• Title/Summary/Keyword: Responding techniques

Search Result 69, Processing Time 0.025 seconds

A Correspondence Training Scenario against Bypassing Information Protection System Attacks (네트워크 정보보호시스템 우회 공격에 대한 대응훈련 시나리오)

  • Hong, Jeong Soo;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.818-828
    • /
    • 2018
  • Nowadays, various security systems are developed and used for protecting information on the network. Although security solutions can prevent some of the security risks, they provide high performance only if used appropriately in accordance with their purposes and functionality. Security solutions commonly used in information protection systems include firewalls, IDS, and IPS. However, despite various information protection systems are introduced, there are always techniques that can threaten the security systems through bypassing them. The purpose of this paper is to develop effective training techniques for responding to the bypass attack techniques in the information security systems and to develop effective techniques that can be applied to the training. In order to implement the test bed we have used GNS3 network simulator, and deployed it on top of virtual operating system using VirtualBox. The proposed correspondence training scenario against bypassing information protection system attacks could be very effectively used to counteract the real attacks.

Implementation of Virtual Environment System for Multi-joint Manipulator Designed for Special Purpose Equipment with Wearable Joystick used in Disaster Response (웨어러블 조작기 기반 재난·재해 특수 목적기계 다관절 작업기의 가상 환경 작업시스템 구현)

  • Cha, Young Taek;Lee, Yeon Ho;Choi, Sung Joon
    • Journal of Drive and Control
    • /
    • v.17 no.3
    • /
    • pp.33-46
    • /
    • 2020
  • We introduce a piece of special-purpose equipment for responding to disasters that has a dual-arm manipulator consisting of six-axis multi joints, and a master-slave operating system controlled by a wearable joystick for intuitive and convenient operation. However, due to the complexity and diversity of a disaster environment, training and suitable training means are needed to improve the interaction between the driver and equipment. Therefore, in this paper, a system that can improve the operator's immersion in the training simulation is proposes, this system is implemented in a virtual environment. The implemented system consists of a cabin installed with the master-slave operation system, a motion platform, visual and sound systems, as well as a real-time simulation device. This whole system was completed by applying various techniques such as a statistical mapping method, inverse kinematics, and a real-time physical model. Then, the implemented system was evaluated from a point of view of the appropriateness of the mapping method, inverse kinematics, the feasibility for real-time simulations of the physical environment through some task mode.

A Study on the Masses Reduction for the Structural Safety Using Optimal Design Method (최적 설계법을 이용한 구조물 안전을 위한 질량 감소 연구)

  • 신귀수;이기형;정인성
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.1
    • /
    • pp.40-46
    • /
    • 1998
  • This paper is presented that theoretical optimization design method in order to consider mass reduction for the structural safety In this paper, it described methods for reducing vibration in structural safety by the determination of the optimum sizes and locations of tunning masses through formal mathematical optimization techniques. The optimization procedure which employs the tunning masses and corresponding locations is developed. Design variables are systematically changed to achieve low values of shear without a large mass penalty. Three optimization methods ire developed and tested. The first is based on minimizing the modal shaping parameter which indirectly reduce the modal shear amplitudes corresponding to each harmonic of airload. The second method reduces these amplitudes directly and the third method reduces the shear as a function of time during a revolution of the blade. The first method works well for reducing the shear for one mode responding to a single harmonic of the airload but has been found in some bases to be ineffective for more than one mode.

  • PDF

Macroalgae as the Source for Environmental Assessment

  • Luyen, Hai-Quoc;Meinita, Maria D.N.;Hong, Yong-Ki
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.2 no.2
    • /
    • pp.77-80
    • /
    • 2007
  • Macroalgal tissues can be used as indicating materials for environmental assessment using several algal biotechnology techniques. As bioassay test organisms, macroalgal tissues are required as an axenic state for suitable biological indicators. Callus formation and blade regeneration under suitable culture conditions are also useful for the tests. Quantitative method using tetrazolium chloride or $alamarBlue^{TM}$ is devised on a rapid assessment of the seaweed viability. The use of RT-PCR especially differential display technique should provide the means for the detection and isolation of the responding genes induced by the environmental stress. Seaweed thriving in more environmental changes might contain more diverse biologically active substances.

  • PDF

Cognitive-behavioral Approach to Patients with Cardiovascular Diseases (심장혈관계 질환 환자들에 대한 인지행동적 접근)

  • Koh, Kyung-Bong
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.3 no.2
    • /
    • pp.185-196
    • /
    • 1995
  • The author reviewed cognitive-behavioral approach to A type behavior pattern and hypertension which are known to be risk factors for coronary heart diseases. Those cognitive distortions frequently found in persons with A type behavior include all-nothing thinking, selective attention, personalization, and attribution of causality. Cognitive-behavioral techniques were also described, which can be applied to management of each characteristic of A type behavior pattern such as time urgency, perfectionism, achievement striving, low self-esteem, excessive work involvement, hostility, and depression. Cognitive-behavioral intervention for hypertension might help the patients to recognize and monitor anger-engendering conflicts, identify characteristic styles of responding, and experiment with alternative ways of managing conflict and anger. Since different features predominate in different individuals, it is necessary to develop treatment plan on the basis of individual characteristics and problems.

