• Title/Summary/Keyword: 과학기술정보서비스

Search Result 1,611, Processing Time 0.028 seconds

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process (AHP를 이용한 SNS 정보보호 위협요인 분석)

  • Sung, Ki-Hoon;Kong, Hee-Kyung;Kim, Tae-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.261-270
    • /
    • 2010
  • As the usage of social network service(SNS) increases recently, great attention has been shown to the information security in SNS. However, there has been little investment in SNS environment for security while preferential investment to attract subscribers has been made so far. Moreover, there is still a lack of confidence for investment effect and an absence of framework to analyze the threat factors of information security in SNS. In this paper, we propose to model for decision-making standard of SNS information security investment by the AHP. The result shows that 'service image' is the most important criterion for the decision of SNS information security. It also shows that 'Profile-squatting and reputation slander through ID thefts' and 'Corporate espionage' are important threat factors in SNS information security.

ICT Convergence Healthcare Services Status and Future Strategies (ICT융합 헬스케어 서비스 현황 및 발전전략)

  • Lee, Tae-Gyu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.10
    • /
    • pp.865-878
    • /
    • 2017
  • To realize the healthy life of human, mental, physical, and environmental factors must be managed continuously and stably. In order to manage human health, the 21st century healthcare field is essential ongoing interactions and convergence with ICT technologies. Such demands have created a convergence of technologies (fusion technology) in combination with the heterogeneous technologies. And, with the convergence of medical technology and ICT technologies, the development of personalized therapy environments is created. Advances in ICT-converged healthcare services are progressing due to the development of diverse wearable devices. Such ICT fusion system is exponentially increasing the complexity of the ICT convergence healthcare system and is resulting in various technical, institutional, environmental, and cultural issues. This study explores the status of developments in ICT healthcare technologies from the past to date, identifies major technology and policy issues to address these challenges. Finally it will recommend healthcare policies and a future road-map.

Two-phase Search Algorithm for Web Services Composition Redundanty (잉여 없는 웹 서비스 조합을 위한 2단계 탐색 알고리즘)

  • Kim, Hyeon-Ji;Kwon, Joon-Ho;Lee, Dae-Wook;Lee, Suk-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.123-138
    • /
    • 2009
  • In recent years, the web services composition search has become an issue of great interest. The web services composition search is the process of integrating individual web services to yield desired behavior. Through the web services composition search, more sophisticated functionalities can be provided. Current solutions can be classified into three main classes: forward chaining approach, backward chaining approach and two-phase approach. However one-way chaining approaches, such as forward chaining approach and backward chaining approach have limitations of searching irrelevant web services. And two-phase approach has limitations of including redundant web services. In this paper, we propose an unredundant web services composition search based on the two-phase algorithm. The algorithm consists of a forward phase and a backward phase. In the forward phase, the candidate web services participating composition will be found efficiently by searching the Link Index. In the backward phase, unredundant web services compositions will be generated from candidate web services by using the Token Manager. The experimental results show that our proposed algorithm is more efficient than one-way chaining approaches. The experimental results also show that our algorithm can provide more solutions than previous two-phase approach and is comparable to previous one in execution time.

Development of crop harvest prediction system architecture using IoT Sensing (IoT Sensing을 이용한 농작물 수확 시기 예측 시스템 아키텍처 개발)

  • Oh, Jung Won;Kim, Hangkon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.719-729
    • /
    • 2017
  • Recently, the field of agriculture has been gaining a new leap with the integration of ICT technology in agriculture. In particular, smart farms, which incorporate the Internet of Things (IoT) technology in agriculture, are in the spotlight. Smart farm technology collects and analyzes information such as temperature and humidity of the environment where crops are cultivated in real time using sensors to automatically control the devices necessary for harvesting crops in the control device, Environment. Although smart farm technology is paying attention as if it can solve everything, most of the research focuses only on increasing crop yields. This paper focuses on the development of a system architecture that can harvest high quality crops at the optimum stage rather than increase crop yields. In this paper, we have developed an architecture using apple trees as a sample and used the color information and weight information to predict the harvest time of apple trees. The simple board that collects color information and weight information and transmits it to the server side uses Arduino and adopts model-driven development (MDD) as development methodology. We have developed an architecture to provide services to PC users in the form of Web and to provide Smart Phone users with services in the form of hybrid apps. We also developed an architecture that uses beacon technology to provide orchestration information to users in real time.

