• Title/Summary/Keyword: 네트워크 위험도

Search Result 710, Processing Time 0.037 seconds

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Vector and Thickness Based Learning Augmentation Method for Efficiently Collecting Concrete Crack Images

  • Jong-Hyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.65-73
    • /
    • 2023
  • In this paper, we propose a data augmentation method based on CNN(Convolutional Neural Network) learning for efficiently obtaining concrete crack image datasets. Real concrete crack images are not only difficult to obtain due to their unstructured shape and complex patterns, but also may be exposed to dangerous situations when acquiring data. In this paper, we solve the problem of collecting datasets exposed to such situations efficiently in terms of cost and time by using vector and thickness-based data augmentation techniques. To demonstrate the effectiveness of the proposed method, experiments were conducted in various scenes using U-Net-based crack detection, and the performance was improved in all scenes when measured by IoU accuracy. When the concrete crack data was not augmented, the percentage of incorrect predictions was about 25%, but when the data was augmented by our method, the percentage of incorrect predictions was reduced to 3%.

A study on research trends for pregnancy in adolescence: Focusing on text network analysis and topic modeling (청소년 임신에 대한 연구 동향 분석: 텍스트 네트워크 분석과 토픽 모델링)

  • Park, Seungmi;Kwak, Eunju;Park, Hye Ok;Hong, Jung Eun
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.30 no.2
    • /
    • pp.149-159
    • /
    • 2024
  • Purpose: The aim of this study was to identify core keywords and topic groups in the "adolescent pregnancy" field of research for a better understanding of research trends in the past 10 years. Methods: Topics related to adolescent pregnancy were extracted from 3,819 articles that were published in journals between January 2013 and July 2023. Abstracts were retrieved from five databases (MEDLINE, CINAHL, Embase, RISS, and KISS). Keywords were extracted from the abstracts and cleaned using semantic morphemes. Text network analysis and topic modeling were performed using NetMiner 4.3.3. Results: The most important keywords were "health," "woman," "risk," "group," "girl," "school," "service," "family," "program," and "contraception." Five topic groups were identified through topic modeling. Through the topic modeling analysis, five themes were derived: "health service," "community program for school girls," "risks for adult women," "relationship risks," and "sexual contraceptive knowledge." Conclusion: This study utilized text network analysis and topic modeling to analyze keywords from abstracts of research conducted over the past decade on adolescent pregnancy. Given that adolescent pregnancy leads to physical, mental, social, and economic issues, it is imperative to provide integrated intervention programs, including prenatal/postnatal care, psychological services, proper contraception methods, and sex education, through school and community partnerships, as well as related research studies. Nurses can play a vital role by actively engaging in prevention efforts and directly supporting and educating socially disadvantaged adolescent mothers, which could significantly contribute to improving their quality of life.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

Application of Radiofrequency Ablation to Thyroid Cancer: Past, Present, and Future (갑상선암에 대한 고주파 절제 적용의 과거, 현재, 그리고 미래)

  • Ji-hoon Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.84 no.5
    • /
    • pp.999-1008
    • /
    • 2023
  • Thyroid cancer, characterized by high incidence rates, good prognosis, and frequent recurrence, is typically treated surgically. However, since the early 2000s, radiofrequency ablation, which is commonly utilized in liver, lung, and kidney cancers, is being performed for management of primary and recurrent thyroid cancers. Many studies have focused on inoperable cases of low-risk papillary microcarcinoma (≤ 1 cm) and some have investigated its role in larger lesions (up to 4 cm). Overall, these studies have reported positive results. Radiofrequency ablation for recurrent cancer has primarily been performed for locally recurrent cervical cancer, and this therapeutic approach has been attempted for treatment of distant metastases in lungs and bones, with encouraging outcomes. A growing global trend, particularly in South Korea, the United States, and Europe supports radiofrequency ablation for thyroid cancer. However, this therapy is currently not recognized as a treatment option recommended by universally accepted clinical guidelines such as those established by the National Comprehensive Cancer Network. Based on past efforts and future research, radiofrequency ablation is expected to play a key role in thyroid cancer treatment in the near future.

A Study on the Influence of Entrepreneurship and Start-Up Competency on Entrepreneurial Satisfaction: Focusing on the Moderating Effect of Flow Experience (창업가정신, 창업역량이 창업만족도에 미치는 영향에 관한 연구: 플로우(Flow)경험의 조절효과를 중심으로)

  • Lee, Sang Hwa;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.137-150
    • /
    • 2015
  • This study investigated the influence of Entrepreneurship, Start-up Competency on Entrepreneurial Satisfaction and the moderating effect of Flow experience. The goal of this investigation is to empirically prove that despite the benefits of educational and financial support, mentoring and consulting which selected applicants received as a part of supporting business for start-up companies provided by national and local government and public organizations, there is a gap between individual entrepreneurs' satisfaction after actual foundation of the company. For the purpose of this investigation, data was collected through a survey with 320 entrepreneurs who were beneficiaries of government's supporting business for start-up companies and have founded their companies less than 5 years ago. For entrepreneurship variables, three factors of innovativeness, proactiveness and risk-taking were reviewed, and also reviewed the three variables network capability, market orientation and marketing capacity as Start-up competency. The collected data was used to perform a multiple regression analysis, and the moderating effect of flow experience was analysed using moderated regression analysis. The result of analysis shows that innovativeness, proactiveness and risk-taking of entrepreneurship positively affected the entrepreneurial satisfaction, and network capability, market orientation and marketing capability also positively affected the entrepreneurial satisfaction. As a result of analysing the moderating effect of flow experience, it appeared that there is a positive moderating effect between entrepreneurship, start-up competency, and the entrepreneurial satisfaction. This result concludes that evaluation items of entrepreneurship and start-up competency as applicant selecting criteria in supporting business for start-up companies, are valid. It is also concluded that start-up supports such as education, funds and consulting are also important, but it is necessary to make changes such as construction of start-up ecosystem and reinforcement of networking support, so that entrepreneurs can have the flow experience themselves in the process after founding a company.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Literature Review on Applying Digital Therapeutic Art Therapy for Adolescent Substance Addiction Treatment (청소년 마약류 중독 치료를 위한 디지털치료제 예술치료 적용을 위한 문헌연구)

