• Title/Summary/Keyword: 사이버 학습

Search Result 563, Processing Time 0.027 seconds

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling (다양한 데이터 전처리 기법과 데이터 오버샘플링을 적용한 GRU 모델 기반 이상 탐지 성능 비교)

  • Yoo, Seung-Tae;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.201-211
    • /
    • 2022
  • According to the recent change in the cybersecurity paradigm, research on anomaly detection methods using machine learning and deep learning techniques, which are AI implementation technologies, is increasing. In this study, a comparative study on data preprocessing techniques that can improve the anomaly detection performance of a GRU (Gated Recurrent Unit) neural network-based intrusion detection model using NGIDS-DS (Next Generation IDS Dataset), an open dataset, was conducted. In addition, in order to solve the class imbalance problem according to the ratio of normal data and attack data, the detection performance according to the oversampling ratio was compared and analyzed using the oversampling technique applied with DCGAN (Deep Convolutional Generative Adversarial Networks). As a result of the experiment, the method preprocessed using the Doc2Vec algorithm for system call feature and process execution path feature showed good performance, and in the case of oversampling performance, when DCGAN was used, improved detection performance was shown.

Thesis of the Metaverse Concept and Proposing Research Direction (메타버스 개념 및 현황에 대한 논의와 향후 연구 방향 제안)

  • Ryu, Sunghan;Yun, Haejung;Park, Jaehyun;Chang, Younghoon
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.1-13
    • /
    • 2022
  • Metaverse has been encountering in our daily lives, and it has dynamically changed people's way of working, educating, and entertaining. During the Covid-19, people has been more immersed with virtual world. For example, the virtual environments have created new form and features of our remote work, online education, entertainment, and so on. Also, some people make a strong tie with their avatar to live in a virtual world. Indeed, it became a new normal life now. With this radical social and technological change, the metaverse has become a core issue for the communities of researchers and practitioners as well, and a variety of meaningful research and products have been conducted so far. Nevertheless, it still is lack of diverse theoretical, empirical, and practical studies, dealing with this huge socio-technical shift with the metaverse. Therefore, in this special issue commentary, we suggest potential metaverse research issues and topics, which highlight how management, organization, and information systems researchers could dance with the ongoing metaverse ecosystem for creating more productive research performances.

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

Development of Practical Problem-Based Home Economics Teaching.Learning Process Plans by Blended Learning Strategy - Focusing on a Unit 'the Youth and Consumer Life' - (Blended Learning(BL) 전략을 활용한 실천적 문제 중심 가정과 교수 학습 과정안 개발 - '청소년과 소비생활' 단원을 중심으로 -)

  • Lee, Jin-Hee;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.19-42
    • /
    • 2008
  • The purpose of this study was to develop practical problem-based home economics teaching.learning process plans about a unit 'the youth and consumer life' of middle school eighth-grade Technology and Home Economics by applying blended learning(BL) strategy. According to ADDIE instructional design model, this study was conducted in the following procedure: analysis, design/development, implementation, and evaluation. In the stage of design and development, the selected unit was converted into a practical problem-based unit, and practical problem-based teaching. learning process plans were designed in detail by using BL strategy. An online study room for practical problem-based home economics instruction grounded in BL strategy was prepared by using Edunet(http://community.edunet4u.net/${\sim}$consumer2). Eight-session lesson plans were mapped out, and study aids for students and materials for teachers were prepared. In the implementation stage, the first-session teaching plans that dealt with a minor question 'what preparations should be made to become a wise consumer' were utilized when instruction was provided to 115 eighth graders who were in three different province, and the other one was in a middle school in the city of Daejeon. The experimental teaching was implemented for two weeks in the following procedure: preliminary program, pre-online learning, main instruction and post- online learning. The preliminary program was carried out in a session in the classroom, and pre-online learning was provided before the main instruction was given in a session in the classroom. After the main instruction was completed, post-online learning was offered. In the evaluation stage, a survey was conducted on all the learners and teachers to find out their opinions and suggestions.

