• 제목/요약/키워드: security-critical systems

검색결과 298건 처리시간 0.032초

누리온 슈퍼컴퓨팅서비스 네트워크에서 트래픽 및 공격 빈도 분석 (Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network)

  • 이재국;김성준;홍태영
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제9권5호
    • /
    • pp.113-120
    • /
    • 2020
  • 한국과학기술정보연구원은 대용량 데이터를 초고속으로 생산·처리·활용할 수 있는 국가슈퍼컴퓨팅시스템을 구축·운영하여 사용자(대학, 연구소, 정부 및 산하기관, 기업체 등)에게 HPC(High Performance Computing) 서비스를 제공하고 있다. 2019년 1월 1일 공식 서비스를 개시한 국가슈퍼컴퓨터 누리온은 한국과학기술정보연구원에서 5번째로 구축한 시스템으로 이론성능 25.7 페타플롭스를 갖는다. 시스템 운영자나 사용자의 관점에서 슈퍼컴퓨터의 사용 방법과 운영 방식을 이해하는 것은 매우 중요하다. 이를 이해하는 작업은 네트워크 트래픽을 모니터링하고 분석하는 것에서 시작된다. 본 논문에서는 누리온 시스템과 슈퍼컴퓨팅서비스 네트워크 및 보안 구성에 대하여 간략히 소개한다. 그리고 슈퍼컴퓨팅서비스 현황을 실시간으로 확인하기 위한 모니터링 체계를 기술하고 서비스를 시작하고 11개월(2019년 1월~11월) 동안 수집된 슈퍼컴퓨팅서비스 네트워크의 인바운드 및 아웃바운드 트래픽과 비정상행위(공격) 탐지 IP 개수에 대한 시계열 및 상관관계 분석을 수행한다.

고비도 공개키 암호화 프로세서에 적합한 이진 덧셈기의 구조 연구 (Design of a Binary Adder Structure Suitable for High-Security Public Key Cryptography Processor)

  • 문상국
    • 한국정보통신학회논문지
    • /
    • 제12권11호
    • /
    • pp.1976-1979
    • /
    • 2008
  • 현재까지 이진 덧셈기에 대한 연구는 다양한 방법으로 연구되었다. 비동기식 덧셈기들의 최악 지연시간과 평균 지연시간에 대한 연구에 의하면, 하이브리드 구조의 캐리선택 덧셈기가 리플캐리 덧셈기에 비해 32비트 비동기 MSC 프로세서에서 17%, 64비트 마이크로프로세서에서 23%의 성능 향상을 보였다. RSA와 같이 복잡하고 고성능의 연산을 필요로 하는 프로세서 시스템에서 는 가장 기본적인 연산을 수행하는 덧셈기에 대한 최적화가 필수적이다. 현재까지 다양한 구조와 여러 가지 방법으로 덧셈기에 대한 면적과 지연시간에 대한 연구는 덧셈 방식이나 덧셈기 구조에 대한 것이 대부분이었다. 본 논문에서는 자동 합성 측면에서 덧셈기의 성능을 분석하고 설계하였다. 덧셈기를 소그룹으로 나누어 각 소그룹에 대한 크기 차이와 합성 방법에 따라서 구현된 덧셈기들의 성능 및 소요면적을 분석하여 복잡한 대단위 연산을 요하는 공개키 암호화프로세서에 적합한 최적화된 덧셈기의 구조를 제안한다.

