• Title/Summary/Keyword: 국가정보기반

Search Result 2,322, Processing Time 0.028 seconds

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Ensemble Learning-Based Prediction of Good Sellers in Overseas Sales of Domestic Books and Keyword Analysis of Reviews of the Good Sellers (앙상블 학습 기반 국내 도서의 해외 판매 굿셀러 예측 및 굿셀러 리뷰 키워드 분석)

  • Do Young Kim;Na Yeon Kim;Hyon Hee Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.173-178
    • /
    • 2023
  • As Korean literature spreads around the world, its position in the overseas publishing market has become important. As demand in the overseas publishing market continues to grow, it is essential to predict future book sales and analyze the characteristics of books that have been highly favored by overseas readers in the past. In this study, we proposed ensemble learning based prediction model and analyzed characteristics of the cumulative sales of more than 5,000 copies classified as good sellers published overseas over the past 5 years. We applied the five ensemble learning models, i.e., XGBoost, Gradient Boosting, Adaboost, LightGBM, and Random Forest, and compared them with other machine learning algorithms, i.e., Support Vector Machine, Logistic Regression, and Deep Learning. Our experimental results showed that the ensemble algorithm outperforms other approaches in troubleshooting imbalanced data. In particular, the LightGBM model obtained an AUC value of 99.86% which is the best prediction performance. Among the features used for prediction, the most important feature is the author's number of overseas publications, and the second important feature is publication in countries with the largest publication market size. The number of evaluation participants is also an important feature. In addition, text mining was performed on the four book reviews that sold the most among good-selling books. Many reviews were interested in stories, characters, and writers and it seems that support for translation is needed as many of the keywords of "translation" appear in low-rated reviews.

A Study on Research Data Management Methods for Government-funded Research Institutes in the Field of Science and Technology (과학기술분야 정부출연연구기관 연구데이터 관리 방안 연구)

  • Na-eun Han;Jung-Ho Um;Hyung-Jun Yim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.151-175
    • /
    • 2024
  • This study analyzes the current status of research data management at NST-affiliated government-funded research institutes for the purpose of promoting the sharing and use of research data, and based on this, suggests methods for establishing a research data sharing and management system. The survey on the status of research data management was conducted twice in 2022 and 2023 for a total of 20 research institutes. In addition, difficulties and areas that need to be improved in the management and sharing of research data were identified, and based on this, methods for establishing a research data sharing and management system were proposed by dividing them into policy aspects, system aspects, and linkage system construction aspects. In order to establish a research data sharing system, it would be desirable to prepare a policy basis and present contents such as the definition of research data, scope of application, contents of management, utilization method, and leading institutes. In addition, for systematic and unified research data management, it would be recommended that each institute will establish and manage a repository and management system. By linking this with DataON, the national research data platform, and providing one-stop services, the accessibility and usability of data will be improved.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

The Change of Korean Newspaper Editorials on the Ruling Policies of Imperialist Japan in Colonial Korea : Focused on the Last Period of Japanese Occupation in Korea (일제의 지배정책에 대한 신문들의 논조 변화 : 일제 말기($1937{\sim}1940$)를 중심으로)

  • Park, Yong-Gyu
    • Korean journal of communication and information
    • /
    • v.28
    • /
    • pp.111-140
    • /
    • 2005
  • Most of studies on the press during the period of Japanese occupation in Korea have focused on the activities of newspapers in 1920s. These past studies didn't examine the whole process of change of the press under the Japanese occupation in Korea. Thus, this study tried to investigate the change of the tenor of Korean newspaper editorials on the ruling policies during the end of the colonial period in Korea as a part of attempts exceeding the limit of past studies. After the outbreak of the war between China and Japan in 1937, the Korean newspapers were full of stereotyped editorials resembling in a way official gazette. Dong-A Ilbo and Cho-Sun Ilbo represented the purpose of the war was to emancipate Asian countries from Western imperialist countries and to establish the peace of the Asia. Simultaneously, two newspapers played an important role in assimilating the Korean people into the Japanese and mobilizing them to the war, The tenor of these editorials was affected by intensified control over the press and the change of the consciousness of journalists. In conclusion, these newspapers had a harmful influence on the Korean people as a weapon to the movement to organize and mobilize them. Therefore the interest for researching on the pro-Japanese press should be taken in view of 'resistance' and 'collaboration.'

  • PDF

A Study on the Possibility for Incident Investigation Using PLC Logs (PLC 로그의 사고조사 활용 가능성에 관한 연구)

  • Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.745-756
    • /
    • 2020
  • An ICS(industrial control system) is a complex system that safely and efficiently monitors and controls industrial processes such as electric power, water treatment, transportation, automation plants and chemical plants. Because successful cyber attacks targeting ICS can lead to casualties or serious economic losses, it becomes a prime target of hacker groups sponsored by national state. Cyber campaigns such as Stuxnet, Industroyer and TRITON are real examples of successful ICS attacks, and were developed based on the deep knowledge of the target ICS. Therefore, for incident investigation of ICSs, inspectors also need knowledge of control processes and accident investigation techniques specialized for ICSs. Because there is no applicable technology, it is especially necessary to develop techniques and tools for embedded controllers located at cyber and physical boundaries. As the first step in this research, we reviewed logging capability of 4 PLC(Programmable Logic Controller)s widely used in an ICS area, and checked whether selected PLCs generate logs that can be used for digital investigation in the proposed cyber attack scenario.

