• Title/Summary/Keyword: 방어행위

Search Result 119, Processing Time 0.026 seconds

Integrated Log Extraction Program for an Anomaly Intrusion Detection in Various Environments (다양한 환경에서의 비정상행위 탐지를 위한 통합 로그 추출 프로그램)

  • Shin, Jong-Cheol;Lee, Jong-Hoon;Lim, Seon-Kyu;Choi, Won-Sub;Lee, Won-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.511-515
    • /
    • 2009
  • 최근 정보기술의 발달과 함께 지속적으로 다양해지고 빨라지는 침입 방법에 대처하기 위해 정보를 보호하기 위한 새로운 방법이 요구되고 있는 실정이다. 이를 해결하기 위해 제안된 방법 중 하나가 네트워크 패킷 데이터에 대한 실시간 데이터 스트림 마이닝 알고리즘 기반의 비정상행위 탐지 기법이다. 이는 현재 발생하고 있는 패턴이 기존 패턴과 다를 경우 비정상행위로 간주되고 사용자에게 알려주는 방법으로, 지금까지 없었던 새로운 형태의 침입에도 대처할 수 있는 능동적인 방어법이라고 할 수 있다. 그러나 이 방법에서 네트워크 패킷 데이터 정보만을 통해 얻어낼 수 있는 정보에는 한계가 있다. 따라서, 본 논문에서는 보다 높은 정확도의 비정상행위 판정을 위한 다양한 환경의 로그들을 추출하여 처리에 적합한 형태로 변환하는 전처리 시스템을 제안한다.

  • PDF

A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection (파일 DNA 기반의 변종 악성코드 탐지를 위한 유사도 비교에 관한 연구)

  • Jang, Eun-Gyeom;Lee, Sang Jun;Lee, Joong In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.85-94
    • /
    • 2014
  • This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was applied to defend against zero day attack and to minimize false detection, by remedying weaknesses of the conventional network-based packet detection technique and process-based detection technique. For the file DNA-based detection technique, abnormal behaviors of malware were splitted into network-related behaviors and process-related behaviors. This technique was employed to check and block crucial behaviors of process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which process behaviors and network behaviors are mixed, and to deal with it rapidly through hazard warning and cut-off.

Knowledge of Radiation Protection and the Recognition and Performance of Radiation Protection Behavior among Perioperative Nurses (수술실 간호사의 방사선 방어에 대한 지식과 방사선 방어행위에 대한 인식도 및 수행도)

  • Kang, Sung Gum;Lee, Eun Nam
    • Journal of muscle and joint health
    • /
    • v.20 no.3
    • /
    • pp.247-257
    • /
    • 2013
  • Purpose: The purpose of this descriptive study was to investigate the knowledge of radiation protection and the recognition and performance of radiation protection behaviors among perioperative nurses. This study was intended to yield basic data for the development of nursing interventions aimed at improving the nurses' radiation protection behaviors. Methods: One hundred and thirty-seven nurses working in the operating room participated in a survey from September 1 to 30, 2011. The data was analyzed using t-test, ANOVA, and Pearson's correlation with the SPSS/WIN 19.0 program. Results: The average score of radiation protection knowledge was $7.57{\pm}3.45$ out of 16. The average score for the recognition and performance of radiation protection behaviors was $4.32{\pm}0.23$. The knowledge of radiation protection was significantly correlated with the recognition and performance of radiation protection behaviors. Conclusion: Expanding the knowledge of radiation protection could lead to the increase of the recognition and performance of radiation protection behaviors. Therefore, promoting the performance of radiation protection behaviors by improving perioperative nurses' knowledge of radiation protection through reinforcing radiation-related education hereafter could be an important part of nursing.

A Study on knowledge, perception, self-efficacy, and performance on radiation protection among perioperative workers in terms of radiation protection (수술실 종사자의 방사선 노출에 대한 방사선 방어관련 지식, 인식도, 자기효능감 및 수행도에 관한 연구)

  • Kim, Bong-Hee;Kim, Hyo-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.343-354
    • /
    • 2017
  • This study was designed to identify the knowledge, perception, self-efficacy, and performance on radiation protection among perioperative workers in terms of radiation protection. The factors affecting the performance of radiation protection were identified, and provide basic data for the development of an effective radiation protection education program. The sample was comprised of 166 perioperative workers who agreed to participate in this descriptive study. Data analysis was performed using the t-test, analysis of variance, Pearson's correlation, and multiple regression analyses on the SPSS 23.0 Program. The average time of radiation exposure was 3-4hoursThe radiation protection education experience was 11.4%. The average score of radiation protection knowledge was $8.61{\pm}2.51$; the perception was $4.59{\pm}0.64$; and the performance was $2.99{\pm}0.90$ There was a significant difference in the degree of radiation defense knowledge and performance among the general characteristics (p <001). Knowledge of radiation protection was correlated with the perception. The performance of radiation protection was correlated with the knowledge. The knowledge and perception of radiation protection behaviors should be increased to improve radiation protection performance. Therefore, it is important to promote the performance of radiation protection behaviors by improving the perioperative workers' knowledge of radiation protection through reinforcing radiation-related education.

