• Title/Summary/Keyword: 네트워크 지도

Search Result 12,221, Processing Time 0.048 seconds

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

Interconnection Fee or Access fee? - Focusing on ISP-CP settlement dispute - (상호접속료인가, 망 이용대가인가? - ISP-CP간 망 연결 대가 분쟁 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.9-20
    • /
    • 2020
  • This study redefines the networks' connection behaviors and the terms confusion over the settlement in Netflix-SK Broadband's dispute through domestic and foreign legal references. Conflict parties, academics and the media use the terms "interconnection fee" or "Access fee" without uniformity, and in some cases mixes for strategic purposes. The use of different terms for the same phenomenon (or vice versa) has a high need for research in that it makes it difficult to reach a unified approach to the problem, to discuss it productively and rationally, and, moreover, to resolve disputes. Therefore, this study cross-referenced/analyzed terms related to network utilization and connectivity, namely "Use", "Access", "Interconnection" and thus cost-related terms as a counter-pay. In addition, it suggests that interconnection fees and access fees should be used separately, and allows them to function as a starting point in resolving future ICT sector issues. As a result of this study, the price against the network access/use between Netflix and SK Broadband is access fee or retail price, and proposes to be used uniformly in the term "interconnection fee" only for fees incurred in interconnection between ISPs that possess or operate networks.

Construction of Test Collection for Automatically Extracting Technological Knowledge (기술 지식 자동 추출을 위한 테스트 컬렉션 구축)

  • Shin, Sung-Ho;Choi, Yun-Soo;Song, Sa-Kwang;Choi, Sung-Pil;Jung, Han-Min
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.463-472
    • /
    • 2012
  • For last decade, the amount of information has been increased rapidly because of the internet and computing technology development, mobile devices and sensors, and social networks like facebook or twitter. People who want to gain important knowledge from database have been frustrated with large database. Many studies for automatic knowledge extracting meaningful knowledge from large database have been fulfilled. In that sense, automatic knowledge extracting with computing technology has been highly significant in information technology field, but still has many challenges to go further. In order to improve the effectives and efficiency of knowledge extracting system, test collection is strongly necessary. In this research, we introduce a test collection for automatic knwoledge extracting. We name the test collection KEEC/KREC(KISTI Entity Extraction Collection/KISTI Relation Extraction Collection) and present the process and guideline for building as well as the features of. The main feature is to tag by experts to guarantee the quality of collection. The experts read documents and tag entities and relation between entities with a tool for tagging. KEEC/KREC is being used for a research to evaluate system performance and will continue to contribute to next researches.

A Study-on Context-Dependent Acoustic Models to Improve the Performance of the Korea Speech Recognition (한국어 음성인식 성능향상을 위한 문맥의존 음향모델에 관한 연구)

  • 황철준;오세진;김범국;정호열;정현열
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.4
    • /
    • pp.9-15
    • /
    • 2001
  • In this paper we investigate context dependent acoustic models to improve the performance of the Korean speech recognition . The algorithm are using the Korean phonological rules and decision tree, By Successive State Splitting(SSS) algorithm the Hidden Merkov Netwwork(HM-Net) which is an efficient representation of phoneme-context-dependent HMMs, can be generated automatically SSS is powerful technique to design topologies of tied-state HMMs but it doesn't treat unknown contexts in the training phoneme contexts environment adequately In addition it has some problem in the procedure of the contextual domain. In this paper we adopt a new state-clustering algorithm of SSS, called Phonetic Decision Tree-based SSS (PDT-SSS) which includes contexts splits based on the Korean phonological rules. This method combines advantages of both the decision tree clustering and SSS, and can generated highly accurate HM-Net that can express any contexts To verify the effectiveness of the adopted methods. the experiments are carried out using KLE 452 word database and YNU 200 sentence database. Through the Korean phoneme word and sentence recognition experiments. we proved that the new state-clustering algorithm produce better phoneme, word and continuous speech recognition accuracy than the conventional HMMs.

  • PDF

Digital Data Communication System for Mobile Network System Using CC1020 Chip (CC1020 Chip을 사용한 모바일 네트워크를 위한 디지털 데이터 통신 시스템)

  • Lim, Hyun-Jin;So, Heung-Kuk
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.58-62
    • /
    • 2007
  • Digital communication is important for reliability and mobilization of the multi-channel communication systems. Transmitting and receiving data for the mobilization should be possible in anywhere and in anytime. And this system must be designed light weight small size and low power. One are essential technology for implementing the mobile wireless communication system on the age of ubiquotos. Requirements in constructing such communication field are followings. At first data transmitting and receiving should be carried out by a simple command. Second, the device should be designed as hand-hold type and low power consumption. Third, data communication should be reliable. As one of examples, car to car system which is popular in the market is introduced here, All traffic information in highway is transmitted from one car to another by using this system which can prevent possible traffic accident. This paper shows the design of a digital data communication system with CC1020 chip. This CC1020 makes easy frequency selection and easy switch from the transmit mode to the receive mode by simple setting of a memory register in the chip. The transmit power of this system is designed 10dBm and its communication range is about 100m. The power supplied this system is 3V considered as low power. The sleep mode can be easily entered during transmit mode or receive mode. We shows the program algorithm of CC1020 and interface circuit between MCU and CC1020. We shows the Photo of the CC1020 Module and Atmega128 Module.. We analysed the receiver rate with this system.

