• Title/Summary/Keyword: R&D 정보보호

Search Result 89, Processing Time 0.028 seconds

A Correspondence Training Scenario against Bypassing Information Protection System Attacks (네트워크 정보보호시스템 우회 공격에 대한 대응훈련 시나리오)

  • Hong, Jeong Soo;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.818-828
    • /
    • 2018
  • Nowadays, various security systems are developed and used for protecting information on the network. Although security solutions can prevent some of the security risks, they provide high performance only if used appropriately in accordance with their purposes and functionality. Security solutions commonly used in information protection systems include firewalls, IDS, and IPS. However, despite various information protection systems are introduced, there are always techniques that can threaten the security systems through bypassing them. The purpose of this paper is to develop effective training techniques for responding to the bypass attack techniques in the information security systems and to develop effective techniques that can be applied to the training. In order to implement the test bed we have used GNS3 network simulator, and deployed it on top of virtual operating system using VirtualBox. The proposed correspondence training scenario against bypassing information protection system attacks could be very effectively used to counteract the real attacks.

Medium Voltage Inverter System Using Decentralized Control (분산제어를 이용한 고압인버터 시스템)

  • Jang, H.K.;Kim, H.J.;Jeon, J.H.;Yun, H.M.;Na, S.H.
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.464-466
    • /
    • 2007
  • H-Bridge Multi-Level (HBML) 고압인버터는 저압의 반도체 소자를 사용하는 단상 H-Bridge 인버터로 구성 된 셀을 직렬로 연결함으로써 정현파에 가까운 고전압을 얻을 수 있고, 입 출력 고조파가 낮아서 필터가 필요 없는 토폴로지로 산업분야에서 사용이 확대되고 있다. 본 논문은 HBML 고압인버터의 마스터 제어기와 셀 제어기의 통신 하드웨어를 병렬로 구성하여서 하나의 전압지령 값과 Angle 값으로 셀에서 PWM을 구현 할 수 있는 분산제어 방식을 제안한다. 이 방식에서 셀 제어기가 전압, 전류, 주파수, 보호기능, 통신감시 정보 등 셀 제어의 대부분을 담당함으로써 마스터 제어기의 부담을 줄이고, 따라서 신호선의 개수를 줄일 수 있다. 또 통신하드웨어의 종단에 마스터 제어기를 연결만 하면 마스터제어기의 2중화가 가능하므로 사용하고 있던 마스터 제어기의 고장 발생 시에 대체하여 사용할 수 있으므로 시스템의 안정성 향상에 도움을 준다. 선간전압 33레벨로 구성된 HBML 고압인버터 시험을 통해 제안된 방식의 타당성과 신뢰성을 검증한다.

  • PDF

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

A Study on the Importance Classification of Semiconductor Technical Documents Using Knowledge Graphs and Embedding Models (임베딩 모델과 지식맵 분석을 활용한 반도체 기술문서 중요도 분류에 관한 연구)

  • Hong, Giwan;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.288-289
    • /
    • 2021
  • 4차산업혁명과 함께 기존 산업구조가 급속하게 변화하고 기술패권주의가 심화되면서, 기술 패권의 승패에 따라 국가의 글로벌 경쟁력이 크게 좌우된다. 세계 주요국들은 기술경쟁력 확보를 위해 기술혁신과 기술연대의 경쟁을 벌이고 있고, 우리나라도 이러한 동향 속에서 적극적인 R&D 연구 투자와 정책적 지원을 통해 미래 산업 분야의 기술경쟁력 확보를 위해 노력하고 있다. 현재 중국에 의한 기술 탈취나 인력 유출이 발생하고 있고, 이는 산업경쟁력 상실로 이어져 막대한 경제적 피해를 야기할 수 있다. 기술경쟁력을 잃지 않기 위해, 반드시 우리의 산업기술 보호 수단도 마련되어야 한다. 선제적으로 중요한 산업기술을 적절히 식별하여 중요도에 따라 보호수단을 이행하는 것이 산업기술 보호의 시작일 것이다. 이에 따라, 본 논문에서는 지식그래프와 임베딩 모델을 활용하여 우리나라의 핵심산업분야 중 하나인 반도체 분야의 기술문서를 중요도에 따라 수직적으로 분류할 수 있는 방안에 대해 연구하고자 한다.

