• 제목/요약/키워드: Threat Level

검색결과 359건 처리시간 0.024초

인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 (Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process )

  • 고광수;조인준
    • 한국콘텐츠학회논문지
    • /
    • 제21권10호
    • /
    • pp.59-66
    • /
    • 2021
  • 본 논문에서는 통합보안관제에 인공지능 기술을 적용하고, 기존 보안관제와 인공지능 보안관제의 대응절차를 일원화한, 개선된 통합보안관제 절차를 새롭게 제안하였다. 현재의 사이버보안관제는 사람의 능력 수준에 의존도가 매우 높다. 그래서 사람에 의해 여러 이기종 장비에서 발생하는 다양한 로그를 분석하고, 급증하는 보안이벤트를 모두 분석·처리한다는 것은 사실상 무리가 있다. 그리고 문자열과 패턴 일치로 탐지하는 시그니처 기반의 보안장비는 APT(Advanced Persistent Threat)와 같은 고도화·지능화된 사이버공격을 정확히 탐지하기에 기능상 부족한 면이 있다. 이러한 문제들을 해결하기 위한 방안으로 인공지능 지도·비지도학습 기술을 사이버공격 탐지 및 분석에 적용하고, 이를 통해 수 없이 많이 발생하는 로그와 이벤트의 분석을 자동화하여, 고도화된 사이버공격의 지속적인 발생을 예측·차단할 수 있도록 하여 전반적인 측면에서 대응수준을 높였다. 그리고 보안관제에 인공지능 기술을 적용한 후 AI와 SIEM의 중복 탐지 등의 문제점을 일원화 된 침해대응 프로세스(절차)로 통합·해결함으로써 개선된 통합보안관제 서비스 모델을 새롭게 제안하였다.

다문화 사회의 위협인식에 대한 영향요인: 한국인과 거주 외국인의 인식차이를 중심으로 (Factors Affecting the Threat Awareness of Multiculture Society: Focusing on the Differences in Perception of Koreans and Resident Foreigners in Korea)

  • 정하나
    • 한국사회정책
    • /
    • 제23권2호
    • /
    • pp.83-112
    • /
    • 2016
  • 한국사회에서 이주민의 증가는 서구 이민 국가에서 볼 수 있었던 인종, 문화적 다양성이 한국사회 전반에 나타나고 있음을 의미한다. 그동안 학계에서는 이러한 변화를 인지하고 관련 연구들을 지속적으로 시행해왔다. 그러나 점차 이주민이 확대되고 세분화되면서 주류 집단인 한국인들과 함께 이주민들에 대한 논의가 필요하다. 또한 한국 사회가 인종적, 민족적으로 다양화 되는 것을 위협으로 받아들이는 인식이 있음에도 그동안의 연구는 반이주적정서에 대한 요인이 아닌 다문화 지향에만 초점을 맞춰온 경향이 적지 않아 위협에 대한 연구 역시 필요한 시점이다. 따라서 본 연구는 다문화를 위협으로 인지하는데 있어 이주민과 한국인을 비교분석하여 향후 다문화 사회에 맞는 정책방향을 제안하는 것을 목적으로 하였다. 선행 연구를 바탕으로 국민 정체성, 사회적 거리감, 차별인지 및 집단 편견으로 다문화 위협에 대한 한국인과 이주민의 인식지형을 파악하였다. 실증 분석 결과, 한국인과 이주민 사이의 인식차이는 존재하고 있으며 이에 대한 다른 정책 방향이 필요하다는 것이 밝혀졌다. 첫째, 한국인의 다문화 태도를 결정하는 것은 접촉경험이었다. 접촉경험의 영향력이 높다는 것은 다문화 사회를 당연시하게 받아들이고 있지만 실제 이주민을 접하는 경험이 낮아 접촉이 강화되었을 때 긍정적인 방향으로 전환시킬 수 있는 정책적 도구가 필요하다는 것이다. 둘째, 이주민들의 경우 자신들의 차별을 인정하지 않고 편견이 강화될수록 다문화를 위협으로 받아들이고 있었다. 이는 이들이 가진 이중정체성, 즉 한국인에 대해서는 외국인이지만 다른 외국인과 자신을 구별하는 경향이 나타나고 있는 것이다. 따라서 이들의 경우 한국 사회에서의 동화만이 대안이 아니며 자신들의 민족 정체성 강화를 위한 진정한 다문화 정책이 필요할 것으로 보인다. 이상의 결과가 갖는 함의를 심층적으로 논의하였다.