  • PDF

A Study on the Obstacle Factors and the Development Strategy of High Value Occupational Training for Women (여성 고부가가치 직업훈련의 장애요인과 발전방안 연구)

  • Lee, Ji-Eun;Lim, Hee-Jeong
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.181-189
    • /
    • 2019
  • The purpose of this study is to derive obstacle factors to 'high value vocational training' and to suggest development strategies. The training aims to solve the quantitative and qualitative problems of female employment by providing professional training in high value areas such as ICT, SW and knowledge service. To verify the training to meet these objectives, 48 processes operated in 2018 were analyzed and field monitoring was conducted. As a result of the analysis, problems were identified and improvements were derived in terms of learners management, training course design, field practice operation, and performance evaluation. Based on these results, researchers suggested four ways to develop high value vocational training. First, select learners based on combined talent and second, strengthen the project of linking enterprises and structured field practices. Third, establish a performance evaluation system of its own and manage performance and fourth, expand support for excellent training courses and provide consulting for course development. The results of this study are expected to be used as a reference for establishing policies for high value occupational training. In the future, quantitative research should be conducted to clarify the performance and problems.

A Method for Prediction of Quality Defects in Manufacturing Using Natural Language Processing and Machine Learning (자연어 처리 및 기계학습을 활용한 제조업 현장의 품질 불량 예측 방법론)

  • Roh, Jeong-Min;Kim, Yongsung
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.52-62
    • /
    • 2021
  • Quality control is critical at manufacturing sites and is key to predicting the risk of quality defect before manufacturing. However, the reliability of manual quality control methods is affected by human and physical limitations because manufacturing processes vary across industries. These limitations become particularly obvious in domain areas with numerous manufacturing processes, such as the manufacture of major nuclear equipment. This study proposed a novel method for predicting the risk of quality defects by using natural language processing and machine learning. In this study, production data collected over 6 years at a factory that manufactures main equipment that is installed in nuclear power plants were used. In the preprocessing stage of text data, a mapping method was applied to the word dictionary so that domain knowledge could be appropriately reflected, and a hybrid algorithm, which combined n-gram, Term Frequency-Inverse Document Frequency, and Singular Value Decomposition, was constructed for sentence vectorization. Next, in the experiment to classify the risky processes resulting in poor quality, k-fold cross-validation was applied to categorize cases from Unigram to cumulative Trigram. Furthermore, for achieving objective experimental results, Naive Bayes and Support Vector Machine were used as classification algorithms and the maximum accuracy and F1-score of 0.7685 and 0.8641, respectively, were achieved. Thus, the proposed method is effective. The performance of the proposed method were compared and with votes of field engineers, and the results revealed that the proposed method outperformed field engineers. Thus, the method can be implemented for quality control at manufacturing sites.

Construction and Service of a Web-based Cyber-learning Platform for the Computational Science and Engineering Community in Korea (국내 계산과학공학 커뮤니티를 위한 웹 기반 사이버-러닝 플랫폼 구축 및 서비스)

  • Suh, Young-Kyoon;Cho, Kum Won
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.115-125
    • /
    • 2016
  • Recently, many attentions have been paid to conducting convergence research across diverse disciplines. Along with this convergence era, an IT-based multi-disciplinary convergence project, called EDISON (EDucation-research Integrated Simulation On the Net), has been launched to support the studies of researchers engaged in several computational science and engineering (CSE) fields and to boost learning motivations of CSE students. Since 2011, we have been successfully carrying out the EDISON project. EDISON as a cyber-learning platform enables CSE researchers to share their own high-performance computing (HPC) simulation softwares developed to solve their research problems accompanying large-scale computation and I/O and users to run the softwares with little constraints on the web. Also, the EDISON platform has been utilized as lecture material by many universities in Korea. This article introduces the construction and service statistics of this EDISON platform. Specifically, we explicate several distinctions between EDISON and existing other HPC service platforms and discuss a three-layered technical architecture of the EDISON platform. We then present the up-to-date service statistics of EDISON over the past four years. Finally, we conclude this article and describe future plans.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.