• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.035 seconds

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

A Legal Study on The Act Bill for Establishing The Game User Committee

  • Kyen, Seung-Yup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • In this paper, we suggest the Measures to improve the Act Bill for establishing the Game User Committee. The Act Bill has a lot of problems which are violations of criminal legalism due to unclear terms in administrative punishment and violations of The Human Right enjoying freedom of occupation and guaranting property due to not defining provisisons about The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions. also the duplicate regulations in the Act Bill disrupt game industry development. we have three results that were derived through analysis of Prior studies and precedents. The First is to define details of special reasons in enforcement ordinance and enforcement regulations. The Second is to define The Duty of Confidentiality or The Legal Fiction as Public Officials for Purposes of Applying Penalty Provisions in the act bill. The Third is to address managing the random reward items in the Game Rating and Administration Committee or is to give game user advance notice about the Comntent Dispute Mediation system.

A Study on the Intention to Use MyData Service based on Open Banking (오픈뱅킹 기반의 마이데이터 서비스 이용의도에 관한 연구)

  • Lee, Jongsub;Choi, Jaeseob;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.1-19
    • /
    • 2022
  • With the revision of the Credit Information Use and Protection Act in August 2020, the MyData service based on open banking policy will take effect in January 2022. Nonetheless, the previous studies focused on the legal system or security-related issues of such service. Therefore, this paper conducted an empirical study on financial consumers aged 20 or older nationwide to analyze the factors which influence the intention to use MyData services based on open banking. Five characteristics representing open banking-based MyData service were derived through prior research, and a research model that combined value-based adoption model and privacy calculus theory was presented. The proposed research model and the relationship of its variables was analyzed using a sample of 400 users that is randomly selected. The results of empirical analysis showed that personalization had the greatest influence on benefits and reliability on sacrifice among service characteristics. They also suggested that MyData operators should devote themselves to providing customized services optimized for customers and establishing trust relationships. It was confirmed that both usefulness and enjoyment had a great influence on perceived value, and in terms of sacrifice, the burden of financial costs had a greater influence than privacy concerns. This study is meaningful in that it explored the psychological propensity of financial consumers to identify service utilization factors and presented a new approach that can contribute to the successful settlement of the domestic MyData industry.

Comparison of Rating Methods by Disaster Indicators (사회재난 지표별 등급화 기법 비교: 가축질병을 중심으로)

  • Lee, Hyo Jin;Yun, Hong Sic;Han, Hak
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.319-328
    • /
    • 2021
  • Purpose: Recently, a large social disaster has called for the need to diagnose social disaster safety, and the Ministry of Public Administration and Security calculates and publishes regional safety ratings such as regional safety index and national safety diagnosis every year. The existing safety diagnosis system uses equal intervals or normal distribution to grade risk maps in a uniform manner. Method: However, the equidistant technique can objectively analyze risk ratings, but there is a limit to classifying risk ratings when the distribution is skewed to one side, and the z-score technique has a problem of losing credibility if the population does not follow a normal distribution. Because the distribution of statistical data varies from indicator to indicator, the most appropriate rating should be applied for each data distribution. Result: Therefore, in this paper, we analyze the data of disaster indicators and present a comparison and suitable method for traditional equidistant and natural brake techniques to proceed with optimized grading for each indicator. Conclusion: As a result, three of the six new indicators were applied differently from conventional grading techniques

Stacked Sparse Autoencoder-DeepCNN Model Trained on CICIDS2017 Dataset for Network Intrusion Detection (네트워크 침입 탐지를 위해 CICIDS2017 데이터셋으로 학습한 Stacked Sparse Autoencoder-DeepCNN 모델)

  • Lee, Jong-Hwa;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.24-34
    • /
    • 2021
  • Service providers using edge computing provide a high level of service. As a result, devices store important information in inner storage and have become a target of the latest cyberattacks, which are more difficult to detect. Although experts use a security system such as intrusion detection systems, the existing intrusion systems have low detection accuracy. Therefore, in this paper, we proposed a machine learning model for more accurate intrusion detections of devices in edge computing. The proposed model is a hybrid model that combines a stacked sparse autoencoder (SSAE) and a convolutional neural network (CNN) to extract important feature vectors from the input data using sparsity constraints. To find the optimal model, we compared and analyzed the performance as adjusting the sparsity coefficient of SSAE. As a result, the model showed the highest accuracy as a 96.9% using the sparsity constraints. Therefore, the model showed the highest performance when model trains only important features.