SWOT/AHP를 이용한 울산항의 전략적 발전방향에 관한 연구 (A Strategic Development of Ulsan Port Using SWOT/AHP Method)

  • 백인흠
    • 수산해양교육연구
    • /
    • 제21권2호
    • /
    • pp.325-334
    • /
    • 2009
  • The aims of this study is to suggest the strategic development plan of Ulsan Port using SWOT/AHP method. In order to do this, 16 detailed factors for SWOT Matrix were identified both from previous studies and from brainstorming professionals of the port and these made into a 3 level hierarchy structure. AHP method identified the relative weight of SWOT level as threat(0.311), opportunity(0.259), strength(0.218) and weakness(0.212), also the composite relative weight of detailed factors as recession of global economy(0.125), strengthening of economic function in port(0.085), insufficiency of port facilities(0.080) and a government regulation of port management(0.075). As a result, the study suggests S/T strategy, W/T strategy, S/O strategy, W/O strategy as a strategic development plan of the Ulsan Port.

Leq, Lr, TNI 평가법에 의한 부산시 주요 상가변의 소음도 분석 (An Analysis on Traffic Noise at Pusan Shopping Districts by Leq, Lr, TNI Ratings)

  • 한돈희
    • 한국환경보건학회지
    • /
    • 제16권1호
    • /
    • pp.9-19
    • /
    • 1990
  • To evaluate the degree of traffic noise at the main shopping districts, 30 sites, in Pusan and produce the basic data of traffic noise counterplan, this research was conducted. Noise rating methods utilized were Leq(equivalent continuous sound level), Lr (rating sound level) and TNI (traffic noise index). As the results, all sites passed beyond Korean Environmental Noise Standard 70 dB(A) in Leq and 46.7% sites fell under 'widespread complaints'step, 40.0% 'threat of community' action'step, 13.3% 'vigorous community action'step by Lr ratings, and 30.0% sites were over acceptable TNI criteria of 74. Therefore, traffic noise at Pusan shopping districts was very severe.

  • PDF

정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구 (A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage)

  • 고장혁;이동호
    • 디지털산업정보학회논문지
    • /
    • 제13권2호
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

Managing the Back-end of the Nuclear Fuel Cycle: Lessons for New and Emerging Nuclear Power Users From the United States, South Korea and Taiwan

  • Newman, Andrew
    • 방사성폐기물학회지
    • /
    • 제19권4호
    • /
    • pp.435-446
    • /
    • 2021
  • This article examines the consequences of a significant spent fuel management decision or event in the United States, South Korea and Taiwan. For the United States, it is the financial impact of the Department of Energy's inability to take possession of spent fuel from commercial nuclear power companies beginning in 1998 as directed by Congress. For South Korea, it is the potential financial and socioeconomic impact of the successful construction, licensing and operation of a low and intermediate level waste disposal facility on the siting of a spent fuel/high level waste repository. For Taiwan, it is the operational impact of the Kuosheng 1 reactor running out of space in its spent fuel pool. From these, it draws six broad lessons other countries new to, or preparing for, nuclear energy production might take from these experiences. These include conservative planning, treating the back-end of the fuel cycle holistically and building trust through a step-by-step approach to waste disposal.

E-Safety Awareness of Saudi Youths: A Comparative Study and Recommendations

  • Alharbi, Nawaf F;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah F
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.181-188
    • /
    • 2021
  • The use of the internet has become a basic need for many across the globe. The situation is very much the same for the youth in many countries like Saudi Arabia who have grown up surrounded and accessing the internet. This demographic, however, is at an increased risk of falling as victims to cybercrime because of a low level of technical awareness. This review looks at the level of technical awareness of internet use in 3 different countries which include the USA, South Africa, and New Zealand. The review will compare the situation in these nations with those in KSA. Based on the review and comparisons, recommendations are made for culturally and socially acceptable e-Safety awareness of Saudi youths.

