• Title/Summary/Keyword: DEA기법

Search Result 195, Processing Time 0.027 seconds

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Development of intelligent fault diagnostic system for mechanical element of wind power generator (지능형 풍력발전 기계적 요소 고장진단 시스템 개발)

  • Moon, Dea-Sun;Kim, Sung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.1
    • /
    • pp.78-83
    • /
    • 2014
  • Recently, a rapid growth of wind power system as a leading renewable energy source has compelled a number of companies to develop intelligent monitoring and diagnostic system. Such systems can detect early mechanical faults, which prevents from costly repairs. Generally, fault diagnostic system for wind turbines is based on vibration and process signal analysis. In this work, different type of mechanical faults such as mass unbalance and shaft misalignment which can always happen in wind turbine system is considered. The proposed intelligent fault diagnostic algorithm utilizes artificial neural network and Wavelet transform. In order to verify the feasibility of the proposed algorithm, mechanical fault generation experimental system manufactured by Gaon corporation is utilized.

Control of HVDC-MMC Considering the Switching Device's Current Capacity and Circulating Current under Unbalanced Voltage Conditions (불평형 전압 조건에서 스위칭 소자의 전류 용량과 순환전류를 고려한 HVDC-MMC 제어기법)

  • Moon, Ji-Woo;Pae, Deuk-Woo;Park, Jung-Woo;Kang, Dea-Wook;Yoo, Dong-Wook;Kim, Jang-Mok
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.18 no.3
    • /
    • pp.270-278
    • /
    • 2013
  • This paper proposes a control method for high voltage direct current(HVDC) with modular multilevel converter (MMC) under unbalanced voltage conditions considering the submodule(SM)'s current capacity and circulating current. It is aimed to propose a control method in which the current peak value does not exceed the maximum value of HVDC-MMC by considering the current capacity of the SM under unbalance voltage conditions. And it analyzes the effect of the unbalanced voltage on circulating currents in MMC and then proposes a control method considering each component of circulating currents under unbalanced voltages. The effectiveness of the proposed controlling method is verified through simulation results using PSCAD/EMTDC.

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

Heterogeneous QoS Guaranteeing Mechanism in the Internet (인터넷에서의 이질적 QoS 보장 기법)

  • Kim, In-Kyoung;Lee, Jun-Hwa;Cha, Mi-Lee;Kim, Sang-Ha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.479-482
    • /
    • 2001
  • 인터넷에서 이질적인 QoS(Quality of Service)를 보장하기 위한 현재까지의 연구는 크게 망 차원에서의 자원 예약방법과 계층적 멀티캐스트를 이용한 적응 방법으로 구분된다. 첫번째 방법의 경우 RSVP(resource ReSerVation Protocol) 시그널링을 사용하므로 정량적인 QoS 보장은 가능하나 각 라우터에서 각 세션 플로우 상태 정보를 유지해야 하는 확장성 문제점이 있다. 두번째 방법의 경우 계층적 인코딩을 사용하여 응용 플로우를 여러 계층의 서브스트림으로 분리하고 각각을 멀티캐스트 채널을 통하여 전송한다. 그러나 이 메커니즘은 라우터가 각 계층간의 중요도를 인식할 수 없을 뿐만 아니라 멀티 캐스트 그룹 관리와 주소 할당 문제에 있어서 복잡성을 가진다. 본 논문에서는 제안된 메커니즘들의 문제점을 해결하고자 계층적 인코딩에 의해 생성된 스트림들간의 차별화를 통해 라우터에서 대역폭이 부족한 수신자에게는 기본적인 품질의 스트림만을 제공하는 반면에 대역폭이 충분한 수신자에게는 최상의 품질을 제공할 수 있는 이질적 QoS 방안을 제안한다.

  • PDF

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

A Method of Enhancing Security of Internet Banking Service using Contents-Based CAPTCHA (콘텐츠 기반 캡차를 이용한 인터넷 뱅킹 서비스의 보안성 향상 기법)

  • Lee, Sang-Ho;Kim, Sung-Ho;Kang, Jeon-Il;Byun, Je-Sung;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.571-583
    • /
    • 2013
  • Internet banking service has a advantage that is unrestricted by time. If automated programs are able to attack Internet banking services, a number of accounts can be attacked at the same time and as a result, damage will be considerably increased. To cope with such attacks, two methods, VPS and MS watermark, were introduced by Arcot and MS respectively. The methods use text-based CAPTCHAs in the process of transfer approval to distinguish automated programs from legal human users. In this paper, we point out the security threats of the methods when those are applied to Internet banking services. Especially, we consider the attack that are performed by extract specific string from text-based CAPTCHAs and it's countermeasure. Also we suggest a method of enhancing security of internet banking services. Our method is based on contents-based CAPTCHAs that are consist of known transfer information between user and server.

