• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.026 seconds

An Implementation of Control Command Acquisition System for Analysis of Abnormal Behavior (이상행위 분석을 위한 제어명령 수집 시스템 구현)

  • Lee, Jin-Heung;An, Pa-Ul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.137-140
    • /
    • 2019
  • 본 논문에서는 자동 제어 시스템의 이상행위를 분석하기 위하여 MODBUS 프로토콜 기반의 제어 명령을 수집 분류하여 등록된 화이트리스트 기반으로 이를 탐지하는 시스템을 구현하였다. 구현 시스템은 자동 제어 시스템 기반으로 다양한 생산설비를 동작시키는 스마트팩토리 시스템을 비롯하여 국가기간 산업에 활용 가능하며, 생산설비의 이상 작동을 확인하기 위하여 생산설비의 동작 신호를 주기적으로 수집 분석하여 정상적인 작업형태에서 벗어나는 이상 작업을 판단할 수 있도록 구성하였다. 또한, 소형화된 공장 자동화 설비를 구성하여 실제 스마트팩토리 환경에서 제어명령을 수집하고, 수집된 신호로부터 이상 작동을 검출하는 제안 시스템의 구현 결과를 설명한다.

  • PDF

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.

Comparison of Shopping Behavior of Duty-Free Users at Incheon Airport

  • Yu-Jin Choi;Kyuseon Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.30 no.4
    • /
    • pp.76-91
    • /
    • 2022
  • 면세점 판매 채널이 다양화되고 스마트 여객 증대 등 쇼핑 성향의 변화로 인해 인천공항 면세점 객단가는 하락하고 있다. 면세점 매출액 감소에 따라 사업 다각화 및 고도화 등 대응 노력이 필요하다. 따라서 인천공항 면세점 이용객의 쇼핑 행태 및 면세점 트렌드 변화에 적기 대응을 위한 기초자료 및 마케팅 강화 방안을 제시하는 데 궁극적인 목적이 있다. 본 연구는 인천공항 면세점 내·외국인 구매자/비구매자, 환승객을 대상으로 쇼핑실태를 심층 조사하여 행동 특성을 분석하였으며, 그 결과 내국인과 외국인, 환승객별로 인구통계학 특성, 여행 특성, 쇼핑 특성에서 차이가 나타났다. 인천공항 면세점 이용객별 중요하게 인지하는 요소와 만족하는 요소를 파악하고 개선할 부분을 파악하였다. 이로써 인천공항 면세점 운영정책 수립 및 기본방향 설정을 위한 기초자료로 활용할 수 있고, 인천공항 면세점 마케팅 강화 및 활성화를 위한 전략 방안을 제시하는 데 의의가 있다.

Earthquake Behavior Characteristics and Seismic Performance Evaluation of Phayathonzu Temple in Myanmar (미얀마 파야똔주 사원의 지진거동 특성 및 내진성능 평가)

  • Kim, Ho-Soo
    • Journal of Korean Association for Spatial Structures
    • /
    • v.24 no.2
    • /
    • pp.43-52
    • /
    • 2024
  • Phayathonzu temple in Myanmar was made of masonry bricks, and so it was vulnerable to lateral load such as earthquake. Especially, it has many difficulties in structural modeling and dynamic analysis because the discontinuous characteristics of masonry structure should be considered. So, it is necessary to provide the seismic performance evaluation technology through the inelastic dynamic modeling and analysis under earthquake loads for the safety security of masonry brick temple. Therefore, this study analyzes the seismic behavior characteristics and evaluates the seismic performance for the 479 structure with many cracks and deformations. Through the evaluation results, we found out the structural weak parts on earthquake loads.

Development of Windows forensic tool for verifying a set of data (윈도우 포렌식 도구의 검증용 데이터 세트의 개발)

  • Kim, Min-Seo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1421-1433
    • /
    • 2015
  • For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

Game Bot Detection Based on Action Time Interval (행위 시간 간격 기반 게임 봇 탐지 기법)

  • Kang, Yong Goo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1153-1160
    • /
    • 2018
  • As the number of online game users increases and the market size grows, various kinds of cheating are occurring. Game bots are a typical illegal program that ensures playtime and facilitates account leveling and acquisition of various goods. In this study, we propose a method to detect game bots based on user action time interval (ATI). This technique observes the behavior of the bot in the game and selects the most frequent actions. We distinguish between normal users and game bots by applying Machine Learning to feature frequency, ATI average, and ATI standard deviation for each selected action. In order to verify the effectiveness of the proposed technique, we measured the performance using the actual log of the 'Aion' game and showed an accuracy of 97%. This method can be applied to various games because it can utilize all actions of users as well as character movements and social actions.

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.

Implementation of Real-Time Security System by using Dual Camera (이중카메라를 이용한 실시간 도난방지 시스템의 구현)

  • Lee, Kwang-Hyoung;Jung, Young-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.158-164
    • /
    • 2009
  • The real time security system using web camera shall correspond in commensurate with it in real time through classifying moving object and analyzing the behavior. But, as to the detection of moving object in real time image through a camera, it is difficult to detect movement correctly according to the change of unnecessary noises, lighting conditions and screened phenomenon. This paper proposes real time security system by dual camera and ultrasonic sensor, a method of advanced detection in order to detect correct movement of specific object. That is, we could improve the tracing characteristics by using ultrasonic sensor as measurement factor of changed position and verify through experiments that the information interchanged between camera upwards and in front of it have effect on tracing a specific object continuously. The results of the experiment show that recognition rate of object was 97.4% and the correct tracing could be done lastingly in a phenomena of screening object.

A Reliability Evaluation Model for the Power Devices Used in Power Converter Systems Considering the Effect of the Different Time Scales of the Wind Speed Profile

  • Ji, Haiting;Li, Hui;Li, Yang;Yang, Li;Lei, Guoping;Xiao, Hongwei;Zhao, Jie;Shi, Lefeng
    • Journal of Power Electronics
    • /
    • v.16 no.2
    • /
    • pp.685-694
    • /
    • 2016
  • This paper presents a reliability assessment model for the power semiconductors used in wind turbine power converters. In this study, the thermal loadings at different timescales of wind speed are considered. First, in order to address the influence of long-term thermal cycling caused by variations in wind speed, the power converter operation state is partitioned into different phases in terms of average wind speed and wind turbulence. Therefore, the contributions can be considered separately. Then, in regards to the reliability assessment caused by short-term thermal cycling, the wind profile is converted to a wind speed distribution, and the contribution of different wind speeds to the final failure rate is accumulated. Finally, the reliability of an actual power converter semiconductor for a 2.5 MW wind turbine is assessed, and the failure rates induced by different timescale thermal behavior patterns are compared. The effects of various parameters such as cut-in, rated, cut-out wind speed on the failure rate of power devices are also analyzed based on the proposed model.