  • PDF

A Performance Analysis on a Heat pump with Thermal Storage Adopting Load Response Control Method (부하 대응 제어방식을 적용한 축열식 히트펌프시스템의 성능 해석)

  • Kim, Dong Jun;Kang, Byung Ha;Chang, Young Soo
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.30 no.3
    • /
    • pp.130-142
    • /
    • 2018
  • We use heat pumps with thermal storage system to reduce peak usage of electric power during winters and summers. A heat pump stores thermal energy in a thermal storage tank during the night, to meet load requirements during the day. This system stabilizes the supply and demand of electric power; moreover by utilizing the inexpensive midnight electric power, thus making it cost effective. In this study, we propose a system wherein the thermal storage tank and heat pump are modeled using the TRNSYS, whereas the control simulations are performed by (i) conventional control methods (i.e., thermal storage priority method and heat pump priority method); (ii) region control method, which operates at the optimal part load ratio of the heat pump; (iii) load response control method, which minimizes operating cost responding to load; and (iv) dynamic programming method, which runs the system by following the minimum cost path. We observed that the electricity cost using the region control method, load response control approach, and dynamic programing method was lower compared to using conventional control techniques. According to the annual simulation results, the electricity cost utilizing the load response control method is 43% and 4.4% lower than those obtained by the conventional techniques. We can note that the result related to the power cost was similar to that obtained by the dynamic programming method based on the load prediction. We can, therefore, conclude that the load response control method turned out to be more advantageous when compared to the conventional techniques regarding power consumption and electricity costs.

A study on the ideal structure of feed sprue in the investment casting process (정밀주조 프로세스에서 피드 스프루의 이상적 구조에 관한 연구)

  • Lee, Kwang-Yeol
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.22 no.2
    • /
    • pp.105-113
    • /
    • 2012
  • Maintenance training is generally provided to teach employees new knowledge and techniques in order to increase their qualities. It means that the purpose of maintenance training is to increase an employee's knowledge or technique level and to maintain or increase their performance level through continuous training in their field, and the methods, contents and the level of training vary depending on the type of job they perform. Maintenance training is more important for jobs that require continuous technical increases or research, or for professional jobs that continuously require new knowledge and techniques. The purpose of this study is to provide quality service to consumers by responding to the rapidly changing jewelry distribution environment and to quickly and accurately acquire new and advanced jewelry inspection and appraisal techniques, and to contribute to the healthy consumption culture through a general quality increase in the jewelry industry.

An APT Attack Scoring Method Using MITRE ATT&CK (MITRE ATT&CK을 이용한 APT 공격 스코어링 방법 연구)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.673-689
    • /
    • 2022
  • We propose an APT attack scoring method as a part of the process for detecting and responding to APT attacks. First, unlike previous work that considered inconsistent and subjective factors determined by cyber security experts in the process of scoring cyber attacks, we identify quantifiable factors from components of MITRE ATT&CK techniques and propose a method of quantifying each identified factor. Then, we propose a method of calculating the score of the unit attack technique from the quantified factors, and the score of the entire APT attack composed of one or more multiple attack techniques. We present the possibility of quantification to determine the threat level and urgency of cyber attacks by applying the proposed scoring method to the APT attack reports, which contains the hundreds of APT attack cases occurred worldwide. Using our work, it will be possible to determine whether actual cyber attacks have occurred in the process of detecting APT attacks, and respond to more urgent and important cyber attacks by estimating the priority of APT attacks.

A study on the Counseling Process and Counseling Techniques Applying Freud's Psychoanalysis (프로이트 정신분석을 적용한 상담과정과 상담기법에 관한 연구)

  • Lee, Pyung-Hwa;Kim, Bo-Ki
    • Industry Promotion Research
    • /
    • v.7 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • This study is based on Freud's psychoanalysis and intends to deal with the actual psychoanalytic counseling applied to it. In particular, I would like to study the counseling process and counseling techniques. The research results are as follows. The counseling process goes through four stages: initiation, transfer development, training, and transfer resolution as follows after selecting a client and constructing a counseling situation. In the beginning phase, the client listens to important past histories. In the metastasis development stage, it is from the time when metastasis appears. The training phase is the phase in which the client's insight is translated into real life to bring about change. The transfer resolution stage is the period when transfer analysis and interpretation are completed. Counseling techniques include free association, empathy, resistance, transference and countertransference, and interpretation. Free association is a key technique in psychoanalytic therapy and plays an important role in maintaining the analytical framework. Empathy is the ability of the therapist to identify herself with the client and the ability of the therapist to convey the empathic experience to the client itself is a key mechanism for change. Resistance refers to any behavior in which the client does not cooperate with counseling. Transference and countertransference are the main techniques of psychoanalysis. This is because the psychoanalyst induces and resolves the transference of the client during the treatment process. Interpretation refers to the technique of responding verbally in order to understand the needs, meanings, and motives hidden behind the client's thoughts, feelings, and actions. In conclusion, the counseling process of psychoanalytic counseling refers to the purpose of effective counseling by selecting a client and constructing a counseling situation. In addition, the principles of psychoanalysis in counseling techniques are applied to treatment procedures that vary according to the nature of the case, and can be variably applied while treating the same client.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.