Real-time Fault Detection and Classification of Reactive Ion Etching Using Neural Networks (Neural Networks을 이용한 Reactive Ion Etching 공정의 실시간 오류 검출에 관한 연구)

  • Ryu Kyung-Han;Lee Song-Jae;Soh Dea-Wha;Hong Sang-Jeen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1588-1593
    • /
    • 2005
  • In coagulant control of water treatment plants, rule extraction, one of datamining categories, was performed for coagulant control of a water treatment plant. Clustering methods were applied to extract control rules from data. These control rules can be used for fully automation of water treatment plants instead of operator's knowledge for plant control. To perform fuzzy clustering, there are some coefficients to be determined and these kinds of studies have been performed over decades such as clustering indices. In this study, statistical indices were taken to calculate the number of clusters. Simultaneously, seed points were found out based on hierarchical clustering. These statistical approaches give information about features of clusters, so it can reduce computing cost and increase accuracy of clustering. The proposed algorithm can play an important role in datamining and knowledge discovery.

A Study on Determination of Weight Coefficients of Coordinated Multi-reservoir Operating Model Using an Artificial Neural Network Model (인공 신경망 기법을 활용한 댐 군 최적 연계 운영모형 (CoMOM)의 가중치 선정에 관한 연구)

  • Kim, Jae-Hee;Kim, Sheung-Kown;Lee, Jae-Sung;Ko, Ick-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.400-404
    • /
    • 2008
  • 댐 군 연계운영을 위한 기존의 많은 최적화 모형은 경제성에 기반을 둔 단일 목적 함수를 가정함으로써 현실과는 동떨어진 결과를 도출하곤 하였다. 따라서 보다 현실적인 최적화 모형이 되기 위해서는 실제 운영과정을 모사할 수 있도록 적절한 초기 가중치를 부여하여 모형을 구축하고, 상충되는 목적간의 절충안으로 파레토 프런티어(Pareto-frontier)를 제시할 수 있는 다중목적 의사결정 기법이 요구된다. 본 연구의 목적은 댐 군 연계 운영을 위한 최적화 모형으로 소개된 CoMOM(Coordinated Multi-reservoir Operating Model)의 다중목적함수에 적합한 초기 가중치를 도출할 수 있는 시스템을 제안하는 것이다. 본 연구에서는 최적화 모형에 적합한 가중치를 결정함에 있어 댐의 초기저수량과 미래의 예상 유입량과 같은 수문 조건을 감안할 필요가 있음에 주목하였다. 이것은 초기저수량과 미래에 예상되는 유입량이 작을 경우 가급적 저수에 중점을 두고, 그 반대일 경우는 발전방류에 주안점을 두는 것이 바람직하다는 사실에서 추정해 볼 수 있는 가정이다. 따라서 댐의 초기 저수량 조건과 유입량 시나리오의 다양한 수문 조건별로 가장 적합한 가중치를 찾아본 후, 수문 조건을 입력요소로, 최적 가중치를 출력요소로 갖는 신경망 모형을 활용해서 수문 조건에 적합한 가중치를 예측할 수 있는 절차를 제안한다. 이 과정에서 최적 가중치를 도출하는 것이 관건이 될 수 있는데, 이를 위해 전승목 (2008)등이 제안한 DEA기반 순위결정 절차를 활용해서 최선의 파레토 최적해와 이에 대응되는 가중치를 찾아 이를 신경망 모형의 출력요소 값으로 활용하였다. 본 연구에서 제안하는 신경망 모형은 임의의 수문 상황에 대해 이에 적합한 CoMOM의 초기 가중치를 결정해 줌으로써 CoMOM과 같은 최적화 모형의 가중치 선정에 따르는 어려움을 극복하는 데 도움이 될 수 있을 것으로 기대된다.

  • PDF

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.