• Title/Summary/Keyword: 범용

Search Result 2,873, Processing Time 0.029 seconds

A Study on Efficient Network Topology Visualization using Node Centrality (노드 중심성을 이용한 효율적 네트워크 토폴로지 시각화 연구)

  • Chang, Beom-Hwan;Ryu, Jemin;Kwon, Koohyung
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.47-56
    • /
    • 2021
  • Network topology visualization has been studied a lot since the past and developed with many tools. The network topology has strength in understanding the overall structure of a network physically and is useful for understanding data flow between nodes logically. Although there are existing tools, not many can be utilized efficiently while using the general network node data structure and express the topology similar to the actual network structure. In this paper, we propose an efficient method to visualize topology using only connection information of network nodes. The method finds the central node by using the centrality, the influence of nodes in the network, and visualizes the topology by dynamically segmenting all nodes and placing network nodes in 3D space using the weight of the child node. It is a straightforward method, yet it effectively visualizes in the form of an actual network structure.

The Present and Future of Medical Robots: Focused on Surgical Robots (의료로봇의 현재와 미래: 수술로봇을 중심으로)

  • Song, Mi Ok;Cho, Yong Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.349-353
    • /
    • 2021
  • This study is a review study attempted to analyze the current situation of surgical robots based on previous research on surgical robots in the era of the 4th revolution, and to forecast the future direction of surgical robots. Surgical robots have made full progress since the launch of the da Vinci and the surgical robot is playing a role of supporting the surgeries of the surgeons or the master-slave method reflecting the intention of the surgeons. Recently, technologies are being developed to combine artificial intelligence and big data with surgical robots, and to commercialize a universal platform rather than a platform dedicated to surgery. Moreover, technologies for automating surgical robots are being developed by generating 3D image data based on diagnostic image data, providing real-time images, and integrating image data into one system. For the development of surgical robots, cooperation with clinicians and engineers, safety management of surgical robot, and institutional support for the use of surgical robots will be required.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

The effect of curvature at the bottom of a soft ground tunnel by numerical analysis (수치해석에 의한 연약지반 터널의 바닥부 곡률의 영향 분석)

  • You, Kwangho;Kim, Kangsan
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.2
    • /
    • pp.107-118
    • /
    • 2021
  • Due to the acceleration of road construction, the number and extension of tunnels are increasing every year. A lot of research has been done on the collapse of tunnels, but research on the invert heaving is insufficient. Therefore, in this study, a sensitivity analysis was performed using a geotechnical general-purpose program to analyze the effect of the invert curvature of a tunnel excavated on the soft ground. As a result, it was quantitatively confirmed that the stability of a tunnel was increased as the curvature of the tunnel invert was increased so that the safety factor was calculated to be large regardless of the ground conditions and the thickness of the support. In addition, it was confirmed that the stability of the tunnel was increased by reducing the convergence of the tunnel and the maximum bending stress supported by shotcrete. Therefore, when a tunnel is excavated on soft ground, it is believed that applying a curvature to the invert will increase the stability of the tunnel.

A study of extended processor trace decoder structure for malicious code detection (악성코드 검출을 위한 확장된 프로세서 트레이스 디코더 구조 연구)

  • Kang, Seungae;Kim, Youngsoo;Kim, Jonghyun;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.19-24
    • /
    • 2018
  • For a long time now, general-purpose processors have provided dedicated hardware / software tracing modules to provide developers with tools to fix bugs. A hardware tracer generates its enormous data into a log that is used for both performance analysis and debugging. Processor Trace (PT) is a new hardware-based tracing feature for Intel CPUs that traces branches executing on the CPU, which allows the reconstruction of the control flow of all executed code with minimal labor. Hardware tracer has been integrated into the operating system, which allows tight integration with its profiling and debugging mechanisms. However, in the Windows environment, existing studies related to PT focused on decoding only one flow in sequence. In this paper, we propose an extended PT decoder structure that provides basic data for real-time trace and malicious code detection using the functions provided by PT in Windows environment.

  • PDF

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

A Study on the Performance Characteristics of Image Vehicle Detectors Depending on the Environment (환경에 따른 영상식 차량검지기의 성능 특성에 관한 연구)

  • Oh, Ju-Sam;Kim, Jin-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.119-128
    • /
    • 2021
  • The most typical method to generate traffic information is installing vehicle detectors and collecting various traffic variables. The information collection accuracy of a vehicle detector affects the reliability of the generated traffic information. The most universal vehicle detector is an image detector. This study installed a magnetic detector in the same position as an image detector and evaluated the accuracy of traffic volume and speed data depending on a variety of environment. Based on the evaluation, more errors occurred as the image detector was placed farther from the camera, whereas more errors were found to occur during the night rather than the day. Although rainfall did not affect the collection of traffic volume, it negatively affected speed data collection. Therefore, an analysis of the camera's view angle and its optimization depending on the camera installation position and height are required to enhance the currently operated image detector performance. It is judged that a separate performance evaluation criterion should be prepared in a bad weather environment.

A Study on Converter Topology to Drive Switched Reluctance Motor (SRM) (스위치드 릴럭턴스 전동기(SRM) 구동용 Converter Topology 연구)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.129-135
    • /
    • 2021
  • Switched Reluctance Motor (SRM) has a characteristic that the inductance changes very nonlinearly depending on the magnitude of the current and the relative position of the rotor and stator, and the torque is generated In consideration of these problems, many studies have been conducted on a topology for driving that can improve efficiency and performance in an existing asymmetric bridge converter in order to simplify the circuit and economic efficiency. Therefore, in this paper, we want to check the performance by comparing and analyzing each converter used by applying it as a topology for SRM driving. The driving converters applied to the comparison and analysis are Conventional C-dump, Modified C-dump, Energy efficient C-dump, Resonant C-dump converter with C-dump converter type structure and the most widely used asymmetric bridge converter and 6-Switch inverter that used for general motors.