Analysis on Decryption Failure Probability of TiGER (TiGER의 복호화 실패율 분석)

  • Seungwoo Lee;Jonghyun Kim;Jong Hwan Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.157-166
    • /
    • 2024
  • Probability of decryption failure of a public key cryptography based on LWE(learning with errors) is determined by its architecture and parameter settings. Since large decryption failure probability leads to attacks[1] on scheme as well as degradation of performance, TiGER[2], a Ring-LWE(R)-based KEM proposed for the first round of KpqC, tried to reduce the decryption failure probability by using error correction code Xef and D2 encoding method. However, D'Anvers et al. has shown that the commonly assumed independence of each bit error is not established since in the case of an encryption scheme based on Ring-LWE(R) using an error correction code, there is error dependency which is not negligible[3]. In this paper, since TiGER does not consider the error dependency, we calcualte the decryption failure probability of TiGER by considering the error dependency. In addition, we found that the bit error probability is incorrectly calculated in TiGER, so we present the correct calculation.

Research on the Level Evaluation Model of the Organization Research Security (조직의 연구보안 수준평가 모형 연구)

  • Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.109-130
    • /
    • 2020
  • Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.

A Study on the Factors Influencing Project Performance of Government R&D Program: Focusing on IT and CT Industry (정부연구개발사업의 성과창출요인에 관한 연구: IT와 CT산업을 중심으로)

  • Ko, EunOk;Jang, Pilseong;Kim, Yeunbae
    • Journal of Technology Innovation
    • /
    • v.22 no.3
    • /
    • pp.261-286
    • /
    • 2014
  • Recently, project performance and management of government R&D program investing huge amount of budget is being focused. In this study, I built a model for estimating the performance creating paths of the government R&D program, then I analyzed the attributes of performances created by industries. I used simultaneous equations with FIML and examined the IT industry and CT industry of industrial technology innovation program using survey on R&D performance conducted by KEIT. On the analysis result, all the companies create the innovation performance through the government grants. However, the one who commercialize patents is SMEs in IT industry, and conglomerates in CT industry. SMEs in IT industry, which has characteristic of complex product, need extra self innovation activities even the government supports them. For improving the commercialization performance and technology development of SMEs in CT industry, it is effective when conducting cooperative research. These findings give us the implication that it is needed to consider different factors by industrial and enterprise characteristic when planning the public policy and government tasks.

A Study an Effective Copyright Protection Method for Webtoons (효과적인 웹툰 저작권 보호 방법에 관한 연구)

  • Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.106-112
    • /
    • 2019
  • The Korea Copyright Commission has pursued copyright technology R&D projects to prevent illegal copying of comics and Webtoons. We developed a feature-based scanned comic filtering technology in order to apply technical measures to specific types of online service providers. We also developed technologies in order to monitor and identify illegally distributed comics on webhard sites and to monitor and identify illegally distributed webtoons. Even though all comic books posted on webhard sites are illegal, it is no trouble to download and access popular comics by accessing websites in foreign countries. Even under these circumstances, the comic and webtoon copyright protection technologies developed over the past six years have been used at all. In this paper, we examine what the problems are and find solutions to propose a copyright protection method for webtoons.

The Relationship between R&D Policies' Importance Perception and Business Performance (연구개발 정책의 중요도 평가와 기업의 경영성과와의 관계)

  • Kim, Soo-Hyun;Lee, Sang-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.498-506
    • /
    • 2018
  • Considering that firms' view on R&D activities may differ depending on the economic situation, in this paper, R&D policies that significantly affect the business performance are identified. The analysis is conducted by dividing the analysis time-frame into before and after the economic recession. In addition, we analyze by considering the type of industry, the proportion of R&D investment, and the type of government support policy that the companies participate in. According to the results of the empirical analysis, the provision of global market and technology information is recognized to give a significant impact on business performance for both before and after the economic recession. It is shown that recognizing the importance of 'supporting self-technology development', 'enhancing technical cooperation with foreign countries', and 'enhancing the contract and intellectual property protection system' that had significant effects before the recession did not significantly affect the business performance after the recession. The analysis results could give meaningful implications to the government for deciding which R&D activities should be supported.