Green Exhibition and Convention Property are Impact on the Participant Satisfaction and the Performance of Participating Companies (그린전시컨벤션 속성이 참가자의 만족도와 참가업체의 성과에 미치는 영향)

  • Joo, Seok-Yeong;Jeon, In-Oh
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.198-215
    • /
    • 2012
  • Green Exhibition and Convention property of the participant satisfaction and impact on the performance of participating companies by looking out for the future development of the national economy on the local economy and help the continued growth of the Green Exhibition and Convention that will help to provide basic data for the purpose of. The results of this study participated in the Green Exhibition and Convention on the expectation of fame exhibit variable, based on the venue, the exhibition publicity, Green Exhibition and Convention Services, Green Exhibition and Convention facilities, information, PC communication or the Internet web site, information, and with the encouragement of those around these parameters and variables of trust as being based on the venue, the exhibition publicity, Green exhibition and Convention Services, Convention and Exhibition as being green in order to increase its influence on expectations and confidence to increase the satisfaction of the variable parameters should be of the utmost importance. Participants to meet the expectations of the variables in the Exhibition, Exhibition of trust, sex, male and recommendation showed by influence. This is an important variable affecting showed. Satisfaction of participants and exhibitors were on.

A Study on ICT Competency of Preliminary Teachers Based on PISA 2015 Data (PISA 2015 데이터를 기반으로 예비 교사들의 ICT 능력에 대한 연구)

  • Kim, Kapsu;Min, Meekyung
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.2
    • /
    • pp.239-249
    • /
    • 2018
  • Software education will be implemented in elementary schools in Korea since 2019. Although 17 hours of software education is provided, it is necessary for preliminary teachers to have basic ICT skills in training software education. Therefore, it is necessary to objectively compare the basic ICT literacy of preliminary teachers in Korea. This study examines the ICT of preliminary teachers based on the OECD PISA 2015 questionnaires. The contents of the survey compares and analyzes ICT availability and usability items of students. Comparisons are made with students from OECD countries. ICT usability at school was the highest at 2.56, followed by ICT availability at school at 2.4. The third was high at 2.38 for using school works outside the school. Availability outside the school was low at 2.33, and the lowest at school was very low at 1.79. It is necessary for the preliminary teachers to have the ICT ability for the students who will be the protagonists of the future society and the ICT education which can be utilized in each subject in addition to the ICT education in the curriculum of the education college in order to raise the ability.

The government role in digital era innovation: the case of electronic authentication policy in Korea (디지털 혁신시대의 정부역할: 한국의 전자 인증정책 사례)

  • Son, Wonbae;Park, Mun-su
    • International Commerce and Information Review
    • /
    • v.19 no.4
    • /
    • pp.29-50
    • /
    • 2017
  • In emerging technologies, innovation processes are dynamic in that the government needs to regularly review its policies to resonate with rapid technological advancements, changing public needs, and evolving global trends. In the 1990s, the Internet grew at an explosive rate, but many applications were constrained due to security concerns. Public Key Infrastructure (PKI) seemed to be the fundamental technology to address these concerns by providing security functions. As of 2017, PKI is still one of the best technologies for electronic authentication in an open network, but it is used only in limited areas: for user authentications in closed networks and for server authentications within network security infrastructure like SSL/TLS. The difference between expectation and reality of PKI usage is due to the evolution of the Internet along with the global adoption of new authentication policies under the Internet governance in the early 2000s. The new Internet governance based on the cooperation between multi-stakeholders is changing the way in which a government should act with regard to its technological policies. This paper analyzes different PKI policy approaches in the United States and Korea from the perspective of path-dependence theory. Their different policy results show evidence of the rise of the Internet governance, and may have important implications for policy-makers in the current global Internet society.

  • PDF

Design and Implementation of National Language Ability Test System using Korean Style Internet-Based Test added Middle-Server (미들서버방식 한국형 IBT를 이용한 국가언어능력평가 시스템의 설계 및 구현)

  • Chang, Young-Hyun;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.185-192
    • /
    • 2011
  • The purpose of this paper is to propose the design and implementation of a korean style internet-based test system on the basis of efficiency and stability for middle server. The current assessment system has some unstable elements with regard to transmission procedure, cost, system load and stability. This paper proposes a series of activities for the performance improvement of korean style internet-based test system which finally produced various excellent results in the administration of expense control, human resources, and special operational affairs. The proposed system's technological factors using middle server have been tested through a basic simulation pilot system. Actual development procedure starts from the analysis required by improving the shortcomings of existing internet-based test systems. A efficiency comparison with existing system and newly developed system was made in the area of number of operators, abnormal processing, system maintenances. Korean style internet-based test system using middle server has shown great efficiency increased to the maximum of 2 times about the effectiveness of processing for various parts. The korean style internet-based test system using middle server have been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.