• Title/Summary/Keyword: 네트워크 성능 분석

Search Result 2,891, Processing Time 0.03 seconds

Abnormal Data Augmentation Method Using Perturbation Based on Hypersphere for Semi-Supervised Anomaly Detection (준 지도 이상 탐지 기법의 성능 향상을 위한 섭동을 활용한 초구 기반 비정상 데이터 증강 기법)

  • Jung, Byeonggil;Kwon, Junhyung;Min, Dongjun;Lee, Sangkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.647-660
    • /
    • 2022
  • Recent works demonstrate that the semi-supervised anomaly detection method functions quite well in the environment with normal data and some anomalous data. However, abnormal data shortages can occur in an environment where it is difficult to reserve anomalous data, such as an unknown attack in the cyber security fields. In this paper, we propose ADA-PH(Abnormal Data Augmentation Method using Perturbation based on Hypersphere), a novel anomalous data augmentation method that is applicable in an environment where abnormal data is insufficient to secure the performance of the semi-supervised anomaly detection method. ADA-PH generates abnormal data by perturbing samples located relatively far from the center of the hypersphere. With the network intrusion detection datasets where abnormal data is rare, ADA-PH shows 23.63% higher AUC performance than anomaly detection without data augmentation and even performs better than the other augmentation methods. Also, we further conduct quantitative and qualitative analysis on whether generated abnormal data is anomalous.

Research on Urban Air Mobility Operations Optimization Research Trends (도심항공교통(Urban Air Mobility) 운영 최적화 연구 동향에 관한 연구)

  • Jibok Chung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.701-706
    • /
    • 2023
  • The Korean government and industry have presented a roadmap for the commercialization of UAM services and are promoting it in earnest. In order to introduce full-scale UAM services, there are various issues to be solved, such as the development of high-performance aircraft, the design of network bases and corridors, the optimization of operation management, and the establishment of related laws and systems. In this study, in terms of optimizing operation management, we will examine research trends by field, focusing on Korea, and derive research topics that need to be solved in the future. Korean researchers have suggested that research is centered on UAM service usage fees, usage intentions and acceptance models, and vertiport location selection, but operational optimization studies such as service order acceptance, aircraft repositioning, and battery charging and maintenance scheduling are needed in the future.

Systematic Literature Review of Smart Trade Contract Research (스마트 무역계약 연구의 체계적 문헌고찰)

  • Ho-Hyung Lee
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.243-262
    • /
    • 2023
  • This study provides a systematic review of smart trade contracts, examining the research trends and theoretical background of utilizing smart contracts and blockchain technology for the digitalization and automation of trade contracts. Smart trade contracts are a concept that applies the automated contract system based on blockchain to trade-related transactions. The study analyzes the technical and legal challenges and proposes solutions. The technical aspect covers the development of smart contract platforms, scalability and performance improvements of blockchain networks, and security and privacy concerns. The legal aspect addresses the legal enforceability of smart contracts, automatic execution of contract conditions, and the responsibilities and obligations of contract parties. Smart trade contracts have been found to have applications in various industries such as international trade, supply chain management, finance, insurance, and energy, contributing to the ease of trade finance, efficiency of supply chains, and business model innovation. However, challenges remain in terms of legal regulations, interaction with existing legal frameworks, and technological aspects. Further research is needed, including empirical studies, business model innovation, resolution of legal issues, security and privacy considerations, standardization and collaboration, and user experience studies to address these challenges and explore additional aspects of smart trade contracts.

Group Key Assignment Scheme based on Secret Sharing Scheme for Dynamic Swarm Unmanned Systems (동적 군집 무인체계를 위한 비밀분산법 기반의 그룹키 할당 기법)

  • Jongkwan Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.93-100
    • /
    • 2023
  • This paper presents a novel approach for assigning group keys within a dynamic swarm unmanned system environment. In this environment, multiple groups of unmanned systems have the flexibility to merge into a single group or a single unmanned system group can be subdivided into multiple groups. The proposed protocol encompasses two key steps: group key generation and sharing. The responsibility of generating the group key rests solely with the leader node of the group. The group's leader node employs a secret sharing scheme to fragment the group key into multiple fragments, which are subsequently transmitted. Nodes that receive these fragments reconstruct a fresh group key by combining their self-generated secret fragment with the fragment obtained from the leader node. Subsequently, they validate the integrity of the derived group key by employing the hash function. The efficacy of the proposed technique is ascertained through an exhaustive assessment of its security and communication efficiency. This analysis affirms its potential for robust application in forthcoming swarm unmanned system operations scenarios characterized by frequent network group modifications.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

A proposal on a proactive crawling approach with analysis of state-of-the-art web crawling algorithms (최신 웹 크롤링 알고리즘 분석 및 선제적인 크롤링 기법 제안)

  • Na, Chul-Won;On, Byung-Won
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.43-59
    • /
    • 2019
  • Today, with the spread of smartphones and the development of social networking services, structured and unstructured big data have stored exponentially. If we analyze them well, we will get useful information to be able to predict data for the future. Large amounts of data need to be collected first in order to analyze big data. The web is repository where these data are most stored. However, because the data size is large, there are also many data that have information that is not needed as much as there are data that have useful information. This has made it important to collect data efficiently, where data with unnecessary information is filtered and only collected data with useful information. Web crawlers cannot download all pages due to some constraints such as network bandwidth, operational time, and data storage. This is why we should avoid visiting many pages that are not relevant to what we want and download only important pages as soon as possible. This paper seeks to help resolve the above issues. First, We introduce basic web-crawling algorithms. For each algorithm, the time-complexity and pros and cons are described, and compared and analyzed. Next, we introduce the state-of-the-art web crawling algorithms that have improved the shortcomings of the basic web crawling algorithms. In addition, recent research trends show that the web crawling algorithms with special purposes such as collecting sentiment words are actively studied. We will one of the introduce Sentiment-aware web crawling techniques that is a proactive web crawling technique as a study of web crawling algorithms with special purpose. The result showed that the larger the data are, the higher the performance is and the more space is saved.