Analysis of Land Use Change using Agent based Modelling Approach (행위자기반모형을 이용한 토지이용 변화 분석)

  • Ko, Jin-Seok;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1361-1364
    • /
    • 2009
  • 최근 몇 년동안 지속가능하고 효과적인 수자원 관리는 전체적인 접근방법이 요구되고 있으며, 사회와 경제발전과 생태계 보호 및 토지이용과 수자원 이용의 적절한 관리와 연결된 개념이 필요하다. 이러한 관점에서 유역을 간단한 고정된 지역적인 문제라고 생각하는 것보다 전체로서의 유역 기능을 개선하는데 노력이 필요하다. 또한 사회와 경제발전으로 인해 도시화, 여가 관광지역 및 사회기반시설의 확장 그리고 자연환경의 변화가 발행하고 있다. 효과적인 토지이용 배분과 자연지역의 보호도 중요하지만 잠재적인 홍수피해 저감도 중요한 문제이다. 토지이용의 변화는 많은 이해관계자들로부터 유발되는 문제이기 때문에 거시적인 관점에서 고려되어야 한다. 본 논문은 다양한 관계자와 자연환경과의 연결과 상호작용 유형을 이해하고 다양한 정책선택과 자연환경 상태가 토지이용 변화에 미치는 영향을 이해하고자 한다. 인간의 활동으로 인해 발생하는 토지이용의 변화를 모의하기 위해서 행위자기반모형(Agent based Model, ABM)으로 접근하고자 한다. ABM은 유역관리의 이해당사자간의 정책과정을 도출하고 다양한 유역관리 대안을 평가하기 위해서 홍수위험, 자연개발 및 비용과 같은 유역관리의 영향을 설명하는 통합된 유역모델이다. 여기서 토지이용은 경제적, 지형학적 상황, 공간계획 및 홍수방어정책에 좌우되며, 토지의 속성과 규칙을 통해 토지이용이 선택되게 된다. 본 모형을 통해 공간적으로 분포된 행위자의 운영을 기반으로 종합적인 토지이용 패턴을 분석하였다, 이를 통해 토지이용 결정에 영향을 주는 인자를 추정하여 통합홍수관리 목적에 맞는 관리 대책의 결정 및 설계를 가능토록 하였다.

  • PDF

Design of Fraudulent Process Notification for Management Information Systems (정보시스템 부정행위 신고시스템 설계)

  • Lee, Joong Hee;Lee, Sangwon;Ahn, Hyunsup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.629-631
    • /
    • 2013
  • In many enterprises, fraudulent activities and processes are widely prevalent. But, their employees would not report the illegal activities since they would be attacked by defensive and reactive retaliations in their enterprises. Against this backdrop, we design notification systems for whistle blowing. The design would certainly be useful for fraudulent process notification while using management information systems in the field of business. The fraudulent process notification is related to whistle blowing systems, methods, storage media, and so on. Also, we establish the whole architecture of fraudulent process notification with functional structure from the viewpoint of systems and whistle blower. The flow diagram of notification method is added.

  • PDF

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

A Methodology for Justification and Optimization of Countermeasures for Milk After a Nuclear Accident and Its Application (원자력 사고후 우유에 대한 비상대응의 정당화/최적화를 위한 방법론 및 적용연구)

  • Hwang, Won-Tae;Han, Moon-Hee;Kim, Eun-Han;Cho, Gyu-Seong
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.4
    • /
    • pp.243-249
    • /
    • 1998
  • The methodology for justification and optimization of the countermeasures related with contamination management of milk was designed based on the cost and benefit analysis. The application results were discussed for the deposition on August 15, when pasture is fully developed in Korean agricultural conditions. A dynamic food chain model DYNACON was used to estimate the time-dependent radioactivity of milk after the deposition. The considered countermeasures are (1) the ban of milk consumption (2) the substitution of clean fodder, which are effective in reducing the ingestion dose as well as simple and easy to carry out in the first year after the deposition. The total costs of the countermeasures were quantitatively estimated in terms of cost equivalent of doses and monetary costs. It is obvious that a fast reaction after the deposition is an important factor in cost effectiveness of the countermeasures. In most cases, the substitution of clean fodder was more effective countermeasure than the ban of consumption. A fast reaction after the deposition made longer justifiable/optimal duration of the countermeasure.

  • PDF

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.

Factors Affecting Radiation Protection Behaviors among Operating Room Nurses (수술실 간호사의 방사선 방어행위의 영향 요인)

  • Kim, Jin;Kim, Jin Sun;Kim, Hyunlye
    • Korean Journal of Adult Nursing
    • /
    • v.28 no.6
    • /
    • pp.680-690
    • /
    • 2016
  • Purpose: This study was designed to identify knowledge, attitude, environment, and self-efficacy among perioperative nurses in terms of radiation protection and to describe those factors affecting radiation protection behaviors. Methods: The sample was comprised of 128 perioperative nurses who agreed to participate in this descriptive study. Data were collected from a self-administered questionnaire and were analyzed using the t-test, analysis of variance, Mann-whitney U test, Kruskal-Wallis test, Pearson's correlation, and multiple regression analyses. Results: Radiation protection behaviors were significantly different by participant's gender, length of career as a perioperative nurse, educational level and prior experience with radiation protection education. Radiation protection behaviors were significantly correlated with radiation protection environment and self-efficacy in terms of radiation protection behaviors. In the multiple linear regression models, radiation protection environment and self-efficacy on radiation protection behaviors were statistically significant predictors of radiation protection behaviors, which accounted for 50.3% of variance in dependent variable. Conclusion: This study concluded that radiation protective environment in operating room is important to promote radiation protective behaviors and radiation safety management program to enhance self-efficacy is highly recommended.