  • Jiwon Kim;Daniel H. Byun
    • Trans-
    • /
    • v.16
    • /
    • pp.1-31
    • /
    • 2024
  • The advent of digital media has facilitated easy access for adolescents to environments conducive to the purchase of narcotics. In particular, there's an increasing trend in the purchase and consumption of narcotics mediated through Social Network Services (SNS) and messenger services. Adolescents, sensitive to such environments, are at risk of experiencing neurological and mental health issues due to narcotic addiction, increasing their exposure to criminal activities, hence necessitating national-level management and support. Consequently, the quest for sustainable treatment methods for adolescents exposed to narcotics emerges as a critical challenge. In the context of high relapse rates in narcotic addiction, the necessity for cost-effective and user-friendly treatment programs is emphasized. This study conducts a literature review aimed at utilizing digital platforms to create an environment where adolescents can voluntarily participate, focusing on the development of therapeutic content through art. Specifically, it reviews societal perceptions and treatment statuses of adolescent drug addiction, analyzes the impact of narcotic addiction on adolescent brain activity and cognitive function degradation, and explores approaches for developing digital therapeutics to promote the rehabilitation of the addicted brain through analysis of precedential case studies. Moreover, the study investigates the benefits that the integration of digital therapeutic approaches and art therapy can provide in the treatment process and proposes the possibility of enhancing therapeutic effects through various treatment programs such as drama therapy, music therapy, and art therapy. The application of art therapy methods is anticipated to offer positive effects in terms of tool expansion, diversification of expression, data acquisition, and motivation. Through such approaches, an enhancement in the effectiveness of treatments for adolescent narcotic addiction is anticipated. Overall, this study undertakes foundational research for the development of digital therapeutics and related applications, offering economically viable and sustainable treatment options in consideration of the societal context of adolescent narcotic addiction.

Betweenness Centrality-based Evacuation Vulnerability Analysis for Subway Stations: Case Study on Gwanggyo Central Station (매개 중심성 기반 지하철 역사 재난 대피 취약성 분석: 광교중앙역 사례연구)

  • Jeong, Ji Won;Ahn, Seungjun;Yoo, Min-Taek
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.407-416
    • /
    • 2024
  • Over the past 20 years, there has been a rapid increase in the number and size of subway stations and underground structures worldwide, and the importance of safety for subway users has also continuously grown. Subway stations, due to their structural characteristics, have limited visibility and escape routes in disaster situations, posing a high risk of human casualties and economic losses. Therefore, an analysis of disaster vulnerabilities is essential not only for existing subway systems but also for deep underground facilities like GTX. This paper presents a case study applying a betweenness centrality-based disaster vulnerability analysis framework to the case of Gwanggyo Central Station. The analysis of Gwanggyo Central Station's base model and various disaster scenarios revealed that the betweenness centrality distribution is symmetrical, following the symmetrical spatial structure of the station, with high centrality concentrated in the central areas of basement levels one and two. These areas exhibited values more than 220% above the average, indicating a high likelihood of bottleneck phenomena during evacuation in disaster situations. To mitigate this vulnerability, scenarios were proposed to distribute evacuation flows concentrated in the central areas, enhancing the usability of peripheral areas as evacuation routes by connecting staircases continuously. This modification, when considered, showed a decrease in centrality concentration, confirming that the proposed addition of evacuation paths could effectively contribute to dispersing the flow of evacuation in Gwanggyo Central Station. This case study demonstrates the effectiveness of the proposed framework for assessing evacuation vulnerability in enhancing subway station user safety and can be effectively applied in disaster response and management plans for major underground facilities.

Types of Health Behavior Clusters and Related Factors among Korean Adults (우리나라 성인의 건강행태군집 유형과 관련요인)

  • Moon, Seongmi
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.397-410
    • /
    • 2014
  • This study sought to identify types of health behavior clusters among Korean adults and their related factors. A secondary analysis of 1,441 subjects, aged 19 to 64, in the 2009 Korean National Health and Nutrition Examination Survey (KNHANES IV-3) was conducted. A cluster analysis was used to identify types of clusters related to physical activity, smoking, and alcohol drinking. A complex samples chi square test and multivariate logistic regression were performed to analyze the associations between types of health behavior clusters and sample's characteristics using SPSS WIN 21. Five clusters were identified: health promotion, smoking, alcohol drinking, passive attitude, and risky behavior. The passive attitude cluster had the most subjects, with 47.7% of subjects as members. Socio-demographic factors, hypertension, and depressive symptoms were associated with membership in the alcohol drinking, smoking, passive attitude, or risky behavior cluster rather than the health promotion cluster. The findings of this study suggest that integrated health promotion programs incorporating multiple strategies need to be investigated. In addition, further studies should explore psychosocial factors that affect health behavior clusters, such as stress, self-efficacy, social support, and social networks.