to which the ECMS was applied.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Study on Development of Korean Unmanned Systems through Analysis of U.S. Unmanned Systems Policy (미국의 무인체계 정책 분석을 통한 한국의 무인체계 발전에 관한 연구)

  • Park, Dongseon;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • This study presents a method to efficiently advance the Republic of Korea's Unmanned Systems through the analysis of the development of the U.S. Unmanned System Policy. After the occurrence of the September 11 attacks, the U.S. developed Unmanned Systems as a part of RMA and became the leader in this area. The system went through numerous trials and errors during the development and acquisition. From these experiences, the U.S. had embodied Unmanned Systems acquisition methods by establishing Unmanned Systems Development Guidance and DoD Autonomy Community of Interest in 2012. In addition, as diverse unmanned programs started to proceed, it promoted Core Technology development sharing and simplification of functions of the Unmanned Systems to exclude budget-wasting elements such as duplication of programs. The Republic of Korea must politically build a collaborative system between industry/academia/research institute/military and apply evolutionary development strategies from the first step of the development of the Unmanned Systems the future Game Changer. In operations, concepts of the Manned/Unmanned Systems complex operation should be established and intelligent S/W, Open System, and Cyber Security technologies to materialize them developed.