  • PDF

The Optimization of Hybrid BCI Systems based on Blind Source Separation in Single Channel (단일 채널에서 블라인드 음원분리를 통한 하이브리드 BCI시스템 최적화)

  • Yang, Da-Lin;Nguyen, Trung-Hau;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.1
    • /
    • pp.7-13
    • /
    • 2018
  • In the current study, we proposed an optimized brain-computer interface (BCI) which employed blind source separation (BBS) approach to remove noises. Thus motor imagery (MI) signal and steady state visual evoked potential (SSVEP) signal were easily to be detected due to enhancement in signal-to-noise ratio (SNR). Moreover, a combination between MI and SSVEP which is typically can increase the number of commands being generated in the current BCI. To reduce the computational time as well as to bring the BCI closer to real-world applications, the current system utilizes a single-channel EEG signal. In addition, a convolutional neural network (CNN) was used as the multi-class classification model. We evaluated the performance in term of accuracy between a non-BBS+BCI and BBS+BCI. Results show that the accuracy of the BBS+BCI is achieved $16.15{\pm}5.12%$ higher than that in the non-BBS+BCI by using BBS than non-used on. Overall, the proposed BCI system demonstrate a feasibility to be applied for multi-dimensional control applications with a comparable accuracy.

Needs Assessment of Administrative and Financial Support for Effective Performance of Teacher Professionalism of Gifted Education (영재교육 교사 전문성의 효율적 실천을 위한 행.재정 지원의 요구분석)

  • Seo, Hae-Ae
    • Journal of Gifted/Talented Education
    • /
    • v.18 no.2
    • /
    • pp.175-200
    • /
    • 2008
  • The study aims to assess needs of administrative and financial support for effective performance of teacher professionalism of gifted. For this end, practicing teachers of gifted education were nationwide selected for survey questionnaires. The first survey of five-scale Likert item was conducted in July 2005 with 236 teachers and the second survey of open-ended item was done in November 2005 with 123 teachers. All the respondents provided their perceptions to current status of administrative and financial support for gifted education and needs for their effective performance of professionalism. Suggestions for improving conditions of administration and finance in terms of effective performance of teacher professionalism in gifted education were as follows: First, teachers should be assigned as full-time for gifted education. Otherwise, their teaching hours and other related jobs should be, reduced Second, the financial support for gifted education should be increased, in particular, more in provincial areas than metropolitan cities. Third, appropriate grouping and counseling according to diverse differences of students should be done. Fourth, understanding of principals and teachers in general education as well as parents and general public toward gifted education should be improved through inservice education program and other education programs. Further, teachers of gifted education should be provided with more frequent opportunities for participating inservice programs in quality, share knowledge and experiences among teachers through network systems, and be given appropriate incentives for better performance of professionalism.

Efficient Safety Management in Inland Waters: Focused on Water Relief and Water Safety (효율적 내수면 안전관리 : 수난구호 및 수상안전을 중심으로)

  • Chung, Chul-Min;Yang, Gi-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.3
    • /
    • pp.101-113
    • /
    • 2015
  • This study aims to prepare countermeasures to prevent and minimize drowning accident in inland waters by examining the current status of inland water safety management in Korea and diagnosing the defects. The defects in current inland water safety management is analyzed in four aspects. First is the legal defect that includes the absence of legislation that directs the inland water safety management. Second is the instructional defect such as the absence of educational program for prevention of inland water accidents and lack of professional water rescue experts. Third is cooperation defect such as dispersed reporting system and lack of private-public partnership in accident response. Fourth is the defect of emergency response ability, professionalism and accident response skills due to the dispersion and overlaps of safety management systems. In order to improve these defects, this study finds the countermeasures based on the survey of water sports professions and users and its analysis as follows: legislation of '(tentatively named) special act for water safety management in inland waters' is suggested in the legal aspects. A development of inland waters safety education program and training of water accident experts are suggested in the instructional aspects. Integrated operational system for water accident management, activation of safety network and re-establishment of private-public partnership are suggested in the cooperation aspects. Systematic and efficient inland water safety management plans such as enhancement of accident response skills and expertise and integrated inland water safety management with fire department-centered system were suggested in the aspects of emergency response ability.

Changes of Technologies of the Self by Personal Blog (개인 블로그를 통한 자기기술(自己技術)의 변화)

  • Kim, Jong-Deok;Cho, Na-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.128-146
    • /
    • 2008
  • Cyworld has created a new social phenomenon that relationship between people and communities could be built by committing to digital writing. It has altered the way of people's writing attitudes from self-confessed to self-describing and self-broadcasting ways in which one regards oneself as the center of the cyber world. The purpose of this paper is to identify the shift in one's writing attitudes and how he/she develops technologies of the self in the Cyworld space. Quantitative and qualitative methods support the result; The analysis of 100 Cyworld users' mini-homepages show how the visual images in Cyworld affects their way of digital writing and the analysis of the change of writing habit due to sharing data how virtual 'family' that has been created by Cyworld. I categorize the characteristics of digital writing into three; 1)Visualization of technologies of the self 2)Networked technologies of the self 3)Sharing secretes. The aim of writing in Cyworld is not to keep the secrete but to share and, eventually, texts are circulated in the networked society where one is participated(Cyworld family). Therefore, the usage of images plays a significant role in Cyworld communities because the opened secretes are usually prepared to be presented on the basis of trustworthy toward other members.