• Title/Summary/Keyword: 기술 분류

Search Result 6,612, Processing Time 0.031 seconds

A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods (Office Open XML 문서 기반 악성코드 분석 및 탐지 방법에 대한 연구)

  • Lee, Deokkyu;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.429-442
    • /
    • 2020
  • The proportion of attacks via office documents is increasing in recent incidents. Although the security of office applications has been strengthened gradually, the attacks through the office documents are still effective due to the sophisticated use of social engineering techniques and advanced attack techniques. In this paper, we propose a method for detecting malicious OOXML(Office Open XML) documents and a framework for detection. To do this, malicious files used in the attack and benign files were collected from the malicious code repository and the search engine. By analyzing the malicious code types of collected files, we identified six "suspicious object" elements that are meaningful in determining whether they are malicious in a document. In addition, we implemented an OOXML document-based malware detection framework based on the detection method to classify the collected files and found that 98.45% of malicious filesets were detected.

3X Serial GF($2^m$) Multiplier Architecture on Polynomial Basis Finite Field (Polynomial basis 방식의 3배속 직렬 유한체 곱셈기)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.328-332
    • /
    • 2006
  • Efficient finite field operation in the elliptic curve (EC) public key cryptography algorithm, which attracts much of latest issues in the applications in information security, is very important. Traditional serial finite multipliers root from Mastrovito's serial multiplication architecture. In this paper, we adopt the polynomial basis and propose a new finite field multiplier, inducing numerical expressions which can be applied to exhibit 3 times as much performance as the Mastrovito's. We described the proposed multiplier with HDL to verify and evaluate as a proper hardware IP. HDL-implemented serial GF (Galois field) multiplier showed 3 times as fast speed as the traditional serial multiplier's adding only partial-sum block in the hardware. So far, there have been grossly 3 types of studies on GF($2^m$) multiplier architecture, such as serial multiplication, array multiplication, and hybrid multiplication. In this paper, we propose a novel approach on developing serial multiplier architecture based on Mastrovito's, by modifying the numerical formula of the polynomial-basis serial multiplication. The proposed multiplier architecture was described and implemented in HDL so that the novel architecture was simulated and verified in the level of hardware as well as software.

An Evaluation on Management Types by Characteristics of Urban Parks (도시공원 특성에 따른 관리유형의 평가)

  • Kim, Hyo-Jung;Kang, Eun-Jee;Cho, Joong-Hyun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.5
    • /
    • pp.21-30
    • /
    • 2010
  • The purpose of this study was to suggest customized management methods tailored to the characteristics of each type of park. Related literature was reviewed to determine the types of and management methods for urban parks to discuss the possibility of the involvement of citizens in park management and committing park management to the private sector. As a result of analyzing the literature, it has been found that each park should be managed separately according to its type in light of its characteristics and the strengths and weaknesses of each management method. For this reason, this must be a very important element for preventing damaging behavior at tourist destinations. First, natural mountainous parks are ordinary parks that do not require any professional management knowledge or skills. Accordingly, these parks should be managed by the districts in which they are located. Second, eco-oriented parks ask for specialized management. As domestic cases show, it will be advisable to commit the management of these parks to specialized, highly-experienced private organizations. Third, facilities-centered parks are large in size in response to the diverse needs of citizens, and it seems that a combination of different methods is better than merely sticking to any particular method.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Lambda Architecture Used Apache Kudu and Impala (Apache Kudu와 Impala를 활용한 Lambda Architecture 설계)

  • Hwang, Yun-Young;Lee, Pil-Won;Shin, Yong-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.207-212
    • /
    • 2020
  • The amount of data has increased significantly due to advances in technology, and various big data processing platforms are emerging, to handle it. Among them, the most widely used platform is Hadoop developed by the Apache Software Foundation, and Hadoop is also used in the IoT field. However, the existing Hadoop-based IoT sensor data collection and analysis environment has a problem of overloading the name node due to HDFS' Small File, which is Hadoop's core project, and it is impossible to update or delete the imported data. This paper uses Apache Kudu and Impala to design Lambda Architecture. The proposed Architecture classifies IoT sensor data into Cold-Data and Hot-Data, stores it in storage according to each personality, and uses Batch-View created through Batch and Real-time View generated through Apache Kudu and Impala to solve problems in the existing Hadoop-based IoT sensor data collection analysis environment and shorten the time users access to the analyzed data.

Modified HAZUS Method for Seismic Fragility Assessment of Domestic PSC-I Girder Bridges (PSC-I 거더교의 지진취약도 평가를 위한 HAZUS 방법의 국내 적용성 연구)

  • Seo, Hyeong-Yeol;Yi, Jin-Hak;Kim, Doo-Kie;Song, Jong-Keol
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.14 no.2
    • /
    • pp.161-170
    • /
    • 2010
  • To reduce the amount of seismic damage, several design codes are being improved considering the earthquake resistant systems, and many researches are being conducted to develop the earthquake damage evaluation techniques. This study develops the Korean seismic fragility function using the modified HAZUS method applicable to PSC-I girder bridges in Korea. The major coefficients are modified considering the difference between the seismic design levels of America and Korea. Seismic fragility function of the PSC-I girder bridge (one of the standard bridge types in Korea) is evaluated using two methods: numerical analysis and modified HAZUS method. The main coefficients are obtained about 70% of the proposed values in HAZUS. It is found that the seismic fragility function obtained using the modified HAZUS method closes to the fragility function obtained by conventional numerical analysis method.

