• Title/Summary/Keyword: Security Function

Search Result 1,543, Processing Time 0.032 seconds

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF

Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks (제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용)

  • Seoin Park;Jiho Lee;Seunghyun Lee;Janghyeok Yoon;Changho Son
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.

Research on Object Detection Library Utilizing Spatial Mapping Function Between Stream Data In 3D Data-Based Area (3D 데이터 기반 영역의 stream data간 공간 mapping 기능 활용 객체 검출 라이브러리에 대한 연구)

  • Gyeong-Hyu Seok;So-Haeng Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.551-562
    • /
    • 2024
  • This study relates to a method and device for extracting and tracking moving objects. In particular, objects are extracted using different images between adjacent images, and the location information of the extracted object is continuously transmitted to provide accurate location information of at least one moving object. It relates to a method and device for extracting and tracking moving objects based on tracking moving objects. People tracking, which started as an expression of the interaction between people and computers, is used in many application fields such as robot learning, object counting, and surveillance systems. In particular, in the field of security systems, cameras are used to recognize and track people to automatically detect illegal activities. The importance of developing a surveillance system, that can detect, is increasing day by day.

A Study on the Data Driven Neural Network Model for the Prediction of Time Series Data: Application of Water Surface Elevation Forecasting in Hangang River Bridge (시계열 자료의 예측을 위한 자료 기반 신경망 모델에 관한 연구: 한강대교 수위예측 적용)

  • Yoo, Hyungju;Lee, Seung Oh;Choi, Seohye;Park, Moonhyung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Recently, as the occurrence frequency of sudden floods due to climate change increased, the flood damage on riverside social infrastructures was extended so that there has been a threat of overflow. Therefore, a rapid prediction of potential flooding in riverside social infrastructure is necessary for administrators. However, most current flood forecasting models including hydraulic model have limitations which are the high accuracy of numerical results but longer simulation time. To alleviate such limitation, data driven models using artificial neural network have been widely used. However, there is a limitation that the existing models can not consider the time-series parameters. In this study the water surface elevation of the Hangang River bridge was predicted using the NARX model considering the time-series parameter. And the results of the ANN and RNN models are compared with the NARX model to determine the suitability of NARX model. Using the 10-year hydrological data from 2009 to 2018, 70% of the hydrological data were used for learning and 15% was used for testing and evaluation respectively. As a result of predicting the water surface elevation after 3 hours from the Hangang River bridge in 2018, the ANN, RNN and NARX models for RMSE were 0.20 m, 0.11 m, and 0.09 m, respectively, and 0.12 m, 0.06 m, and 0.05 m for MAE, and 1.56 m, 0.55 m and 0.10 m for peak errors respectively. By analyzing the error of the prediction results considering the time-series parameters, the NARX model is most suitable for predicting water surface elevation. This is because the NARX model can learn the trend of the time series data and also can derive the accurate prediction value even in the high water surface elevation prediction by using the hyperbolic tangent and Rectified Linear Unit function as an activation function. However, the NARX model has a limit to generate a vanishing gradient as the sequence length becomes longer. In the future, the accuracy of the water surface elevation prediction will be examined by using the LSTM model.

The Research on the Life-safety Implementation using the Natural Light LED Lamp in the Disaster Prevention and Safety Management (방재안전 자연광 LED 조명을 이용한 생활안전 개선에 관한 연구)

