• Title/Summary/Keyword: Information Protect Model

Search Result 313, Processing Time 0.022 seconds

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

Federated learning-based client training acceleration method for personalized digital twins (개인화 디지털 트윈을 위한 연합학습 기반 클라이언트 훈련 가속 방식)

  • YoungHwan Jeong;Won-gi Choi;Hyoseon Kye;JeeHyeong Kim;Min-hwan Song;Sang-shin Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.23-37
    • /
    • 2024
  • Digital twin is an M&S (Modeling and Simulation) technology designed to solve or optimize problems in the real world by replicating physical objects in the real world as virtual objects in the digital world and predicting phenomena that may occur in the future through simulation. Digital twins have been elaborately designed and utilized based on data collected to achieve specific purposes in large-scale environments such as cities and industrial facilities. In order to apply this digital twin technology to real life and expand it into user-customized service technology, practical but sensitive issues such as personal information protection and personalization of simulations must be resolved. To solve this problem, this paper proposes a federated learning-based accelerated client training method (FACTS) for personalized digital twins. The basic approach is to use a cluster-driven federated learning training procedure to protect personal information while simultaneously selecting a training model similar to the user and training it adaptively. As a result of experiments under various statistically heterogeneous conditions, FACTS was found to be superior to the existing FL method in terms of training speed and resource efficiency.

A Study on Design and Implementation of Driver's Blind Spot Assist System Using CNN Technique (CNN 기법을 활용한 운전자 시선 사각지대 보조 시스템 설계 및 구현 연구)

  • Lim, Seung-Cheol;Go, Jae-Seung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.149-155
    • /
    • 2020
  • The Korea Highway Traffic Authority provides statistics that analyze the causes of traffic accidents that occurred since 2015 using the Traffic Accident Analysis System (TAAS). it was reported Through TAAS that the driver's forward carelessness was the main cause of traffic accidents in 2018. As statistics on the cause of traffic accidents, 51.2 percent used mobile phones and watched DMB while driving, 14 percent did not secure safe distance, and 3.6 percent violated their duty to protect pedestrians, representing a total of 68.8 percent. In this paper, we propose a system that has improved the advanced driver assistance system ADAS (Advanced Driver Assistance Systems) by utilizing CNN (Convolutional Neural Network) among the algorithms of Deep Learning. The proposed system learns a model that classifies the movement of the driver's face and eyes using Conv2D techniques which are mainly used for Image processing, while recognizing and detecting objects around the vehicle with cameras attached to the front of the vehicle to recognize the driving environment. Then, using the learned visual steering model and driving environment data, the hazard is classified and detected in three stages, depending on the driver's view and driving environment to assist the driver with the forward and blind spots.

An Effective of Rate Control for Scene Change in H.264/AVC (장면전환에 효율적인 H.264/AVC 비트율 제어 기법)

  • Son, Nam-Rye;Shin, Yoon-Jeong;Lee, Guee-Sang
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.1
    • /
    • pp.26-39
    • /
    • 2007
  • In recent years, rate control is an important technique in real time video communication applications using H.264/AVC. Many existing rate control algorithms employ the quadratic rate-distortion model, which is determine the target bits for each P frame. In this paper, a new rate control algorithm for transmission of H.264/AVC video bit stream through CBR(Constant Bit Rate) channel is proposed. The proposed algorithm predicts an adaptive QP(Quantization Parameter) for improving video distortion, due to high motion and abruptly scene change, which target bit rate and MAD(Mean of Absolute Difference) for current frame considering image complexity variance between previous and current frames. Additionally, it uses frame skip technique to maintain bit stream within a manageable range and protect buffer from overflow or underflow. Experimental results show that the proposed method gives a quality improvement of about 0.5dB when compared to previous rate control algorithm. Also our proposed algorithm encodes the video sequences with less frame skipping compared to the existing rate control for H.264/AVC.

