• Title/Summary/Keyword: 네트워크 취약점 분석

Search Result 348, Processing Time 0.027 seconds

Building Participatory Digital Archives for Documenting Localities (로컬리티 기록화를 위한 참여형 아카이브 구축에 관한 연구)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.3-44
    • /
    • 2012
  • The purpose of the study is to explore the strategies to build participatory digital archives for documenting localities. Following the introduction of the chapter one, the chapter two deals with categorizing participation types of persons and organizations for documenting localities, analysing characteristics and benefits of each type, and listing up the requirements of participatory archives based on literature reviews. The chapter three focuses on the analyses of digital archives especially based on the participation of organizations such as collecting institutions and community archives in USA, Canada and UK. The cases of participatory archives are divided into two types; i) digital archives based on archival collections of institutions such as libraries, archives, and museums, ii) digital archives mainly based on various community archives. Online Archives California(OAC) and Calisphere of University of California, MemoryBC of British Columbia of Canada, and People's Collection Wales of UK as the first type cases, and Connecting Histories of Birmingham, 'Community Archives Wales(CAW), Cambridgeshire Community Archive Network(CCAN), Norfolk Community Archives Network(NORCAN) as the second type cases are selected for comparative analyses. All these cases can be considered as archival portals since they cover collections from various organizations. This study then evaluates how these digital archives fulfill the requirements of participatory archives such as : i) integrated search of archives that are to be distributed, ii) participation of individuals and organizations, and iii) providing broader contextual information and representation of context as well as contents of archives. Lastly the final chapter suggests the implications for building participatory archives in Korean local areas based on following aspects : host organizations and implementation strategy, networks of collection institutions and community archives, preserving and reorganizing contextual information, selection and appraisal, and participation of records users and creators.

A Study on the Relation between Degree and Physical & Mental Health of Old People in Interpersonal Relationship Network (대인관계 네트워크에서 연결정도와 노인의 신체적 건강 및 정신적 건강과의 관련성 연구)

  • Chae, In-Hwa;Choi, Sung-Won
    • 한국노년학
    • /
    • v.37 no.2
    • /
    • pp.329-347
    • /
    • 2017
  • The purpose of this study is to see if we can predict the health of seniors of community by analyzing the connection between social network degree and mental and physical health of old people who live in the areas of Gangwha Island. The subjects of the study were men and women aged 65 or over, a total of 643 that resided in Ganghwa A-county. The survey was conducted on Korean Social Life, Health and Aging Project from the year 2011 to 2012. Regression analysis was carried out using the data. The analysis results were as follows. First, it showed the relationships between income, gender, age out of demographic variables used as control variable and old persons'physical health. The research results showed that physical health was better in case of the higher incomes, men, and lower age. Second, out of demographic variables, educational background, income, age was shown to correlate with mental health. The research results showed that mental health was better in case of the higher incomes, higher educational background, and lower age. Third, in social network including direction, both out-degree and in-degree were shown to predict old people's physical and mental health. The results of this study suggest that not only out-degree but also in-degree should be considered in predicting the health of elderly persons by a person's human relationship. Also, two indicators of degree are meaningful in the dimension of health promotion and welfare of the old in that they can be used for finding isolated individuals that can be physically and mentally vulnerable.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

The Actual Condition and Development Direction of A Community Child Center (전라북도 지역아동센터 현황과 발전방안)

  • Yee, Young Hwan
    • Korean Journal of Childcare and Education
    • /
    • v.7 no.3
    • /
    • pp.67-100
    • /
    • 2011
  • This study assesses the current status of community child centers in Jeollabuk-do by analyzing data from evaluations of 225 centers in 2009. The results are as follows. First, as of 2004, there was a total of 37 Jeollabuk-do community child centers; the number has been increasing at a rate of 20~40% yearly. The number of community child centers has been increasing since government funding was implemented, especially as an authorization is not required to open a center. In order to prevent an excessive amount of childcare centers, and to ensure that new centers meet a standard of quality, it is necessary to examine replacing the current reporting system with an authorization system. Second, out the 6,144 children in the 255 centers, 1,711 children (27.8%) were not from low-income families. This may be positive in that children from various income level families are learning together. However, in order for the community child centers to operate as they were intended, it is necessary to reinforce the itemized regulations. Third, the community child centers scored relatively poorly in utilizing community and human resources. This is because although most Jeollabuk-do childcare centers are using volunteer personnel, they are not fully utilizing community resources. The governments of the cities and counties should support the community child centers by promoting their services and roles, and thereby enable the centers to develop a network of professionals in the community.