  • Lee, Taeshik;Seok, Gumcheul;So, Yooseb;Choi, Byungshik;Kim, Jaekwon;Cho, Woncheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.53-62
    • /
    • 2016
  • This paper is shown the new method using LED Light, which the light environment is upgraded the natural LED light in the area of Disaster Prevention and Safety Management (PDSD), which the events of deaths is reduced on the Suicide, the Infectious diseases, the safety accidents, the Traffic Accident, the crime, the fire, the Nature Disaster, and which the health and the environment and the safety is implemented using the value of the color LED Light. Research findings include,during 3 weeks in the November 2016, in the ten residents (average living 28.7 years, age 67.5 years) with depressive symptoms in the northern part of Seoul, according to the request of the user, the PDSD natural light LED lighting was installed in the home bedroom or the living room, expectations for the ability to restore physical and mental stability were high (88%), in the same way, after 1 week and 3 weeks, the physical and mental changes were compared and the results,84% in the first week and 90% in the third week and thereafter, the effect of relieving depression was high. We conclude that patients with depression have a good sleep, an uneasy feeling, a sense of security, a good night's sleep, and a good feeling. The PDSD LED Light is expected to contribute in the various areas, which reduced the suicides, which give increased immunity from infectious diseases, which give a crash to reduce accidents caused by negligence, which improve the safe operation of heavy vehicles in which a traffics accident incidence installed on the highest point, which improve the safety function on the 'safety way home' for the safety of the community, which due to fire gives alleviate the emotional anxiety of firefighters, which improve the environment for long-term control room working during decision making caused by natural disasters.

The Interactive Significance of Red in Film Color : Concentration and Diffusion (영화에서 빨강의 상호작용적 의미 : 집중과 확산)

  • Kim, Jong-Guk
    • Cartoon and Animation Studies
    • /
    • s.47
    • /
    • pp.241-271
    • /
    • 2017
  • Film color is equivalent to other elements of film, including narrative, and has a textual meaning according to the identity of expression. In general, red has a function of focusing attention, and the meaning derived from it is diffused. In the interaction of text and context, the function of concentration and the meaning of diffusion can be presented. The concept of concentration and diffusion is shaped by the relationship between independent colors, colors and other cinematic elements, and interactions between colors. In order to confirm this, this study analyzes a series of popular Korean films, how film colors interact, and in particular, the concentration function of red and the meaning of proliferation. The results of this study are as follows. First, in Korean popular films, at its most basic, red symbolizes a nation, a people, and a nation. The red of nationalism surrounding ethnicity, nationality and country visualizes ideology and conflict. The purpose of an individual or group, the relationship between the offender and the victim is mediated through red. The flag, the name tag, the costume appearing in the film are red. This can be seen in films such as Train to Busan, Assassination, Masquerade, Miracle in Cell No.7, Brotherhood of War, Northern Limit Line, Joint Security Area, Welcome to Dongmakgol, and May 18. Second, the red color attached to the female body fixes or strengthens socio-cultural sexuality and gender. The examples are films like Ode to My Father, The Thieves, The Host, Purpose Of Love, Sunny, Like A Virgin, Forbidden Quest, Untold Scandal, Bewitching Attraction, and Ssanghwajeom. Third, the blood red in Korean films is a visual device that directs magical horror, anger, and asceticism. Such films include The Neighbors, Bunshinsaba, R-Point, A Tale Of Two Sisters, Whispering Corridors, The Uninvited, Thirst, SECTOR 7, Asura:The City of Madness, The Tiger, Veteran, and so on. Fourth, red of tears constitutes the specific emotions such as a beautiful desire and a brilliant tragedy in films like King and The Clown, Oldboy, Memories of Murder, 26 Years, The Attorney, Unbowed, Sympathy For Lady Vengeance, Happy End, Punch, Calling, The Yellow Sea, and He's on Duty.