Activation of Publishing Domestic SCIE Journals Based on the Situation Analysis (국내 SCIE 학술지의 출판 현황과 활성화에 관한 연구)

  • Shin, Eun-Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.157-178
    • /
    • 2011
  • In the field of science and technology, influential international journals can easily be found in SCIE. A total number of journals published by societies or institutes in Korea are only 82 of the 8,300 SCIE titles. In this study, in light of the SCI criteria the detailed analysis, of these journals was performed for Korean SCIE journals. The results show that in general domestic journals were not actively cited, had a low level of internationality, and user services through the website was insufficient. Korean SCIE journals should continue to complement these points and elevate its reputation. Candidate journals should concentrate on recruiting more excellent papers, promoting communication with foreign researchers, enhancing domestic and international public relations, and the like. To actively support the domestic publication of excellent journals, long-term and short-term measures should be established and consistently practiced at the national level.

Network Attack Detection based on Multiple Entropies (다중 엔트로피를 이용한 네트워크 공격 탐지)

  • Kim Min-Taek;Kwon Ki Hoon;Kim Sehun;Choi Young-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.71-77
    • /
    • 2006
  • Several network attacks, such as distributed denial of service (DDoS) attack, present a very serious threat to the stability of the internet. The threat posed by network attacks on large networks, such as the internet, demands effective detection method. Therefore, a simple intrusion detection system on large-scale backbone network is needed for the sake of real-time detection, preemption and detection efficiency. In this paper, in order to discriminate attack traffic from legitimate traffic on backbone links, we suggest a relatively simple statistical measure, entropy, which can track value frequency. Den is conspicuous distinction of entropy values between attack traffic and legitimate traffic. Therefore, we can identify what kind of attack it is as well as detecting the attack traffic using entropy value.

Detection of Individual Trees in Human Settlement Using Airborne LiDAR Data and Deep Learning-Based Urban Green Space Map (항공 라이다와 딥러닝 기반 도시 수목 면적 지도를 이용한 개별 도시 수목 탐지)

  • Yeonsu Lee ;Bokyung Son ;Jungho Im
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_4
    • /
    • pp.1145-1153
    • /
    • 2023
  • Urban trees play an important role in absorbing carbon dioxide from the atmosphere, improving air quality, mitigating the urban heat island effect, and providing ecosystem services. To effectively manage and conserve urban trees, accurate spatial information on their location, condition, species, and population is needed. In this study, we propose an algorithm that uses a high-resolution urban tree cover map constructed from deep learning approach to separate trees from the urban land surface and accurately detect tree locations through local maximum filtering. Instead of using a uniform filter size, we improved the tree detection performance by selecting the appropriate filter size according to the tree height in consideration of various urban growth environments. The research output, the location and height of individual trees in human settlement over Suwon, will serve as a basis for sustainable management of urban ecosystems and carbon reduction measures.

Deployment and Performance Analysis of Data Transfer Node Cluster for HPC Environment (HPC 환경을 위한 데이터 전송 노드 클러스터 구축 및 성능분석)

  • Hong, Wontaek;An, Dosik;Lee, Jaekook;Moon, Jeonghoon;Seok, Woojin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.197-206
    • /
    • 2020
  • Collaborative research in science applications based on HPC service needs rapid transfers of massive data between research colleagues over wide area network. With regard to this requirement, researches on enhancing data transfer performance between major superfacilities in the U.S. have been conducted recently. In this paper, we deploy multiple data transfer nodes(DTNs) over high-speed science networks in order to move rapidly large amounts of data in the parallel filesystem of KISTI's Nurion supercomputer, and perform transfer experiments between endpoints with approximately 130ms round trip time. We have shown the results of transfer throughput in different size file sets and compared them. In addition, it has been confirmed that the DTN cluster with three nodes can provide about 1.8 and 2.7 times higher transfer throughput than a single node in two types of concurrency and parallelism settings.

Challenges and Solutions of Electronic Journal Consortium (전자저널 컨소시엄의 당면과제와 해결방안 모색)

  • Kim, Sang-Jun
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.93-118
    • /
    • 2010
  • This study was aimed to establish a workable strategies to operate KESLI consortium reliably. To encourage the research purposes, it was mainly investigated international literature on current challenges for the e-journals consortium in comparison with the domestic implications. Major issues and challenges are divided to six items by scholarly communication changes and e-journals percentage increase, a big deal for a contract -based consortium pricing model in vogue, a consortium of the price hikes and making budget difficulties, use the standard statistics by the results of the use, archiving and archive security uncertainty, and contracts public availability of such external conditions. As a result, the international challenges of E-journals consortium was similar to KESLI, but the depth of information and research on domestic was weaker than the international research. To see more research and a rational perception based on scientific evidence and alternatives that enable KESLI working in the field was needed to be.