• Title/Summary/Keyword: 보안 중요도

Search Result 2,301, Processing Time 0.023 seconds

A Study on Efficient Facial Expression Recognition System for Customer Satisfaction Feedback (고객만족도 피드백을 위한 효율적인 얼굴감정 인식시스템에 대한 연구)

  • Kang, Min-Sik
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.41-47
    • /
    • 2012
  • For competitiveness of national B2C (Business to Customer) service industry, improvement of process and analysis focused on customer and change of service system are needed. In other words, a business and an organization should deduce and provide what kind of services customers want. Then, evaluate customers' satisfaction and improve the service quality. To achieve this goal, accurate feedbacks from customers play an important role; however, there are not quantitative and standard systems a lot in nation. Recently, the researches about ICT (Information and Communication Technology) that can recognize emotion of human being are on the increase. The facial expression recognition among them is known as most efficient and natural human interface. This research analyzes about more efficient facial expression recognition and suggests a customer satisfaction feedback system using that.

Crime Prediction Model based on Meteorological Changes and Discomfort Index (기상변화 및 불쾌지수에 따른 범죄발생 예측 모델)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.89-95
    • /
    • 2014
  • This study analyzed a correlation between crime and meteorological changes and discomfort index of Seoul and p resented a prediction expression through the regression analysis. For data used in this study, crime data from Januar y 2008 to December 2012 of Seoul Metropolitan Police Agency and meteorological records and discomfort index recor ded in the Meteorological Agency through the portal sites were used. Based on this data, SPSS 18.0 was used for the regression analysis and the analysis of correlation between crime and meteorological changes and discomfort index and a prediction expression was derived through the analysis and the risk index was shown in 5 steps depending on predicted values obtained through the prediction expression derived. The risk index of 5 steps classified like this is considered to be used as important data for crime prevention activities.

A Study on Extension of OSM (Open Source MANO) Architecture for Providing Virtualization Service in KREONET (첨단연구망(KREONET)에서 가상화 서비스 제공을 위한 OSM(Open Source MANO) 확장방안 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.3-9
    • /
    • 2017
  • NFV is a technology that allows network services to be controlled and managed in software by separating various net work functions (NFs) from hardware devices in dedicated network equipment and implementing them in a high-performance general-purpose server. Therefore, standardized virtualization of network functions is one of the most important factors. However, until the introduction of NFV to provide commercial services, there are many technical issues to be solved such as guaranteeing performance, stability, support for multi-vendor environment, ensuring perfect interoperability, and linking existing virtual and non-virtual resources. In this paper, we propose a method to provide an end-to-end network virtualization service based on OSM R2 in KREONET.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

A study on preventative measures for school violence in foreign countries (외국의 학교폭력 근절 대책에 관한 고찰)

  • Park, yong soo
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.129-140
    • /
    • 2015
  • The school violence is at a critical level today even though it occurred continuously from the past. This issue is not only limited to Korea but it could become a greater issue overseas where possession of firearms is legal. Therefore, introduction of preventative measures in Korean schools should be reviewed by studying how different policies are being applied in countries worldwide to eradicate school violence. Furthermore, the society should continuously make an effort to eradicate school violence. The attitude of regional community who reports instead of spectating and their interest towards school violence are considered very important in addition to the police activities carried out by an organization of the society.

Anslysis of Relationship between Reasons for Mereorological Change and Crime (기상변화요인과 범죄발생의 관계분석)

  • Kim, JongMin;Kim, MinSu;Yoo, SeungJae;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.107-113
    • /
    • 2012
  • This study examined relationship between the major five crimes(murder, robbery, rape, theft and violence) and elements of meteorological change(weather, temperature, precipitation, wind velocity and humidity). Elements of meteoro logical change corresponding to the date recorded by a meteorological office and the number of occurrences from January $1^{st}$ 2010 to October $19^{th}$ 2012 collected from major portal sites were used for this study. Based on this data, SPSS 12.0 was utilized to analyze relationship between crimes and elements of meteorological change, allowing us to find out relationship between crimes and elements of meteorological change. This analysis finding is sure to pave the way for research of this field.

Network function virtualization (NFV) resource allocation (RA) scheme and research trend (네트워크기능 가상화 (NFV) 자원할당 (RA) 방식과 연구동향)

  • Kim, Hyuncheol;Yoon, Seunghyun;Jeon, Hongseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.159-165
    • /
    • 2016
  • Through the NFV (Network Function Virtualization), companies such as network service providers and carriers have sought to dramatically reduce CAPEX / OPEX by improving the speed of new service provisioning and flexibility of network construction through the S/W-based devices provided by NFV. One of the most important considerations for establishing an NFV network to provide dynamic services is to determine how to dynamically allocate resources (VNFs), the basic building blocks of network services, in the right place. In this paper, we analyzed the latest research trends on VNF node, link allocation, and scheduling in nodes that are required to provide arbitrary NS in NFV framework. In this paper, we also propose VNF scheduling problems that should be studied further in RA (Resource Allocation).

Simplification on Even-Mansour Scheme Attacks (Even-Mansour 스킴 공격방법의 간략화)

  • Kim, HongTae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.85-91
    • /
    • 2016
  • Block cipher is one of the prominent and important elements in cryptographic systems and study on the minimal construction is a major theme in the cryptographic research. Even and Mansour motivated by the study suggested a kind of block cipher called the Even-Mansour scheme in the early 1990s. It is a very simple cipher with one permutation and two secret keys. There have been many studies on the Even-Mansour scheme and security analysis of the scheme. We explain the Even-Mansour scheme and simplify those attacks on the Even-Mansour scheme with mathematical language. Additionally, we show that Pollard's rho attack to the discrete logarithm problem can be used to attack the Even-Mansour scheme with the same complexity of the Pollard's rho attack.