• Title/Summary/Keyword: 기술 분류

Search Result 6,612, Processing Time 0.029 seconds

Case Study of Building a Malicious Domain Detection Model Considering Human Habitual Characteristics: Focusing on LSTM-based Deep Learning Model (인간의 습관적 특성을 고려한 악성 도메인 탐지 모델 구축 사례: LSTM 기반 Deep Learning 모델 중심)

  • Jung Ju Won
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • This paper proposes a method for detecting malicious domains considering human habitual characteristics by building a Deep Learning model based on LSTM (Long Short-Term Memory). DGA (Domain Generation Algorithm) malicious domains exploit human habitual errors, resulting in severe security threats. The objective is to swiftly and accurately respond to changes in malicious domains and their evasion techniques through typosquatting to minimize security threats. The LSTM-based Deep Learning model automatically analyzes and categorizes generated domains as malicious or benign based on malware-specific features. As a result of evaluating the model's performance based on ROC curve and AUC accuracy, it demonstrated 99.21% superior detection accuracy. Not only can this model detect malicious domains in real-time, but it also holds potential applications across various cyber security domains. This paper proposes and explores a novel approach aimed at safeguarding users and fostering a secure cyber environment against cyber attacks.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

Leakage Detection Method in Water Pipe using Tree-based Boosting Algorithm (트리 기반 부스팅 알고리듬을 이용한 상수도관 누수 탐지 방법)

  • Jae-Heung Lee;Yunsung Oh;Junhyeok Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.17-23
    • /
    • 2024
  • Losses in domestic water supply due to leaks are very large, such as fractures and defects in pipelines. Therefore, preventive measures to prevent water leakage are necessary. We propose the development of a leakage detection sensor utilizing vibration sensors and present an optimal leakage detection algorithm leveraging artificial intelligence. Vibrational sound data acquired from water pipelines undergo a preprocessing stage using FFT (Fast Fourier Transform), followed by leakage classification using an optimized tree-based boosting algorithm. Applying this method to approximately 260,000 experimental data points from various real-world scenarios resulted in a 97% accuracy, a 4% improvement over existing SVM(Support Vector Machine) methods. The processing speed also increased approximately 80 times, confirming its suitability for edge device applications.

Factors Influencing the Academic Achievement of Student Workers (학습근로자의 학업성취도에 미치는 영향)

  • Jae Kyu Myung
    • Journal of Practical Engineering Education
    • /
    • v.16 no.2
    • /
    • pp.227-239
    • /
    • 2024
  • This study aims to analyze the impact of vocational training received by learning workers through the degree-linked work-study program on their learning outcomes. Specifically, we explore the causal relationship between various factors considered during university degree program admission and selection, and the average GPA (Grade Point Average) after admission. To achieve this, we conducted regression analysis and variance analysis using historical admission data and GPA records of 976 students from three undergraduate programs at a domestic K university that implements the degree-linked work-study model. Additionally, we included company information from publicly available databases that could potentially influence the academic performance of learning workers. Our analysis revealed significant causal relationships across various factors, including the classification of the high school attended, gender, family background, subject-specific grades in high school, duration of employment at the company, and age at the time of admission. Based on these findings, we anticipate that universities operating similar degree programs can enhance their selection procedures for learning workers. Furthermore, the results of this study can serve as foundational data for future policy recommendations related to degree-linked work-study programs.

Systematic Research on Privacy-Preserving Distributed Machine Learning (프라이버시를 보호하는 분산 기계 학습 연구 동향)

  • Min Seob Lee;Young Ah Shin;Ji Young Chun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.76-90
    • /
    • 2024
  • Although artificial intelligence (AI) can be utilized in various domains such as smart city, healthcare, it is limited due to concerns about the exposure of personal and sensitive information. In response, the concept of distributed machine learning has emerged, wherein learning occurs locally before training a global model, mitigating the concentration of data on a central server. However, overall learning phase in a collaborative way among multiple participants poses threats to data privacy. In this paper, we systematically analyzes recent trends in privacy protection within the realm of distributed machine learning, considering factors such as the presence of a central server, distribution environment of the training datasets, and performance variations among participants. In particular, we focus on key distributed machine learning techniques, including horizontal federated learning, vertical federated learning, and swarm learning. We examine privacy protection mechanisms within these techniques and explores potential directions for future research.

