• Title/Summary/Keyword: 사전공격

Search Result 338, Processing Time 0.027 seconds

Analysis of Forwarding Schemes for Push-based Information Service in Connected Vehicles over NDN (커넥티드 차량 엔디엔 네트워크 안에 푸쉬 기반 정보 서비스를 위한 전달 기법 분석)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.280-285
    • /
    • 2021
  • When VNDN technology is used as a communication technology for infotainment application services of connected vehicles, it is possible to realize data-centric networking technology in which data is the subject of communication.Vehicle security attacks and hacks, performance degradation during long-distance data transmission, and frequent data loss It is possible to innovate the limitations of the current host-oriented Internet-based infotainment application service technology of connected vehicles. The data packet forwarding issue to deliver critical information data that is very sensitive to delay in the VNDN on a push-based basis to RSU (Road Side Unit), etc. is one of the issues to be solved for realizing VNDN-based application services. We comprehensively analyze existing forwarding techniques to support push-based data traffic under the environment, and compare and analyze each technique in terms of performance.

Discriminating Risky Drivers Using Driving Behavior Determinants (운전행동 결정요인을 이용한 위험운전자의 판별)

  • Ju Seok Oh ;Soon Chul Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.18 no.3
    • /
    • pp.415-433
    • /
    • 2012
  • This study was conducted in order to explain the effect of driving behavior determinants such as drivers' personality and attitude that may induce risky driving behavior and to develop a valid method for discriminating risky drivers using the determinants. In the results of surveying 534 adult drivers, 5 driving behavior determinants (avoidance of problems, benefit/stimulus seeking, interpersonal anxiety, interpersonal anger, and aggression) were found to have a statistically significant effect on drivers' various risky driving behaviors. Using these factors, drivers were grouped according to risk levels (normal drivers, unintentionally risky drivers, and intentionally risky drivers). This result suggests that drivers' dangerous behavior level can be predicted using psychological factors such as their personality and attitude. Accordingly, if the driving behavior determinant model and the base score system used in this study are improved through further research, they are expected to be useful in predicting drivers' recklessness in advance, identifying problems, and providing differentiated safe driving education services based on the results.

Empirical Study on Correlation between Performance and PSI According to Adversarial Attacks for Convolutional Neural Networks (컨벌루션 신경망 모델의 적대적 공격에 따른 성능과 개체군 희소 지표의 상관성에 관한 경험적 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.2
    • /
    • pp.113-120
    • /
    • 2024
  • The population sparseness index(PSI) is being utilized to describe the functioning of internal layers in artificial neural networks from the perspective of neurons, shedding light on the black-box nature of the network's internal operations. There is research indicating a positive correlation between the PSI and performance in each layer of convolutional neural network models for image classification. In this study, we observed the internal operations of a convolutional neural network when adversarial examples were applied. The results of the experiments revealed a similar pattern of positive correlation for adversarial examples, which were modified to maintain 5% accuracy compared to applying benign data. Thus, while there may be differences in each adversarial attack, the observed PSI for adversarial examples demonstrated consistent positive correlations with benign data across layers.

Effects of Educational Programs Utilizing Forests on Maladjusted Behavior of Mentally Retarded Students (숲을 활용한 교육이 정신지체학생의 부적응행동에 미치는 영향)

  • Park, Kyoung-Lee;Sim, Woo-Kyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.5
    • /
    • pp.64-79
    • /
    • 2010
  • Students with intellectual disabilities typically have great difficulties communicating their needs and wants and may get frustrated, anxious or show signs of aggressive behaviour. They are often unable to understand the concept of relationships with other people as well. This lack of social communication and interaction leads to poor motivation which increases other areas of difficulty in their lives. Therefore, to teach students with intellectual disabilities, it is essential to find special teaching methods to support their positive behavior. This paper proposes that special educational curriculum for students with intellectual impairments utilize natural environments(forests) and materials. The purpose of this study was to investigate the effects of Educational Programs Utilizing Forests on maladjusted behavior of students with mental retardation and to examine the positive effects of such planning practices. The subjects were middle school students who attended a special school for mentally-retarded students. They were divided into two separate groups- an experimental group and a control group. All subjects received the pre and post test using the same method. This program was applied to the formal educational process of middle school from March 1st to October 30th, 2009. In this experiment the results indicate that the effect of using a natural environment(forest) and the materials within a formal educational curriculum was positive as a type of horticultural therapy and that it supports positive behavior strategies in students with intellectual impairments. The usage of various natural materials including plants and flowers within the natural environments provide students with increased opportunities to participate. Teaching methods including natural materials help teachers engage with their students more easily during routine activities as their interest is already stimulated. This project will help students with intellectual impairments to build skills which enable effective participation and increase independence throughout their lives. This should be embedded into both routine and planned activities of the classroom Also, it offers a needed interior plan for the treatment space through an analysis of psychological factors of how the environment affects students.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Effect of Nonpharmacologic Interventions on Behavioral and Psychological Symptoms of Dementia : A Meta-Analysis (치매환자의 행동심리증상에 비약물적 중재가 미치는 효과 - 메타분석)