A New Bias Scheduling Method for Improving Both Classification Performance and Precision on the Classification and Regression Problems (분류 및 회귀문제에서의 분류 성능과 정확도를 동시에 향상시키기 위한 새로운 바이어스 스케줄링 방법)

  • Kim Eun-Mi;Park Seong-Mi;Kim Kwang-Hee;Lee Bae-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1021-1028
    • /
    • 2005
  • The general solution for classification and regression problems can be found by matching and modifying matrices with the information in real world and then these matrices are teaming in neural networks. This paper treats primary space as a real world, and dual space that Primary space matches matrices using kernel. In practical study, there are two kinds of problems, complete system which can get an answer using inverse matrix and ill-posed system or singular system which cannot get an answer directly from inverse of the given matrix. Further more the problems are often given by the latter condition; therefore, it is necessary to find regularization parameter to change ill-posed or singular problems into complete system. This paper compares each performance under both classification and regression problems among GCV, L-Curve, which are well known for getting regularization parameter, and kernel methods. Both GCV and L-Curve have excellent performance to get regularization parameters, and the performances are similar although they show little bit different results from the different condition of problems. However, these methods are two-step solution because both have to calculate the regularization parameters to solve given problems, and then those problems can be applied to other solving methods. Compared with UV and L-Curve, kernel methods are one-step solution which is simultaneously teaming a regularization parameter within the teaming process of pattern weights. This paper also suggests dynamic momentum which is leaning under the limited proportional condition between learning epoch and the performance of given problems to increase performance and precision for regularization. Finally, this paper shows the results that suggested solution can get better or equivalent results compared with GCV and L-Curve through the experiments using Iris data which are used to consider standard data in classification, Gaussian data which are typical data for singular system, and Shaw data which is an one-dimension image restoration problems.

A Study on Searching for Export Candidate Countries of the Korean Food and Beverage Industry Using Node2vec Graph Embedding and Light GBM Link Prediction (Node2vec 그래프 임베딩과 Light GBM 링크 예측을 활용한 식음료 산업의 수출 후보국가 탐색 연구)

  • Lee, Jae-Seong;Jun, Seung-Pyo;Seo, Jinny
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.4
    • /
    • pp.73-95
    • /
    • 2021
  • This study uses Node2vec graph embedding method and Light GBM link prediction to explore undeveloped export candidate countries in Korea's food and beverage industry. Node2vec is the method that improves the limit of the structural equivalence representation of the network, which is known to be relatively weak compared to the existing link prediction method based on the number of common neighbors of the network. Therefore, the method is known to show excellent performance in both community detection and structural equivalence of the network. The vector value obtained by embedding the network in this way operates under the condition of a constant length from an arbitrarily designated starting point node. Therefore, it has the advantage that it is easy to apply the sequence of nodes as an input value to the model for downstream tasks such as Logistic Regression, Support Vector Machine, and Random Forest. Based on these features of the Node2vec graph embedding method, this study applied the above method to the international trade information of the Korean food and beverage industry. Through this, we intend to contribute to creating the effect of extensive margin diversification in Korea in the global value chain relationship of the industry. The optimal predictive model derived from the results of this study recorded a precision of 0.95 and a recall of 0.79, and an F1 score of 0.86, showing excellent performance. This performance was shown to be superior to that of the binary classifier based on Logistic Regression set as the baseline model. In the baseline model, a precision of 0.95 and a recall of 0.73 were recorded, and an F1 score of 0.83 was recorded. In addition, the light GBM-based optimal prediction model derived from this study showed superior performance than the link prediction model of previous studies, which is set as a benchmarking model in this study. The predictive model of the previous study recorded only a recall rate of 0.75, but the proposed model of this study showed better performance which recall rate is 0.79. The difference in the performance of the prediction results between benchmarking model and this study model is due to the model learning strategy. In this study, groups were classified by the trade value scale, and prediction models were trained differently for these groups. Specific methods are (1) a method of randomly masking and learning a model for all trades without setting specific conditions for trade value, (2) arbitrarily masking a part of the trades with an average trade value or higher and using the model method, and (3) a method of arbitrarily masking some of the trades with the top 25% or higher trade value and learning the model. As a result of the experiment, it was confirmed that the performance of the model trained by randomly masking some of the trades with the above-average trade value in this method was the best and appeared stably. It was found that most of the results of potential export candidates for Korea derived through the above model appeared appropriate through additional investigation. Combining the above, this study could suggest the practical utility of the link prediction method applying Node2vec and Light GBM. In addition, useful implications could be derived for weight update strategies that can perform better link prediction while training the model. On the other hand, this study also has policy utility because it is applied to trade transactions that have not been performed much in the research related to link prediction based on graph embedding. The results of this study support a rapid response to changes in the global value chain such as the recent US-China trade conflict or Japan's export regulations, and I think that it has sufficient usefulness as a tool for policy decision-making.