An Empirical Study on Evaluation of Performance Shaping Factors on AHP (AHP 기법을 이용한 수행영향인자 평가에 관한 연구)

  • Jung, Kyung-Hee;Byun, Seong-Nam;Kim, Jung-Ho;Heo, Eun-Mee;Park, Hong-Joon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.99-108
    • /
    • 2011
  • Almost all companies have paid much attention to the safety management ranging from maintenance to operation even at the stage of designing in order to prevent accidents, but fatal accidents continue to increase throughout the world. In particular, it is essential to systematically prevent such fatal accidents as fire, explosion or leakage of toxic gas at factories in order to not only protect the workers and neighbors but also prevent economic losses and environmental pollution. Though it is well known that accident probability is very low in NPP(Nuclear Power Plants), the reason why many researches are still being performed about the accidents is the results may be so severe. HRA is the main process to make preparation for possibility of human error in designing of the NPP. But those techniques have some problems and limitation as follows; the evaluation sensitivity of those techniques are out of date. And the evaluation of human error is not coupled with the design process. Additionally, the scope of the human error which has to be included in reliability assessment should be expanded. This work focuses on the coincidence of human error and mechanical failure for some important performance shaping factors to propose a method for improving safety effectively of the process industries. In order to apply in these purposes into the thesis, I found 63 critical Performance Shaping Factors of the eight dimensions throughout studies that I executed earlier. In this study, various analysis of opinion of specialists(Personal Factors, Training, Knowledge or Experience, Procedures and Documentation, Information, Communications, HMI, Workplace Design, Quality of Environment, Team Factors) and the guideline for construction of PSF were accomplished. The selected method was AHP which simplifies objective conclusions by maintaining consistency. This research focused on the implementation process of PSF to evaluate the process of PSF at each phase. As a result, we propose an evaluation model of PSF as a tool to find critical problem at each phase and improve on how to resolve the problems found at each phase. This evaluation model makes it possible to extraction of PSF succesfully by presenting the basis of assessment which will be used by enterprises to minimize the trial and error of construction process of PSF.

Field Validation of PBcast in Timing Fungicide Sprays to Control Phytophthora Blight of Chili Pepper (고추 역병 방제시기 결정을 위한 PBcast 예측모델 타당성 포장 평가)

  • Ahn, Mun-Il;Do, Ki Seok;Lee, Kyeong Hee;Yun, Sung Chul;Park, Eun Woo
    • Research in Plant Disease
    • /
    • v.26 no.4
    • /
    • pp.229-238
    • /
    • 2020
  • Field validation of PBcast, an infection risk model for Phytophthora blight of pepper, was conducted through a designed field experiment in 2012 and 2013. Conduciveness of weather conditions at 26 locations in Korea in 2014-2017 was also evaluated using PBcast. The PBcast estimated daily infection risk (IR) of Phytophthora capsici based on weather and soil texture data. In the designed filed experiment, four treatments including routine sprays at 7-day intervals (RTN7), forecast-based sprays when IR reached 200 (IR200) and 224 (IR224), and no spray (CTRL) were compared in terms of disease incidence and number of sprays recommended for disease control. In 2012, IR had reached over 200 twice, but never reached 224. In 2013, IR had reached over 200 three times and once higher than 224. The RTN7 plots were sprayed 17 and 18 times in 2012 and 2013, respectively. Weather conditions throughout the country were generally conducive for Phytophthora blight and 3-4 times of fungicide sprays would have been reduced if the PBcast forecast information was adopted in the decision-making for fungicide sprays. In conclusion, the PBcast forecast would be useful to reduce fungicide applications without losing the disease control efficacy to protect pepper crop from Phytophthora blight.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.