  • Kwon, Mi-Hwa;Lee, Jae-Shin
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.540-550
    • /
    • 2017
  • To investigate a variety of nonpharmacologic interventions have confirmed what the symptoms and effects, mainly interventions by acting on behavioral and psychological symptoms of dementia was conducted a meta-analysis. Data were collected from online search engines using search words from domestic and foreign article database. The researcher independently and among the pre-post experimental studies published from January 2000 to June 2016, recalled applying for the elderly with dementia presents the effect of treatment group and the control group RCT in this study were included in the study. The results of this meta-analysis showed that, effect size of the nonpharmacologic interventions of total -0.33, occupational therapy - 0.26, multi-sensory stimulation intervention -0.65 was significant beneficial effects to elderly with dementia(p<.05). According to interventions as a major affected the symptoms associated with behavioral problems, mainly aggression, memory-related problem behavior in the home-based program. Also, reminiscence therapy and occupational therapy is generally apathy, multi-sensory stimulation and music therapy was confirmed that there was a major change in behavior anxiety or agitation. The results of this study confirmed that various nonpharmacologic interventions were effective on behavioral psychological symptoms of dementia patients and confirmed the main symptoms of intervention.

The Study of Security System for Candidates for the 17th President (제17대 대통령선거후보자 경호제도에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.43-67
    • /
    • 2007
  • This is the study of efficient security system for candidates for the 17th President. The president election will be held in 20 countries this year. As conflicts between interest groups are expected to emerge, they are afraid of accidental raid in the campaign tour in addition to revival of regionalism and possibility of confrontation between interest groups with issues of anti-FTA In our country. The purpose of this study is to suggest appropriate method through study of security system for president candidate as just 6 months are left for the 17th president election. Also this study covers security environment for the president election, principle of security, and theoretical study for cause of terror, security system domestic and abroad and its analysis and how to provide the efficient security for president candidate. Therefore first, for desirable security the security should be provided by professional org like president security department. Second, combined security for target by current rules should be done. Fourth, total security is necessary to prevent security threats in advance. Third, the public security should be provided for every president candidates. Fifth, example of secret service in America should be studied and economical security should be considered Sixth, we should increase the use of Security Company and martial artists.

  • PDF

Research on R&D requirement planning support strategies to foster arms exports: focused on researching the evaluation model of marketability of weapon systems (방산수출을 고려한 R&D 소요기획 지원전략 연구: 무기체계 시장성 평가모델 연구를 중심으로)

  • Han, Bong-Yoon;Won, Jun-Ho
    • Journal of Technology Innovation
    • /
    • v.20 no.3
    • /
    • pp.93-128
    • /
    • 2012
  • Defense technology planning identifies medium-and long-term core technologies to accomplish future defense goals and suggests strategies for future R&D. In order to promote the export-oriented defense industry, planning paradigms should be shifted from technology-oriented planning that focuses on weapon systems to market- oriented R&D planning. This study aims to strategically support 'preliminary technology planning' the Defense Agency for Technology and Quality is pushing ahead with. Through market-orientation analysis models of weapon systems based on defense R&D planning, data research on previous market-oriented research, and the analyses and examples of global defence markets, it evaluates market attractiveness to UAVs and drew methods for exploring markets and enhancing competitiveness of military equipment. The market-oriented analysis model of weapon systems is considered to be a helpful reference as a relevant factor for decision making on establishing and verifying requirement planning. In particular, if a market-oriented defense R&D planning process is established institutionally, it will enable us to make export strategies tailored to different equipment from the planning phase and to support marketing strategically.

  • PDF

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.