유비쿼터스 항만 물류 환경을 위한 스마트 태그 시스템의 설계 및 구현 (Design and Implementation of a Smart Tag System for Ubiquitous Port Logistics)

  • 조현태;백윤주
    • 한국정보통신학회논문지
    • /
    • 제11권8호
    • /
    • pp.1500-1510
    • /
    • 2007
  • 최근 물류의 양이 증가함에 따라 빠르고 정확한 물류처리가 요구되어 지고 있다. 특히, 광역 물류 환경에서 게이트웨이로서의 역활을 수행하는 항만에서의 물류처리는 무엇보다 중요하다. 본 논문에서는 항만에서 보다 신속, 정확한 물류 처리를 수행하기 위한 스마트 태그 시스템을 설계 및 구현한다. 스마트 태그 시스템은 사물의 정보를 인식하는 능동형 RFID, 컨테이너의 보안을 담당하는 전자봉인 장치, 그리고 사물의 위치를 파악 및 추적하는 RTLS 시스템으로 이루어져 있다. 물류 환경에서 사용되어는 인식 기술은 이종 시스템들에서 판독되어지므로 표준과의 호환성은 중요하다. 본 논문에서는 표준과의 호환성을 유지하는 방법을 소개하고 검증을 수행하였으며, 스마트 태그의 수명, 인식률 및 인식시간 등과 같은 시스템의 성능을 분석한다.

Occupational Health Protection for Health Workers in China With Lessons Learned From the UK: Qualitative Interview and Policy Analysis

  • Xu, Huan;Zhang, Min;Hudson, Alan
    • Safety and Health at Work
    • /
    • 제12권3호
    • /
    • pp.304-310
    • /
    • 2021
  • Background: Healthcare settings have been recognized among the most hazardous places to work. Based on the five categories of occupational hazards that were identified by the ILO and WHO, this study aimed to analyze policy framework relevant to occupational health protection of health workers (HWs) in public health service in China, then discussed how to share the experience of the National Health Service (NHS) England for improvement. Methods: Based on policy learning theories, policy analysis and qualitative interview were used in this study. Results: In the Chinese public health service, at least five laws related to the regulation of occupational health protection for HWs; however, enforcement of relevant laws was separated and multi-centered; the national monitoring system, which targeted to occupational hazards and health outcome for HWs in China, had yet to be developed; the top three priorities were workplace violence, bloodborne pathogens, and musculoskeletal disorders; national strategies included Security Hospital, and Healthy China 2030. In NHS England, three laws were fundamental; several monitoring systems had been set up, including NHS Staff Survey, Commissioning for Quality and Innovation incentive scheme; mental health, musculoskeletal problem, and nutrition disorder and overweight were raised great concern; Health and Safety, and NHS Healthy Workforce Program were critical nationwide strategies. Conclusion: There were several similarities as well as differences between the Chinese public health system and NHS England, which laid foundation of learning by China. Recommendations of improving occupational health policies in China were provided, based on the lessons learned from the NHS England.

합성곱 신경망을 활용한 군사용 CCTV 객체 인식 (Object Recognition Using Convolutional Neural Network in military CCTV)

  • 안진우;김도형;김재오
    • 한국시뮬레이션학회논문지
    • /
    • 제31권2호
    • /
    • pp.11-20
    • /
    • 2022
  • 병력감축 등 국방 및 안보환경의 변화에 따라 육군의 경계시스템에도 변화가 시급한 상황이다. 또한 경계작전의 특성상 인간의 실수가 번번이 발생하고 있으며 이러한 실수가 전체 경계작전의 실패로 귀결되는 상황은 경계시스템의 인공지능 도입이 필요한 것에 대한 중요한 이유이다. 본 연구의 목적은 합성곱 신경망 방법을 활용하여 군사용 CCTV에 적합한 인공지능 영상인식 시스템을 개발하는 것이다. 본 연구에서 개발한 시스템의 주요 특징은 먼저, 군사용 CCTV의 특징상 상대적으로 작은 객체를 인식해야하는 상황에 적합한 학습데이터를 활용한 것이다. 둘째, 학습용 데이터 셋에 대해 데이터 증강 알고리즘을 활용하여 군사용에 보다 적합하도록 유도한 것이다. 셋째, 군사용 영상의 위장, 악천후 등 상황을 고려하여 영상의 잡음을 개선하는 알고리즘을 적용하였다. 본 연구에서 제안하는 시스템의 성능 평가결과 객체의 인식능력이 기존 방법에 비해 우수함을 확인하였다.