AUTOMATIC DETECTION OF OIL SPILLS WITH LEVEL SET SEGMENTATION TECHNIQUE FROM REMOTELY SENSED IMAGERY

  • Konstantinos, Karantzalos;Demetre, Argialas
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2006년도 Proceedings of ISRS 2006 PORSEC Volume I
    • /
    • pp.126-129
    • /
    • 2006
  • The marine environment is under considerable threat from intentional or accidental oil spills, ballast water discharged, dredging and infilling for coastal development, and uncontrolled sewage and industrial wastewater discharges. Monitoring spills and illegal oil discharges is an important component in ensuring compliance with marine protection legislation and general protection of the coastal environments. For the monitoring task an image processing system is needed that can efficiently perform the detection and the tracking of oil spills and in this direction a significant amount of research work has taken place mainly with the use of radar (SAR) remote sensing data. In this paper the level set image segmentation technique was tested for the detection of oil spills. Level set allow the evolving curve to change topology (break and merge) and therefore boundaries of particularly intricate shapes can be extracted. Experimental results demonstrated that the level set segmentation can be used for the efficient detection and monitoring of oil spills, since the method coped with abrupt shape’s deformations and splits.

  • PDF

정성적 위험 분석을 위한 버디 시스템의 구조 분석 (The Architectural Analysis of the Buddy System for Qualitative Risk Analysis)

  • Jeongwon Yoon;Kim, Hong-Keun
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.51-58
    • /
    • 1995
  • The importance of the risk analysis tool has been recognized and its use also has been emphasized by a number of researchers recently The methodology were examined but neither algorithms nor practical applications have been implemented or practiced in Korea. In this paper, the architecture of the Buddy System, one of the automated risk assessment tools. is analyzed in depth to provide the algorithmic understanding and to promote the development of the risk analysis methodology. The Buddy System mainly uses three main factors of vulnerability, threat and countermeasures as a nucleus of the qualatative analysis with the modified loss expectancy value. These factors are identified and assessed by the separation of duties between the end user and security analyst. The Buddy System uses five axioms as its bases of assessment algorithm and the assessed vulnerability level is strictly within these axioms. Since the In-place countermeasures reduce the vulnerability level up to a certain level. the security analyst may use "what if " model to examine the impact of additional countermeasures by proposing each to reduce the vulnerability level further to within the acceptable range. The emphasis on the qualitative approach on vulnerability leveling is very well balanced with the quantitative analysis that the system performance is prominent.prominent.

  • PDF

HadGEM2-AO 기반의 빙상과 빙하에 의한 미래 해수면 변화 전망 (Projection of Future Sea Level Change Based on HadGEM2-AO Due to Ice-sheet and Glaciers)

  • 김영미;구태영;문혜진;최준태;변영화
    • 대기
    • /
    • 제29권4호
    • /
    • pp.367-380
    • /
    • 2019
  • Global warming causes various problems such as the increase of the sea surface temperature, the change of coastlines, ocean acidification and sea level rise. Sea level rise is an especially critical threat to coastal regions where massive population and infrastructure reside. Sea level change is affected by thermal expansion and mass increase. This study projected future sea level changes in the 21st century using the HadGEM2-AO with RCP8.5 scenario. In particular, sea level change due to water mass input from ice-sheets and glaciers melting is studied. Sea level based on surface mass balance of Greenland ice-sheet and Antarctica ice-sheet rose 0.045 m and -0.053 m over the period 1986~2005 to 2081~2100. During the same period, sea level owing to dynamical change on Greenland ice-sheet and Antarctica ice-sheet rose 0.055 m and 0.03 m, respectively. Additionally, glaciers melting results in 0.145 m sea level rise. Although most of the projected sea level changes from HadGEM2-AO are slightly smaller than those from 21 ensemble data of CMIP5, both results are significantly consistent each other within 90% uncertainty range of CMIP5.