• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.026 seconds

An Automatically Extracting Formal Information from Unstructured Security Intelligence Report (비정형 Security Intelligence Report의 정형 정보 자동 추출)

  • Hur, Yuna;Lee, Chanhee;Kim, Gyeongmin;Jo, Jaechoon;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.233-240
    • /
    • 2019
  • In order to predict and respond to cyber attacks, a number of security companies quickly identify the methods, types and characteristics of attack techniques and are publishing Security Intelligence Reports(SIRs) on them. However, the SIRs distributed by each company are huge and unstructured. In this paper, we propose a framework that uses five analytic techniques to formulate a report and extract key information in order to reduce the time required to extract information on large unstructured SIRs efficiently. Since the SIRs data do not have the correct answer label, we propose four analysis techniques, Keyword Extraction, Topic Modeling, Summarization, and Document Similarity, through Unsupervised Learning. Finally, has built the data to extract threat information from SIRs, analysis applies to the Named Entity Recognition (NER) technology to recognize the words belonging to the IP, Domain/URL, Hash, Malware and determine if the word belongs to which type We propose a framework that applies a total of five analysis techniques, including technology.

The Analysis of Knowledge Information Research and Development Activities for the Fourth Industrial Revolution: Focusing on the U.S. Intelligence Advanced Research Projects Activity(IARPA) (4차 산업혁명 시대 대응을 위한 지식정보 연구·개발 활동 분석: 미국 정보고등연구기획국(IARPA)을 중심으로)

  • Jeong, Yong-Il;Chung, Do-Bum;Mun, Hee Jin
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • Leading the fourth industrial revolution era requires science and technology strategies that establish original research directions at the national level. To this end, it is necessary to look at the research and development activities for the fourth industrial revolution of technology-leading countries. In this study, the research programs of the U.S. Intelligence Advanced Research Projects Activity(IARPA), an organization focusing on cutting edge research on science and technology information such as artificial intelligence, are investigated by using network analysis. The findings show that, resolving around the information identification and forecasting, decision making and cybersecurity clusters, IARPA's research programs largely focus on finding hidden information and predicting specific events, supporting decision making by considering changes in and outside organizations or establishing cybersecurity. Also, this study finds that China and Japan, representative technology-leading Asian countries, refer to the research programs of IARPA to establish their science and technology policies. The results of this study suggest implications for Korea's science and technology policies in response to the fourth industrial revolution era.

Technology convergence analysis of e-commerce(G06Q) related patents with Artificial Intelligence (인공지능 기술이 포함된 전자상거래(G06Q) 관련 특허의 기술 융복합 분석)

  • Jaeruen Shim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • This study is about the technology convergence analysis of e-commerce related patents containing Artificial Intelligence applied for in Korea. The relationships between core technologies were analyzed and visualized using social network analysis. As a result of social network analysis, the core IPC codes that make up the mutual technology network in e-commerce related patents containing Artificial Intelligence were found to be G06Q, G06F, G06N, G16H, G10L, H04N, G06T, and A61B. In particular, it can be confirmed that there is an important convergence of data processing-related technologies such as [G06Q-G06F], [G06Q-G06N], and voice and image signals such as [G06Q-G10L], [G06Q-H04N], and [G06Q-G06T]. Using this research method, it is possible to identify future technology trends in e-commerce related patents and create new Business Models.

An Integrative Framework for Creating Collective Intelligence and Enhancing Performance (집단지성과 성과창출을 위한 통합적 개념틀 검토)

  • Chu, Cheol Ho;Ryu, Su Young
    • Knowledge Management Research
    • /
    • v.19 no.3
    • /
    • pp.173-187
    • /
    • 2018
  • This study was aimed at suggesting an integrative framework for creating collective intelligence and enhancing group performance after reviewing previous studies including those related to learning organizations, organizational learning, knowledge management, and collective intelligence. In the first, we examined that the similarities and differences between collective intelligence and other similar concepts, such as learning organizations, organizational learning, and knowledge management. Next, an integrative framework for creating collective intelligence and channeling it into strong group performance were suggested. In this process, we reviewed conditions for creating collective intelligence and segmented the major variables as expectancy, valence, and instrumentality, according to Vroom's (1964) expectancy theory. Characteristics of problems and the roles of leaders were respectively considered as valence for inducing collaboration and expectancy for managing probability to achieve goals. Instrumental factors were also adopted from conditions for creating group intelligence suggested from several researchers, such as creativity, openness, willingness for working together, horizontal communication, centralization in decision making, and building effective information and communication technology system and active usage of it. We discussed two potentially disputable matters about the scope and level of collective intelligence and group performance and suggest several theoretical and practical implications in the Discussion.