제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용 (Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks)

  • 박서인;이지호;이승현;윤장혁;손창호
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

제어프로토콜 퍼징 기반 열차제어시스템 취약점 검출 기법 (Vulnerability Discovery Method Based on Control Protocol Fuzzing for a Railway SCADA System)

  • 김우년;장문수;서정택;김상욱
    • 한국통신학회논문지
    • /
    • 제39C권4호
    • /
    • pp.362-369
    • /
    • 2014
  • 열차전력원격감시제어시스템은 열차 운행에 필요한 전력을 공급하는 제어시스템이다. 열차전력원격감시제어시스템은 관제실에서 원격지의 RTU(Remote Terminal Unit) 장치에 제어명령을 내리면, RTU는 이를 해석하여 입출력 모듈을 제어하고, 각 입출력 모듈로부터 수집된 데이터는 사령실로 전송함으로써, 사령실에서 열차에 공급되는 전력 상태를 감시 및 제어하는 시스템이다. 본 논문은 열차전력원격감시제어시스템의 구성요소인 VxWorks 실시간 운영체제 기반의 RTU에서 동작하는 DNP3 제어프로토콜 통신 소프트웨어의 취약점을 검출하기 위한 퍼징 기술에 대하여 제안한다. VxWorks는 동작중인 프로세스의 상태를 감시하기 위한 모니터링 에이전트를 설치할 수 없기 때문에, 모니터링 에이전트 없이 프로세스의 상태 정보를 획득하기 위해서 VxWorks의 디버그 채널을 이용하였다. 또한 DNP3 제어프로토콜은 제어명령을 순서대로 전송하지 않을 경우 패킷을 무시하기 때문에 제어프로토콜 함수코드 순서를 고려한 퍼징을 수행하였다. 이러한 두 가지 기술을 이용하여 VxWorks 기반의 RTU에서 실행되는 DNP3 제어프로토콜 응용프로그램의 취약점을 시험할 수 있었다.

스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과 (An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness)

  • 한준형;강성배;문태수
    • Asia pacific journal of information systems
    • /
    • 제23권4호
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

프랜차이즈 시스템의 소유구조 결정요인: 이론과 증거 (Determinants of the Ownership Structure of Franchise Systems: Theory and Evidence)

  • 임영균;변숙은;오승수
    • 한국유통학회지:유통연구
    • /
    • 제16권3호
    • /
    • pp.33-75
    • /
    • 2011
  • 가맹본부는 자신의 전략적 선택에 의해 소유구조를 결정한다. 자원희소이론, 대리이론, 거래비용이론, 혼합소유이론 등 경제학과 경영학 분야의 다양한 이론은 가맹본부가 경제적 효율성을 높이고 수익 잠재력과 생존가능성을 극대화하기 위해 소유구조를 선택하는 것으로 보고 있다. 본 연구는 소유구조에 관한 다양한 이론을 가맹본부의 전략적 선택 관점에서 비교 설명하는 한편, 기존 이론에서 프랜차이즈 시스템의 소유구조를 결정하는 핵심변수로 다루어지고 있는 가맹본부의 역사, 규모, 거래특유투자, 불확실성, 위험공유성향 등이 직영점 비율에 미치는 영향이 이론에 따라 상이할 수 있음을 가설의 형태로 제시하고 이를 실증분석을 통해 검증하고 있다. 국내 543개 프랜차이즈 브랜드에 대한 정보공개서 자료 분석결과, 가맹본부의 존속기간, 종업원 수, 영업개시 소요기간, 가맹사업기간 역수, 로열티 부과여부는 직영점 비율과 긍정적 관계를 맺는 반면 총점포수와 가맹점의 지리적 분산도는 부정적인 관계를 맺는 것으로, 초기투자규모와 가맹계약기간 역수는 유의적인 관계를 맺지 않는 것으로 나타났다. 본 연구는 이러한 분석 결과를 토대로 프랜차이즈 시스템의 소유구조와 관련한 이론 및 방법론적 시사점을 제시하고 있다.

  • PDF