• Title/Summary/Keyword: Network Assets

Search Result 166, Processing Time 0.026 seconds

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants (원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1392-1397
    • /
    • 2018
  • Nuclear power plants(NPPs) are protected as core facilities managed by major countries. Applying general IT technology to facilities of NPPs, the proportion of utilizing the digitized resources for the rest of the assets except for the existing installed analog type operating resources is increasing. Using the network to control the IT assets of NPPs can provide significant benefits, but the potential vulnerability of existing IT resources can lead to significant cyber security breaches that threaten the entire NPPs. In this paper, we analyze the nuclear cyber security vulnerability regulatory requirements, characteristics of existing vulnerability scanners and their requirements and investigate commercial and free vulnerability scanners. Based on the proposed application method, we can improve the efficiency of checking the network security vulnerability of NPPs when applying vulnerability scanner to NPPs.

A research on the possibility of restoring cultural assets of artificial intelligence through the application of artificial neural networks to roof tile(Wadang)

  • Kim, JunO;Lee, Byong-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • Cultural assets excavated in historical areas have their own characteristics based on the background of the times, and it can be seen that their patterns and characteristics change little by little according to the history and the flow of the spreading area. Cultural properties excavated in some areas represent the culture of the time and some maintain their intact appearance, but most of them are damaged/lost or divided into parts, and many experts are mobilized to research the composition and repair the damaged parts. The purpose of this research is to learn patterns and characteristics of the past through artificial intelligence neural networks for such restoration research, and to restore the lost parts of the excavated cultural assets based on Generative Adversarial Network(GAN)[1]. The research is a process in which the rest of the damaged/lost parts are restored based on some of the cultural assets excavated based on the GAN. To recover some parts of dammed of cultural asset, through training with the 2D image of a complete cultural asset. This research is focused on how much recovered not only damaged parts but also reproduce colors and materials. Finally, through adopted this trained neural network to real damaged cultural, confirmed area of recovered area and limitation.

Recent Ecological Asset Research Trends using Keyword Network Analysis (키워드 네트워크 분석을 활용한 생태자산 연구 경향 분석)

  • Kim, Byeori;Lee, Jae-Hyuck;Kwon, Hyuksoo
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.5
    • /
    • pp.303-314
    • /
    • 2017
  • The purpose of this study was to determine domestic and foreign ecological asset research trends. We aimed to understand ecological assets research directions and trends by comprehensively analyzing 12 keywords, including those similar to keywords for comparable assets, to identify related fields and regions. Extensive analysis of domestic and foreign studies was conducted through keyword network analysis of textural information. This approach is helpful for understanding the flow of information and identifying research directions. Foreign studies based on sustainability were connected with 'Economic assessment', 'Management' and 'Policy' areas. It was difficult to determine domestic research trends because there are fewer domestic studies than foreign. There were studies that sought to identify economic value of developing regions. This research can be used to guide the research direction for future ecosystem asset analysis in Korea.

A Study on the Plan for the Masterpiece Tourism Assets of Traditional Cultural Resources Based on the Ubiquitous IT (U - 정보기술에 기반한 전통문화자원의 명품 관광자산화 방안)

  • Kim, Chang Su;Lee, Sung Ho;Park, Joon Ho;Park, Gyeong Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.145-160
    • /
    • 2012
  • The globe-trotting trend has been converted from tourism for the simple purposes of sightseeing and enjoyment to a form of learning and practicing the more specialized contents by directly participation. Traditional cultural resources have sufficient potential as culture and tourism assets that fit this kind of trend. Therefore, building proper tourist resources for their application has become a very urgent and important matter. To make masterpiece tourism packages through combined services of traditional cultural resources, it is necessary for operators to ponder diverse methods that can be used to develop various experience programs and conserve traditional cultural properties by continuously generating profits. The major results of this research are as follows. Firstly, this study proposes plans for unified tourist information and combined services of traditional cultural resources based on ubiquitous IT. Secondly, it is ascertained that the organization of combined operational consultative groups and the improvement of operator' capability are required to execute combined services of traditional cultural resources. Thirdly, we propose business plans to generate profits in both product aspect and network aspect.

Building and Analysis of Semantic Network on S&T Multilingual Terminology (과학기술 전문용어의 다국어 의미망 생성과 분석)

  • Jeong, Do-Heon;Choi, Hee-Yoon
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.25-47
    • /
    • 2006
  • A terminology system capable of providing interpretations and classification information on a multilingual science and technology(S&T) terminology is essential to establish an integrated search environment for multilingual S&T information systems. This paper aims to build a base system to manage an integrated information system for multilingual S&T terminology search. It introduces a method to build a search system for S&T terminologies internally linked through the multilingual semantic network and a search technique on the multiple linked nodes. In order to provide a foundation for further analysis researches, it also attempts to suggest a basic approach to interpret terminology clusters generated with those two search methods.

Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.215-219
    • /
    • 2022
  • Bankruptcy is one of the major areas that have attracted the interest of many researchers in the American system, particularly in terms of the laws that oversee it. It provides a plan of reorganization that enables the debtor or the proprietor to discharge liabilities to the creditors through dividing the assets to settle debts. This activity is carried out under supervision to fairly protect the interests of the creditors. Bankruptcy protection systems are dynamic and complex in nature, in line with the economic sector, ensuring the protection of affected individuals from falling into huge losses. Some bankruptcy procedures give the debtor the opportunity to stay in operation or business activity and benefit from revenues until the debt is settled. This law allows some debtors to be relived from any financial burden after the distribution of assets, even if the debt is not paid in full. In light of the above information, this research paper seeks to explore the nature of the complexity of bankruptcy protection laws, their characteristics, and the justice system that regulate them. It also sheds more light on the decision-making powers on bankruptcy cases. There are specialized courts that cover bankruptcy cases located in district courts in every state.

Trends and Prospects for the Development of Virtual Reality and Digital Property

  • Kirillova, Elena Anatolyevna;Blinkov, Oleg Evgenyevich;Blinkova, Elena Victorovna;Vrazhnov, Aleksey Sergeevich;Magomedov, Firdousi Bilyamudinovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.284-290
    • /
    • 2022
  • The study considers trends and prospects for developing virtual (augmented) reality and civil transactions in relation to digital property. In jurisprudence, there is a need to determine the legal status of virtual and augmented reality to regulate legal relations in the digital environment. Legal relations using new digital technologies require the creation of new legislative approaches and rules of their legal regulation. The article dwells on the legal status of virtual (augmented) reality and determines the methods of regulating legal relations in the sphere of digital property. The study utilized methods for collecting single and multiple facts in order to identify the main trends in the civil circulation of digital assets, as well as private law methods. The methods of generalization, concreteness, induction and deduction reveal the legal nature and main features of virtual (augmented) reality and digital property. The paper highlights the specifics of virtual reality and civil transactions in relation to digital assets. The research has concluded that the sale, exchange and other actions with digital objects in virtual reality have distinctive features, while digital property has also unique characteristics since it is involved in civil circulation and legal relations.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.