• Title/Summary/Keyword: 네트워크 조직

Search Result 689, Processing Time 0.029 seconds

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Functional Understating of Fibroblastic Reticular Cell within Lymph Node Stroma (림프절 스토로마 내의 fibroblastic reticular cell의 기능 이해)

  • So, Deuk Won;Ryu, Sul Hwa;Lee, Jong-Hwan
    • Journal of Life Science
    • /
    • v.23 no.11
    • /
    • pp.1409-1414
    • /
    • 2013
  • Lymph node (LN) is the sites where mature lymphocytes become stimulated to respond to invading pathogens in the body. Lymphocytes screen the surfaces of pathogen-carrying antigen-presenting cells for cognate antigens, while moving along stromal structural back bone. Fibroblastic reticular cells (FRC) is stromal cell forming the 3 dimensional structure networks of the T cell rich zones in LN, and provide a guidance path for immigrating T lymphocytes. In these cooperative environments, the cell to cell bidirectional interactions between FRC and T cells in LN are therefore essential to the normal functioning of these tissues. Not only do FRCs physically construct LN architecture but they are essential for regulating T cell biology within these domains. FRC interact closely with T lymphocytes, is providing scaffolds, secreting soluble factors including cytokine in which FRCs influence T cell immune response. More recently, FRC have been found to induce peripheral T cell tolerance and regulate the extent to which newly activated T cells proliferate within LN. Thus, FRC-T cell crosstalk has important consequences for regulating immune cell function within LN. In addition, FRC have profound effects on innate immune response by secreting anti-microbial peptides and complement, etc in the inflammatory milieu. In summary, we propose a model in which FRC engage in a bidirectional touch to increase the T cell biological efficiency between FRC and T cells. This collaborative feedback loop may help to maintain tissue function during inflammation response.

Agile Framework for SOA-based Application Development (SOA 기반 애플리케이션 개발을 위한 Agile 프레임워크)

  • Shin, Seung-Woo;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.55-64
    • /
    • 2009
  • Various business model and computing environments are currently merged into web services and many web related application products are also develop. Most of IT enterprises in Korea use the Service-oriented architecture (SOA) whenever they develop the web applications. SOA is an approach to loosely coupled, protocol independent, standards-based distributed computing where software resources available on the network are considered as Services. SOA is believed to become the future enterprise technology solution that promises the agility and flexibility the business users have been looking for by leveraging the integration process through composition of the services spanning multiple enterprises. But, There are no specific development methodology to apply into SOA standard model until now. The developer uses the currently existing methodology to develop the application with SOA. The users have some limitations to use it. In this paper, we suggest a Frameworks for applying agile methodology into SOA to address the productivity and quality of small web related project. We design and implement a frameworks architecture for applying the agile method into SOA and describe the process model to implement it. We finally evaluate the frameworks with productivity, flexibility and maintainability.

A Study of Today's Concept and Application of the Principle of the Provenance in Archives management (출처주의의 새로운 경향과 적용에 관한 연구)

  • Bang, Hyo-Soon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.69-92
    • /
    • 2002
  • The objective of this study is to examine the re cent trend of the interpretation of the Principle of the Provenance in today s new environment of Archives Management and to identify the effective way of the application of the Principle of Provenance to Archives Management. Because of the continued change and the flexibility of the administrative organization and the development of information network, the traditional concept of the Principle of Provenance which put emphasis on a single creator and the physical entity of the archives has been gradually modified to a rather conceptual, abstract and realistic one. A method to apply the recent concept of the Principle of Provenance is to separate the descriptions of the record entity, the creators and the context and use the organic linkage of the separated description areas. Also we can control the provenance from the current stage or even from the pre-current stage by utilizing the classification scheme and the retention schedule. In case of the electronic records, we can manage the provenance and the context by using metadata inherent in the computerized information system. Above all it is critical that we need to structure and control the provenance by building the Korean rules for archival description corresponding to the international standards. And it is another an essential point that we have to develop a guideline for constructing the fond and maintaining its consistency.

An Experimental Study on the archiving of a village (마을 아카이빙 시론)

  • Kim, Ik-han
    • The Korean Journal of Archival Studies
    • /
    • no.26
    • /
    • pp.151-172
    • /
    • 2010
  • This study try to establish the method on the archiving of a village experimentally. For this study three standpoints were investigated. We discriminate between the theory and practice on general archives management and village archiving. We should grasp that the practice of village archiving is a means to the movement of village community reconstruction. And we clear up the point that village archiving head for the community ownership and the communication. This study clarified what were the constituent units in a village and what were the archives that were producted by the constituent units in a village. It is helpful for the development of the strategy on a village to identify concretely the objects of village archiving. The main body who lead the village archiving is not archivist only. But he should be a man who serve his community and have the competency to deal with archives professionally simultaneously. The suggestion of village archiving in this study has the meaning that Korean archivists should get over the model of elite so that seek after new way of the going down to the archiving fields. village, community, the ordinance for the reconstruct of the beautiful village community, activistic archivist, archiving movement going down to the village fields, archiving by participation of community.