The Impacts of Carbon Taxes by Region and Industry in Korea: Focusing on Energy-burning Greenhouse Gas Emissions (탄소세 도입의 지역별 및 산업별 영향 분석: 에너지 연소 온실가스 배출량을 중심으로)

  • Jongwook Park
    • Environmental and Resource Economics Review
    • /
    • v.33 no.1
    • /
    • pp.87-112
    • /
    • 2024
  • This study estimates the regional input-output table and GHG emissions in 2019 and then analyzes the economic effects of carbon taxes by region and industry in Korea. The GHG emission, emission coefficient, and emission induction coefficient are estimated to be higher in manufacturing-oriented metropolitan provinces. The GHG emission coefficient in the same industry varies from region to region, which might reflect the standard of product classification, characteristics of production technology, and the regional differences in input structure. If a carbon tax is imposed, production costs are expected to increase and demand and production will decrease, especially in the manufacturing industry, which emits more GFG. On the other hand, the impact of carbon taxes on each region is not expected to vary significantly from region to region, which might be due to the fact that those differences are mitigated by industry-related effects. Since the impact of carbon taxes is expected to spread to the entire region, close cooperation between local governments is necessary in the process of implementing carbon neutrality in the future.

Lip-Synch System Optimization Using Class Dependent SCHMM (클래스 종속 반연속 HMM을 이용한 립싱크 시스템 최적화)

  • Lee, Sung-Hee;Park, Jun-Ho;Ko, Han-Seok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.7
    • /
    • pp.312-318
    • /
    • 2006
  • The conventional lip-synch system has a two-step process, speech segmentation and recognition. However, the difficulty of speech segmentation procedure and the inaccuracy of training data set due to the segmentation lead to a significant Performance degradation in the system. To cope with that, the connected vowel recognition method using Head-Body-Tail (HBT) model is proposed. The HBT model which is appropriate for handling relatively small sized vocabulary tasks reflects co-articulation effect efficiently. Moreover the 7 vowels are merged into 3 classes having similar lip shape while the system is optimized by employing a class dependent SCHMM structure. Additionally in both end sides of each word which has large variations, 8 components Gaussian mixture model is directly used to improve the ability of representation. Though the proposed method reveals similar performance with respect to the CHMM based on the HBT structure. the number of parameters is reduced by 33.92%. This reduction makes it a computationally efficient method enabling real time operation.

Detection Model of Fruit Epidermal Defects Using YOLOv3: A Case of Peach (YOLOv3을 이용한 과일표피 불량검출 모델: 복숭아 사례)

  • Hee Jun Lee;Won Seok Lee;In Hyeok Choi;Choong Kwon Lee
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.113-124
    • /
    • 2020
  • In the operation of farms, it is very important to evaluate the quality of harvested crops and to classify defective products. However, farmers have difficulty coping with the cost and time required for quality assessment due to insufficient capital and manpower. This study thus aims to detect defects by analyzing the epidermis of fruit using deep learning algorithm. We developed a model that can analyze the epidermis by applying YOLOv3 algorithm based on Region Convolutional Neural Network to video images of peach. A total of four classes were selected and trained. Through 97,600 epochs, a high performance detection model was obtained. The crop failure detection model proposed in this study can be used to automate the process of data collection, quality evaluation through analyzed data, and defect detection. In particular, we have developed an analytical model for peach, which is the most vulnerable to external wounds among crops, so it is expected to be applicable to other crops in farming.

Graph Neural Network and Reinforcement Learning based Optimal VNE Method in 5G and B5G Networks (5G 및 B5G 네트워크에서 그래프 신경망 및 강화학습 기반 최적의 VNE 기법)

  • Seok-Woo Park;Kang-Hyun Moon;Kyung-Taek Chung;In-Ho Ra
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.113-124
    • /
    • 2023
  • With the advent of 5G and B5G (Beyond 5G) networks, network virtualization technology that can overcome the limitations of existing networks is attracting attention. The purpose of network virtualization is to provide solutions for efficient network resource utilization and various services. Existing heuristic-based VNE (Virtual Network Embedding) techniques have been studied, but the flexibility is limited. Therefore, in this paper, we propose a GNN-based network slicing classification scheme to meet various service requirements and a RL-based VNE scheme for optimal resource allocation. The proposed method performs optimal VNE using an Actor-Critic network. Finally, to evaluate the performance of the proposed technique, we compare it with Node Rank, MCST-VNE, and GCN-VNE techniques. Through performance analysis, it was shown that the GNN and RL-based VNE techniques are better than the existing techniques in terms of acceptance rate and resource efficiency.

Normal Anatomy of Cranial Nerves III-XII on Magnetic Resonance Imaging (뇌신경 III-XII의 정상 자기공명영상 소견)

  • Hyung-Jin Kim;Minjung Seong;Yikyung Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.81 no.3
    • /
    • pp.501-529
    • /
    • 2020
  • Because of the inherent complex anatomy and functional arrangement of the cranial nerves (CNs), neuroimaging of cranial neuropathy is challenging. With recent advances in magnetic resonance imaging (MRI) techniques, the cause of cranial neuropathy can now be detected in many cases. As an active multidisciplinary team member of cranial neuropathy, it is essential for the neuroradiologist to be familiar with the detailed anatomy of the CNs on MRI. This review contains the basic MRI anatomy of CNs III-XII according to a segmental classification from the brain stem to the extracranial region. The optimal imaging options to best evaluate the specific segment of the CNs will also be discussed briefly.