Location Analysis of A Collective Consumption Facility with GIS: The Location of Gu-Office and Its Administrative District in Ulsan, South Korea (GIS기법을 이용한 도시공공서비스 시설의 입지분석 -울산시 구 관할구역과 구청입지를 중심으로-)

  • Cho, Sung-Ho;Park, Soon-Ho
    • Journal of the Korean association of regional geographers
    • /
    • v.2 no.1
    • /
    • pp.69-85
    • /
    • 1996
  • This research adoptes a spatial analysis function of the Geographic Information System[GIS] to analyze the location and the service district of a collective consumption facility, to discover the optimal location, and to redefine the service district. The location and spatial district of a collective consumption facility strongly influences the quality of life of residents. This research studies administrative offices and districts, especially Gu-offices in Ulsan. Ulsan would be raised to the status of Kwangyokshi in 1997; so that, the status of four Gus would be changed from a general administration into a self-governing administration. The summary of this research focuses on five significant points. First, the districts of four Gus were strongly required to be redefined to obtain the maximization of the degree of potential development as well as of the efficiency and equity of administring services. The spatial range of residents in a Gu was not in accord with its administrative district. The administrative districts of four Gus in Ulsan were not balanced in terms of area and population, and the high degree of disparity among Gus existed the efficiency and equality of a collective consumption service. Second, the current gu-offices were located based on security of land and accessibility of a main route; so, there was difficult to find the creteria and the principles of selections of the location of Gu offices. The social disparity of an administrative service existed in the accessibility into Gu-offices. Third, the administrative districts of Gus were redefined with spatial analysis tool of ARC/INFO. It was recommended that Ulsan maintain four Gus under the condition of five Kwangyokshi in South Korea. The redefined districts of administration reduced the disparity among four Gus in terms of area and population. improved the degree of harmony between the spatial range of residents of Gus and the administrative district of Gus, and increased the efficiency and equity of administrative service. Fourth, within the redefined adminis trative district of a Gu, the centroid reduced the maximum distance and mean distance; so, the efficiency and equity of public service provided by the Gu-office were improved. Last, the spatial analysis function of GIS helped to select the optimal location and to delineate the district of public service with more speedly and objectively. The function of spatial analysis of GIS was very useful to minimize the conflict in the determination of the location of a collective consumption facility and of the service district. To improve location analysis with GIS. non-spatial data base such as budget, thought of residents, and development policy and program, should be constructed.

  • PDF

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

The Influence of Long-term Aerobic Dancing Exercise on the Body Composition, Fitness and Mental Function of the Elderly Women (장기간에 걸친 에어로빅 댄스운동이 고령 여성의 신체조성, 체력 및 심리적인 요인에 미치는 영향)

  • Yoon, Hyun-Jung
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.7
    • /
    • pp.375-384
    • /
    • 2019
  • The purpose of this study was to investigate the effects of long-term aerobic dancing exercise on body composition, physical fitness and mental function in older women over 70 years old. All subjects were limited to older women aged 70 to under 85. The experimental group performed aerobic exercise of 2-3 times a week for 9.2 ± 4.6 yrs, and the control group did not perform any regular exercise and spent 3-4 times a week mainly in the relaxing facility for older. As a results in this study, the weight, muscle mass and body fat percentage of the aerobic group were not significantly different from those of the control group, but there were significantly positive effects of aerobic group in visceral fat mass, abdominal obesity rate(%), body water content and systolic blood pressure(p < .05). In terms of physical fitness, Sit & reach, one-legged stand (right) and TUG of the aerobic group were significantly higher than those of the control group(p < .05), but there were no significant differences between two groups in the shoulder flexibilities and grip strength. MMSE as a cognitive function was not significantly different between the two groups, but GDS was significantly lower in the aerobic group than in the control group(p < .05). According to the correlation analysis between all variables and MMSE and GDS, MMSE was significantly inversely correlated with height (r = -0.425)(p < .05), and no correlation was detected with other variables. However, GDS have signitively negative correlations with resting heart rate(r = -0.464), sit & reach(r = -0.525) left(r = -0.491) and right grip strengths(r = -0.635) as well as positive correlation systolic blood pressure(r = 0.482) and TUG (r = 0.479), respectively(p < .05). In conclusion, long-term aerobic exercise of elderly women over 70 older had positive effects on variables related to metabolic disease (visceral fat and resting heart rate), silver fitness variables related to falls, and depression level in the elderly.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.