Integrated Waterfront Cultural Planning through Regeneration of Former Industrial Harborfront (산업항만지역의 재생을 통한 워터프론트 문화도시 통합계획)

  • Lee, Kum-Jin
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.175-185
    • /
    • 2019
  • Purpose: The purpose of this study is to propose a direction planning integrated waterfront cultural city in terms of urban economic revitalization through regeneration of former industrial harborfront and the creation of cultural living spaces based on regional history in order to pursue urban activities. Method: Analyzing planning waterfront and historical cultural space based on MM21's development policy and strategy under the growth process and development of Yokohama. Results: MM21 is the core public project out of the six major projects promoted by Yokohama, which is on the brink of satellite cities for the expansion of Tokyo with a goal of qualitative transformation of former harbor. It is planned to be developed as a creative cultural waterfront city for an integrated urban development. Conclusion: Planning waterfront cultural city, which takes advantage of the former harbor city derived through MM21 analysis, provides the cityscape towards the sea and the port via the viewing point and opens the waterfront open to the port and the sea Space and Esplanade landscape development, preservation of historic buildings and cultural assets, recycling as cultural art space, waterfront space planning that cooperates with public culture art and pedestrian network.

The Influence of Open Innovation on Innovation Performance of SMEs : Estimation using the Three-step Least Squares method (개방형 혁신이 중소기업의 혁신성과에 미치는 영향 : 3단계 최소자승법을 이용한 추정)

  • Jeong, Myoung-Sun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.145-152
    • /
    • 2021
  • In this study, we have examined the effect of open innovation of SMEs on innovation performance of firms. Most studies do not consider internal generation in relation to open innovation and innovation performance.We conducted empirical studies to overcome this problem. The research was carried out by collecting data collected from 512 SMEs and the 3SLS method was used to minimize the internal generation. As a result, open innovation investment and use of external ideas among SMEs' open innovation have positively influenced project success and technical performance. But, the introduction of technology and cooperation with the research organization did not affect the innovation performance, which is presumed to be due to the fact that the open innovation of SMEs is limited to relatively inexpensive activities. Therefore, in order to promote open innovation of SMEs, it is necessary to provide support for relatively high-cost activities and to improve the innovation performance of enterprises. In order to reduce the difficulties of open innovation activities, domestic universities and research institutes should support the construction of enterprise networks and actively support the utilization of technology to expand innovation performance.

A Meta-analysis on the Variables Related with Case Management Performance (사례관리수행에 영향을 미치는 변인에 관한 메타분석 연구)

  • Park, Jung-Im
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.520-530
    • /
    • 2021
  • This study conducted a meta-analysis on the variables related with case management performance in Korea. In order to do a meta-analysis, a total of 27 journals, theses and dissertations published between 1998 and 2020 were reviewed systematically. Through this process, this study calculated average effect size of each variable and explored moderator variables. This study results were as follows. First, this study identified a total of 14 individual, enviroment of institution, population variables related with case management performance. Second, the results indicated that case management performance variables which showed large effect sizes included professional capability, supervision, network, case management significance recognition, manual, agency support. Third, variables with medium effect sizes included self-efficacy, case management education, autonomy, motivation, number of conference and variables with small effect sizes included work experience, academic ability, age. Fourth, Moderator effects were identified in the field, target, publication of case management. Finally, the implications of the study findings were discussed.

A Possibility Analysis of Domestic Terrorism in South Korea by Focusing on Afghanistan under the Taliban Forces (탈레반의 아프가니스탄 장악에 따른 국내 테러 발생 가능성 분석)

  • Oh, Hangil;Ahn, Kyewon;Bae, Byunggul
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.848-863
    • /
    • 2021
  • Purpose: On August 16, 2021, the Taliban established the Taliban regime after conquering capital Kabul of the Afghan by using the strong alliance of international terrorist organizations. The Taliban carried out terrorism targeting the Korean people, including the kidnapping of Kim Seon-il in 2004, the abduction of a member of the Saemmul Church in 2007, and the attack on Korean Provincial Reconstruction Team in 2009. Therefore, this research has shown the possibility of Taliban terrorism in Korea. Method: Based on the statistical data on terrorism that occurred in Afghanistan, Taliban's various terrorist activities such as tactics, strategies, and weapons are examined. Consequently, the target facilities and the type of terrorist attacks are analyzed. Result: The Taliban are targeting the Afghan government as their main target of attack, and IS and the Taliban differ in their selection of targets for terrorism. Conclusion: From the result of this research, we recommend Korea need to reinforce the counter terrorism system in soft targets. Because If the Taliban, which has seized control of Afghanistan, and IS, which has established a worldwide terrorism network, cooperate to threaten domestic multi-use facilities with bombing, the Republic of Korea may face a terrorist crisis with insufficient resources and counter-terrorism related countermeasures.