• Title/Summary/Keyword: 네트워크 지도

Search Result 12,158, Processing Time 0.039 seconds

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A Study on Awareness of the Revitalization of Tourism Promotionality through Focus Group Interview : Focus on the Gyeongsangbuk-do Area (관광 홍보관 활성화에 관한 인식 : 경상북도 지역 중심으로)

  • Nam, Tae-Suk;Hur, Jong-Guk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.1-14
    • /
    • 2019
  • This study explored ways to activate tourism promotion centers located in 23 regions of Gyeongsangbuk-do and carried out qualitative research through FGI(Focus Group Interview) to the heads of tourism promotion agencies, public officials, and professors. The FGI(Focus Group Interview) analysis results discussed the problems of tourism promotion and information center facilities recognized by stakeholders in Gyeongsangbuk-do and service improvement cooperation. At a time when the importance of the tourism industry is being emphasized, it is time to expand and improve the facilities of the tourism promotion center as a tourism information facility for Koreans and foreigners. Gyeongsangbuk-do Province has a natural environment and unique tourism resources that can become a tourist attraction in South Korea. In particular, four topics were drawn: providing satisfaction with visitors linked to regional economic revitalization cooperation and tourism guidance, and measures to boost revenue generation at public relations centers and information centers in Gyeongsangbuk-do.

A Study of Korean Traditional Creative Music Groups: How They Are Performing in North America and How to Support Them (한국 전통창작음악단체 북미 진출현황과 활성화 방안 연구)

  • Won, Hye-Yeon;Kwon, Hyeog-In
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.180-190
    • /
    • 2022
  • This study reviews the current status of Korean traditional creative music groups that have entered the North American World Music market. It also explores some success factors and strategies behind the artists' sustainable activities in the region as well as improvements needed for the Korean government's support. For the purpose of realistic suggestions, music groups that have entered the North American World Music market and experts in artists' global activities have been interviewed for analysis. The interview questionnaire consisted of the following items: 1. how the music groups reached the North American market, 2. what made them successful, 3. what strategies they used to perform in the region, 4. what challenges they faced, and 5. how the government support could be improved. The study found the following success factors: the groups' participation in Korean and international music markets, existence of a local agency, uniqueness and popularity of Korean music, and possibility to organize workshops. It also identified the following challenges: absence of lucrative touring plans, complicated visa issuance, and limitations of networking. It is hoped that this research will provide useful information for music groups planning to enter the North American World Music market and that it will make some meaningful policy suggestions to relevant organizations.

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Social Network Analysis on Research Keywords of Child-Occupation Studies (아동의 작업 연구주제어의 사회연결망 분석)

  • Ha, Seong-Kyu;Park, Kang-Hyun
    • Therapeutic Science for Rehabilitation
    • /
    • v.12 no.4
    • /
    • pp.39-51
    • /
    • 2023
  • Objective : This study seeks to unveil the intellectual framework of research surrounding children's occupations by utilizing social network analysis of keywords from studies focused on childhood. Methods : From August 2003 to August 2023, we analyzed 3,364 keywords extracted from 270 research articles in the Korean Citation Index with the keyword "Child and Occupation" using the NetMiner program. Results : Research on children's work has increased quantitatively over the past decade. Keywords exhibiting a high degree of centrality in the realm of child occupation research included Task (0.055), Group therapy (0.040), Working memory (0.037), Intervention (0.033), Performance (0.030), Language (0.026), Ability (0.026), Skill (0.024), and Program (0.023). Notably, the weighted terms in the Word Network included Evaluation-Tool (30), School-Student (15), and Activity-Participation (15). The primary keywords from each topic in topic modeling were Activity (0.295), Disability (0.604), Education (0.356), Skill (0.478), School (0.317), Function (0.462), Disorder (0.324), Language (0.310), Comprehension (0.412), and Training (0.511). Conclusion : This study describes the trends in the domestic field of pediatric occupational research. These efforts provided valuable insights into pediatric occupational therapy in South Korea.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

PID-based Consensus and Formation Control of Second-order Multi-agent System with Heterogeneous State Information (이종 상태 정보를 고려한 이차 다개체 시스템의 PID 기반 일치 및 편대 제어)

  • Min-Jae Kang;Han-Ho Tack
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.103-111
    • /
    • 2023
  • Consensus, that aims to converge the states of agents to the same states through information exchanges between agents, has been widely studied to control the multi-agent systems. In real systems, the measurement variables of each agent may be different, the loss of information across communication may occur, and the different networks for each state may need to be constructed for safety. Moreover, the input saturation and the disturbances in the system may cause instability. Therefore, this paper studies the PID(Proportional-Integral-Derivative)-based consensus control to achieve the swarm behavior of the multi-agent systems considering the heterogeneous state information, the input saturations, and the disturbances. Specifically, we consider the multiple follower agents and the single leader agent modeled by the second-order systems, and investigate the conditions to achieve the consensus based on the stability of the error system. It is confirmed that the proposed algorithm can achieve the consensus if only the connectivity of the position graph is guaranteed. Moreover, by extending the consensus algorithm, we study the formation control problem for the multi-agent systems. Finally, the validity of the proposed algorithm was verified through the simulations.

Automated Story Generation with Image Captions and Recursiva Calls (이미지 캡션 및 재귀호출을 통한 스토리 생성 방법)

  • Isle Jeon;Dongha Jo;Mikyeong Moon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.42-50
    • /
    • 2023
  • The development of technology has achieved digital innovation throughout the media industry, including production techniques and editing technologies, and has brought diversity in the form of consumer viewing through the OTT service and streaming era. The convergence of big data and deep learning networks automatically generated text in format such as news articles, novels, and scripts, but there were insufficient studies that reflected the author's intention and generated story with contextually smooth. In this paper, we describe the flow of pictures in the storyboard with image caption generation techniques, and the automatic generation of story-tailored scenarios through language models. Image caption using CNN and Attention Mechanism, we generate sentences describing pictures on the storyboard, and input the generated sentences into the artificial intelligence natural language processing model KoGPT-2 in order to automatically generate scenarios that meet the planning intention. Through this paper, the author's intention and story customized scenarios are created in large quantities to alleviate the pain of content creation, and artificial intelligence participates in the overall process of digital content production to activate media intelligence.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.