A Design of Fire-Command Synchronous Satellite Pyrotechnic Circuit (점화 명령에 동조된 인공위성 파이로테크닉 회로 설계)

  • Koo, Ja Chun;Ra, Sung Woong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.5
    • /
    • pp.81-92
    • /
    • 2013
  • The satellite includes many release mechanisms such as solar array deployment, antenna deployment, cover to protect contamination in scientific equipment, pyro value of the propulsion subsytem, and bypass device in Li-Ion cell module. A drive the initiators is a critical to the successful mission because the initiators of release mechanism driving by the pyrotechnic circuit is operated in single short. The pyrotechnic circuit has to provide switching network for safety. A typical switching network has defect consisting of high current rating fire switch to handle switching transient current during fire the initiator. The pyrotechnic circuit is required some form of power conditioning to reduce the peak power demanded from the bus if the initiators are to be fired from the main bus. This paper design a pyrotechnic circuit synchronized to the fire-command to activate the fire switch to overcome use high current rating fire switch to handle switching transient current during fire the initiator. The pyrotechnic circuit provides a current limited widow pulse for fire current synchronized to the fire-command to insure that fire switch will only carry the current but never switch it. The current limited widow pulse for fire current can be possible to use low current rating and light mass switch in switching network. The current limit function in the pyrotechnic circuit reduces supply voltage to initiator and provides the effect of power conditioning function to reduce peak bus power. The pyrotechnic circuit to apply satellite development on geostationary orbit is verified the function by test in development model.

The Effect of Smart Safety and Health Activities on Workers' Intended Behavior (스마트 안전보건활동이 근로자의 의도된 행동에 미치는 영향)

  • Choonhwan Cho
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.519-531
    • /
    • 2023
  • With the aim of preventing safety accidents at construction sites, the company aims to create safe behaviors intended through variables called smart safety and health activities to help reduce industrial accidents. Purpose: It analyzes how smart safety and health activities affect accidents caused by unsafe behavior and changes in worker behavior, which is the root cause, and verifies the hypothesis that it helps prevent safety accidents and protect workers' lives. Method: Smart safety and health activities were selected as independent variables (X), and intended safety and anxiety, which are workers' behavioral intentions, were set as dependent variables (Y), attitude and subjective norms, and planned behavioral control as parameters (M). Exploratory factor analysis, discriminant validity analysis, and intensive validity analysis of safety and health activities were used to analyze the scale's reliability and validity. To verify the hypothesis of behavior change, the study was verified through Bayesian model analysis and MC simulation's probability density distribution. Result: It was found that workers who experienced smart safety and health activities at construction sites had the highest analysis of reducing unstable behavior and performing intended safety behavior. The research hypothesis that this will affect changes in worker behavior has been proven, the correlation between variables has been verified in the structural equation and path analysis of the research analysis, and it has been confirmed that smart safety and health activities can control and reduce worker instability. Conclusion: Smart safety and health activities are a very important item to prevent accidents and change workers' behavior at construction sites.

Study on the Appropriate Use of Weapons by Private Security Guards: Focusing on Public Crowded Places (민간 경비원(보안요원)의 정당한 무기사용 방안 연구: 다중이용시설을 중심으로)

  • Hangil Oh;Kyewon Ahn;Ye ji Na
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.936-949
    • /
    • 2023
  • On August 3, 2023, a brutal incident of unprovoked violence, termed as "Abnormal motivated crime," occurred in a multi-use facility, where retail and transportation facilities converge, near Seohyeon Station. The assailant drove onto the sidewalk, hitting pedestrians, and then entered a department store where a knife rampage ensued, resulting in a total of 14 victims. In the aftermath of this incident, numerous murder threats were posted on social media, causing widespread anxiety among the public. This fear was further exacerbated by the emergence of a "Terrorless.01ab.net" service. Purpose: This research aims to explore necessary institutional improvements for private security personnel who protect customers and employees in multi-use facilities, to enable them to perform their duties more effectively. Method: To assess the risk of Abnormal motivated crime, a time series analysis using the ARIMA model was conducted to analyze the domestic trends of such crimes. Additionally, Result: the study presents suggestions for improvements in the domestic security service law and emergency manuals for multi-use facilities. Conclusion: This is informed by a legal analysis of the indemnity rights for weapon use by private security guards abroad and their operational authority beyond weapon usage.