A Study on the Analysis of the Congestion Level of Tourist Sites and Visitors Characteristics Using SNS Data (SNS 데이터를 활용한 관광지 혼잡도 및 방문자 특성 분석에 관한 연구)

  • Lee, Sang Hoon;Kim, Su-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.13-24
    • /
    • 2022
  • SNS has become a very close service to our daily life. As marketing is done through SNS, places often called hot places are created, and users are flocking to these places. However, it is often crowded with a large number of people in a short period of time, resulting in a negative experience for both visitors and service providers. In order to improve this problem, it is necessary to recognize the congestion level, but the method to determine the congestion level in a specific area at an individual level is very limited. Therefore, in this study, we tried to propose a system that can identify the congestion level information and the characteristics of visitors to a specific tourist destination by using the data on the SNS. For this purpose, posting data uploaded by users and image analysis were used, and the performance of the proposed system was verified using the Naver DataLab system. As a result of comparative verification by selecting three places by type of tourist destination, the results calculated in this study and the congestion level provided by DataLab were found to be similar. In particular, this study is meaningful in that it provides a degree of congestion based on real data of users that is not dependent on a specific company or service.

Analysis of Deep Learning Research Trends Applied to Remote Sensing through Paper Review of Korean Domestic Journals (국내학회지 논문 리뷰를 통한 원격탐사 분야 딥러닝 연구 동향 분석)

  • Lee, Changhui;Yun, Yerin;Bae, Saejung;Eo, Yang Dam;Kim, Changjae;Shin, Sangho;Park, Soyoung;Han, Youkyung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.437-456
    • /
    • 2021
  • In the field of remote sensing in Korea, starting in 2017, deep learning has begun to show efficient research results compared to existing research methods. Currently, research is being conducted to apply deep learning in almost all fields of remote sensing, from image preprocessing to applications. To analyze the research trend of deep learning applied to the remote sensing field, Korean domestic journal papers, published until October 2021, related to deep learning applied to the remote sensing field were collected. Based on the collected 60 papers, research trend analysis was performed while focusing on deep learning network purpose, remote sensing application field, and remote sensing image acquisition platform. In addition, open source data that can be effectively used to build training data for performing deep learning were summarized in the paper. Through this study, we presented the problems that need to be solved in order for deep learning to be established in the remote sensing field. Moreover, we intended to provide help in finding research directions for researchers to apply deep learning technology into the remote sensing field in the future.

Design to Realtime Test Data Topic Utilize of Data Distribution Service (데이터 분산 서비스를 활용한 실시간 시험자료 토픽 설계)

  • Choi, Won-gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1447-1454
    • /
    • 2017
  • The realtime test data topic means that process for the data efficiently from many kinds of measurement device at the test range. There are many measurement devices in test range. The test range require accurate observation and determine on test object. In this realtime test data slaving framework system, the system can produce variety of test informations and all these data also must be transmitted to test information management or display system in realtime. Using RTI DDS(Data Distribution Service) middle ware Ver 5.2, we can product the efficiency of system usability and QoS(Quality of Service) requirements. So the application user enables to concentrate on applications, not middle ware. As the reason, Complex function is provided by the DDS, not the application such as Visualization Software. In this paper, I suggest the realtime test data topic on slaving framework of realtime test data based on DDS at the test range system.

An Adaptive USB(Universal Serial Bus) Protocol for Improving the Performance to Transmit/Receive Data (USB(Universal Serial Bus)의 데이터 송수신 성능향상을 위한 적응성 통신방식)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.327-332
    • /
    • 2004
  • USB(Universal Serial Bus) is one of the most popular communication interfaces. When USB is used in an extended range, especially configurating In-home network by connecting multiple digital devices each other, USB interface uses the bandwidth in the way of TDM(Time Division Multiplexing) so that the bottleneck of bus bandwidth can be brought. In this paper, the more effective usage of bus bandwidth to overcome this situation is introduced. Basically, in order to realize the system for transferring realtime moving picture data among digital information devices, we analyze USB transfer types and Descriptors and introduce the method to upgrade detailed performance of Isochronous transfer that is one of USB transfer types. In the case that Configuration descriptor of a device has Interface descriptor that has two AlternateSetting, if Isochronous transfers are not processed smoothly due to excessive bus traffic, the application of the device changes AlternateSetting of the Interface descriptor and requires a new configuration by SetInterface() request. As a result of this adaptive configuration, the least data frame rate is guaranteed to a device that the sufficient bandwidth is not alloted. And if the bus traffic is normal, the algorithm to return to the original AlteranteSetting is introduced. this introduced method resolve the bottleneck of moving picture transfer that can occur in home network connected by multiple digital devices.

  • PDF