A cell scheduling of a logically separated buffer in ATM switch (ATM 스위치에서 논리적으로 분할된 버퍼의 셀 스케쥴링)

  • 구창회;나지하;박권철;박광채
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1755-1764
    • /
    • 1997
  • In this paper, we proposed the mechanism for the buffer allocation and a cell scheduling method with logical separation a single buffer in the ATm switch, and analyzed the cell loss probability and the delay of each trafic (CBR/VBR/ABR) based on the weighted value and the dynamic cell service scheduling algorithm. The proposed switch buffering system classifies composite trafics incoming to the switch, according to the characteristic of traffic, then stores them in the logically separated buffers, and adopts the round-robin service with weighted value in order to transmit cells in buffers though one output port. We analyzed 4 cell service scheduling algorithms with dynamic round-robinfor each logically separated service line of a single buffer, in which buffers have the respective weighted values and 3 classes on mixed traffic which characteristized by traffic descriptor. In simulation, using SIMCRIPT II.5., we model the VBR and the ABR traffics as ON/OFF processes, and the CBR traffic as a Poisson processes. As the results of analysis according to the proposed buffer management mechanism and cell service algorithm, we have found that the required QoS of each VC can be quaranteed depends on a scale of weighted values allocated to buffers that changed the weighted values, and cell scheduling algorithm.

  • PDF

A study on the type analysis of design magazine through analyzing tool of Magazine Identity (매거진아이덴티티(Magazine Identity)분석툴을 통한 디자인잡지 유형분석연구)

  • 이나리;백진경
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.15-24
    • /
    • 2004
  • Information technology (IT) revolution rapidly advanced from the end of the 20th century has caused an extreme change in the publication market, which brought fierce struggle for existence. In this whirlpool, magazine, which is settling as a part of culture and as a center field of publication, presswork, is concentrating in making new determined position with comparatively liberal theme. So identity study that enables readers to remember a magazine more easily, will suggest a new direction of improvement as a culture business by inducing the brand-making of a magazine. This study is focused on the ability of configuration of its unique image of a magazine building an identity in the magazine design field. Each type of magazine has common characteristics but even though it is grouped into same type, it shows mobility on the relative importance of application according to the strategy of the magazine rather than matching perfectly to the type. The result is limited to the range of professional design magazine. However, through result-pursuing study procedure, it is anticipated of its gui dance of improvement of magazine design at large as well as professional design magazine by inquiring of consequence and utility of Magazine Identity in the digital age and clarifying the role of magazine design.

  • PDF

The Study on the Derivation of Performance Guidelines for Indoor·Outdoor Temporary Housing Facility (실내·외 임시주거시설의 성능 가이드라인 도출에 관한 연구)

  • Ju, Jaeseong;Park, Jiyong;Gwak, Donghwa;Park, Mijin
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.271-279
    • /
    • 2018
  • Purpose: This study is designed to develop performance guidelines for temporary residential facilities inside and outside the building to improve the residential habit of the victims caused by a disaster. Method: Performance items were set up by analyzing the disaster response system and prior study for eliciting performance guidelines and conducting field surveys of temporary housing facilities and interviews of temporary residential facilities for eliciting relevant performance guidelines. Results: The performance of temporary housing facilities in and out of the country was largely classified as technical, environmental and social, and each presented performance guidelines. The derived performance guidelines were generally similar, although some were similar due to indoor/outdoor characteristics. Conclusion: The performance guidelines presented in this study to improve the residential habit of the victims are applied in practice, and continuous improvement through feedback of results is required.

Evaluation of Discomfort Glare Indices in Office Lighting (사무실 조명에서의 Discomfort Glare 계산법 적용 및 평가)

  • Hur, Nam-Don;Kim, Hoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.6
    • /
    • pp.13-21
    • /
    • 2002
  • In the interior lighting, usually we refer to TAL and general lighting. The last one is that we generally adopt it in the interior lighting conditions. Here, glare is most important factor of them, especially in working place using VDT. Reference or development of estimation on glare has been studied in CIE, IESNA etc. and these of glare regulations now are applied differently in the interior lighting design or estimation on glare. But we have no glare regulation in detail, of course except G classification, which has limit of itself, so in my case it is impossible to apply in the interior lighting. On this paper, with some of main glare regulations in the world and our conditions in the interior lighting which are selected carefully, in an actual state it has been estimated So, it intended to blow which one is most suitable or what factors are considered of them, also show glare index which are appropriate to our interior lighting.