A Study on the Defense Geospatial Intelligence Governance - Focusing on the Intelligence Community and LandWarNet (국방지리공간정보 거버넌스에 대한 연구 - 미(美) 정보공동체와 육군 랜드워넷을 중심으로)

  • Kim, Dong Hwan
    • Spatial Information Research
    • /
    • v.22 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Recently, ICT environments have been increasingly developed and the pattern of the war also has been changed to NCW. The development of communication and network technology, for example, C4I and TDL(Tactical Data Link), has been prosperous and rapid. But the geospatial intelligence field which is the basis of the network frames relatively has not been developed. The purpose of this paper is to foster the geospatial governance in terms of the defense perspective. In order to do that, this paper deals with the U.S. Intelligence Community(IC) and the U.S. Army Global Information Grid(GIG), LandWarNet and those could be good examples of roles and statuses of geospatial intelligence. IC has been produced essential intelligence which is required for policymakers and military leaders. IC has several stove-piped intelligence process systems which have been separately developed and competed. And so as to complete GIG, the U.S. Army adopted LandWarNet. The U.S. Corps of Engineers organized the Army Geospatial Center(AGC) on 1 October 2009 to support LandWarNet. In order to develop NCW, we should recognize geospatial intelligence as the basis of network framework and make a central leading organization of defense geospatial intelligence. The mission of Korea Defense Geospatial-Intelligence Agency should be changed from producing GEOINT to a strategic GEOINT agency. The Army should organize a laboratory of geospatial intelligence field. The mission of producing GEOINT should be transferred to a geospatial intelligence battalion which is newly organized.

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks

  • Cai, Xingjuan;Sun, Youqiang;Cui, Zhihua;Zhang, Wensheng;Chen, Jinjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2469-2490
    • /
    • 2019
  • A low-energy adaptive clustering hierarchy (LEACH) protocol is a low-power adaptive cluster routing protocol which was proposed by MIT's Chandrakasan for sensor networks. In the LEACH protocol, the selection mode of cluster-head nodes is a random selection of cycles, which may result in uneven distribution of nodal energy and reduce the lifetime of the entire network. Hence, we propose a new selection method to enhance the lifetime of network, in this selection function, the energy consumed between nodes in the clusters and the power consumed by the transfer between the cluster head and the base station are considered at the same time. Meanwhile, the improved FTBA algorithm integrating the curve strategy is proposed to enhance local and global search capabilities. Then we combine the improved BA with LEACH, and use the intelligent algorithm to select the cluster head. Experiment results show that the improved BA has stronger optimization ability than other optimization algorithms, which the method we proposed (FTBA-TC-LEACH) is superior than the LEACH and LEACH with standard BA (SBA-LEACH). The FTBA-TC-LEACH can obviously reduce network energy consumption and enhance the lifetime of wireless sensor networks (WSNs).

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

A Method for Information Source Selection using Teasaurus for Distributed Information Retrieval

  • Goto, Shoji;Ozono, Tadachika;Shintani, Toramatsu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.272-277
    • /
    • 2001
  • In this paper, we describe a new method for selecting information sources in a distributed environment. Recently, there has been much research on distributed information retrieval, that is information retrieval (IR) based on a multi-database model in which the existence of multiple sources is modeled explicitly. In distributed IR, a method is needed that would enable selecting appropriate sources for users\` queries. Most existing methods use statistical data such as document frequency. These methods may select inappropriate ate sources if a query contains polysemous words. In this paper, we describe an information-source selection method using two types of thesaurus. One is a thesaurus automatically constructed from documents in a source. The other is a hand-crafted general-purpose thesaurus(e.g. WordNet). Terms used in documents in a source differ from one another and the meanings of a term differ depending on th situation in which the term is used. The difference is a characteristic of the source. In our method, the meanings of a term are distinguished between by the relationship between the term and other terms, and the relationship appear in the co-occurrence-based thesaurus. In this paper, we describe an algorithm for evaluating a usefulness of a source for a query based on a thesaurus. For a practical application of our method, we have developed Papits, a multi-agent-based in formation sharing system. An experiment of selection shows that our method is effective for selecting appropriate sources.

  • PDF