Assessment of public knowledge, perception, and acceptance of nuclear power in Bangladesh

  • Md Iqbal Hosan;Md Jafor Dewan;Md Hossain Sahadath;Debasish Roy;Drupada Roy
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1410-1419
    • /
    • 2023
  • Public perception plays a crucial role in the successful completion of a nuclear power project. As a newcomer country to nuclear power, there are lots of misconceptions among the Bangladeshi people about nuclear energy. Consequently, it is crucial to minimize all the doubts among mass people and build up their positive outlook toward nuclear power. This demands a comprehensive survey to figure out the public opinion, concerns, false impressions, and knowledge gap regarding nuclear power. In the present study, these issues were addressed by a survey that was responded to by 661 persons for the 24 survey questions. The questions were categorized based on information, knowledge, faith, benefit, awareness, and technology. Feedback and responders' basic demographic and socioeconomic information were collected from various locations in Bangladesh through online and in-person surveys. The responses were analyzed in both statistical and descriptive ways. Some of the feedback was found to vary with age, sex, and education level while others were quite independent of these parameters. It is found that socioeconomic development and energy security can be achieved by the inclusion of nuclear energy in the power system master plan of the country. However, huge knowledge gaps and misconceptions were found among the public regarding nuclear energy. As per feedback, political instability and corruption may affect the national nuclear power project in Bangladesh. Low faith in the existing rules & regulations for nuclear power programs was also observed. The result of this study will be handy to develop the communication and public awareness strategy for a successful nuclear power project in Bangladesh.

IoT botnet attack detection using deep autoencoder and artificial neural networks

  • Deris Stiawan;Susanto ;Abdi Bimantara;Mohd Yazid Idris;Rahmat Budiarto
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1310-1338
    • /
    • 2023
  • As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy. Botnet is one of the threats that dominate the attacks as it can easily compromise devices attached to an IoT networks/systems. The compromised devices will behave like the normal ones, thus it is difficult to recognize them. Several intelligent approaches have been introduced to improve the detection accuracy of this type of cyber-attack, including deep learning and machine learning techniques. Moreover, dimensionality reduction methods are implemented during the preprocessing stage. This research work proposes deep Autoencoder dimensionality reduction method combined with Artificial Neural Network (ANN) classifier as botnet detection system for IoT networks/systems. Experiments were carried out using 3- layer, 4-layer and 5-layer pre-processing data from the MedBIoT dataset. Experimental results show that using a 5-layer Autoencoder has better results, with details of accuracy value of 99.72%, Precision of 99.82%, Sensitivity of 99.82%, Specificity of 99.31%, and F1-score value of 99.82%. On the other hand, the 5-layer Autoencoder model succeeded in reducing the dataset size from 152 MB to 12.6 MB (equivalent to a reduction of 91.2%). Besides that, experiments on the N_BaIoT dataset also have a very high level of accuracy, up to 99.99%.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Research on Object Detection Library Utilizing Spatial Mapping Function Between Stream Data In 3D Data-Based Area (3D 데이터 기반 영역의 stream data간 공간 mapping 기능 활용 객체 검출 라이브러리에 대한 연구)

  • Gyeong-Hyu Seok;So-Haeng Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.551-562
    • /
    • 2024
  • This study relates to a method and device for extracting and tracking moving objects. In particular, objects are extracted using different images between adjacent images, and the location information of the extracted object is continuously transmitted to provide accurate location information of at least one moving object. It relates to a method and device for extracting and tracking moving objects based on tracking moving objects. People tracking, which started as an expression of the interaction between people and computers, is used in many application fields such as robot learning, object counting, and surveillance systems. In particular, in the field of security systems, cameras are used to recognize and track people to automatically detect illegal activities. The importance of developing a surveillance system, that can detect, is increasing day by day.

A Study of Institutional Improvements for Responding to Electric Vehicle Fires: Focusing on the Case of Seoul (전기자동차 화재 대응을 위한 제도적 개선 방안 연구: 서울시 사례를 중심으로)

  • Nam-Kwun Park;Seung-Hee Ham
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.32-39
    • /
    • 2024
  • Purpose and Method: This study aims to suggest institutional improvements to enhance the response to electric vehicle fires. To this end, we examined the prevalence of electric vehicles, fires, and related legal systems in Seoul. Results: The top-level laws and ordinances related to electric vehicles are centered on distribution policies, so there is no practical fire response plan for electric vehicle fires. In order to apply the same regulations to each local government, it is necessary to set standards and establish a system for firefighting and safety facilities in higher laws. Conclusion: Establishing standards for the installation of fire and safety facilities that take into account the characteristics of electric vehicle fires and improving related systems will ultimately lead to an increase in the penetration rate of electric vehicles.