• Title/Summary/Keyword: 식별기술

Search Result 2,119, Processing Time 0.026 seconds

RFA: Recursive Feature Addition Algorithm for Machine Learning-Based Malware Classification

  • Byeon, Ji-Yun;Kim, Dae-Ho;Kim, Hee-Chul;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.61-68
    • /
    • 2021
  • Recently, various technologies that use machine learning to classify malicious code have been studied. In order to enhance the effectiveness of machine learning, it is most important to extract properties to identify malicious codes and normal binaries. In this paper, we propose a feature extraction method for use in machine learning using recursive methods. The proposed method selects the final feature using recursive methods for individual features to maximize the performance of machine learning. In detail, we use the method of extracting the best performing features among individual feature at each stage, and then combining the extracted features. We extract features with the proposed method and apply them to machine learning algorithms such as Decision Tree, SVM, Random Forest, and KNN, to validate that machine learning performance improves as the steps continue.

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

HTML Tag Depth Embedding: An Input Embedding Method of the BERT Model for Improving Web Document Reading Comprehension Performance (HTML 태그 깊이 임베딩: 웹 문서 기계 독해 성능 개선을 위한 BERT 모델의 입력 임베딩 기법)

  • Mok, Jin-Wang;Jang, Hyun Jae;Lee, Hyun-Seob
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.17-25
    • /
    • 2022
  • Recently the massive amount of data has been generated because of the number of edge devices increases. And especially, the number of raw unstructured HTML documents has been increased. Therefore, MRC(Machine Reading Comprehension) in which a natural language processing model finds the important information within an HTML document is becoming more important. In this paper, we propose HTDE(HTML Tag Depth Embedding Method), which allows the BERT to train the depth of the HTML document structure. HTDE makes a tag stack from the HTML document for each input token in the BERT and then extracts the depth information. After that, we add a HTML embedding layer that takes the depth of the token as input to the step of input embedding of BERT. Since tokenization using HTDE identifies the HTML document structures through the relationship of surrounding tokens, HTDE improves the accuracy of BERT for HTML documents. Finally, we demonstrated that the proposed idea showing the higher accuracy compared than the accuracy using the conventional embedding of BERT.

A Study on the air traffic control system of Korea Light Aircraft Carrier (한국형 경항공모함 항공관제체계에 대한 연구)

  • Choi, Youn-chul;Jung, Yong-tae;Cho, Young-jin
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.272-280
    • /
    • 2022
  • An aircraft carrier is a combat ship that acts as an aircraft base at sea and performs combat through aircraft mounted as a military ship operating the aircraft. The Navy proposed a 40,000-ton light aircraft carrier operation plan that could be equipped with vertical takeoff and landing fighter jets and helicopters around 2033, and based on this, this study examined the operation of aircraft control equipment among the aviation support systems required for operating light aircraft carriers in Korea. PriFly, TWR's ILARTS, ILM for airspace control, ASR, PAR, LAAS or RNAV, PALS (JPALS) for access control are required as essential equipment, and communication network and SCATT-16 are required along with URN-25 TACAN, ICLS (El/Az), ACLS OLS, MOVAS, IFLOLS, etc. This study consists of two parts, and part 2 will describe a specific control method on an aircraft carrier.

Multi-Dimensional Analysis on Entrepreneurship Studies in the 'Asia Pacific Journal of Small Business (APJSB)' ('중소기업연구' 학술지 기업가정신 연구 동향에 관한 다차원 분석)

  • Lee, Jungwoo
    • Korean small business review
    • /
    • v.43 no.1
    • /
    • pp.131-145
    • /
    • 2021
  • This study aims to diagnose research trends and to deduct implications from meta analysis of entrepreneurship studies in the Asia Pacific Journal of Small Business (APJSB), one of the most well-known academic journals in management and entrepreneurship field in Korea. Frequency and crossover analysis are executed in multi-dimensions by time period, topic, author, research level, data, and methodology by complete enumeration of every published paper for 40 years in APJSB which included core terms of entrepreneurship in its title, abstract, or keywords. From objective and quantitative schematization of research trends and characteristics of entrepreneurship studies, novel improvement plans which are highly applicable in research fields are suggested such as diversification of studies from ecosystem perspective, identification of authors, and standardized system of extended abstract of research papers. Implications and suggestions derived from the results propose future research directions and tasks when entrepreneurship studies have been rapidly increased. Furthermore, the innovation plans of management system of journals and papers are expected to contribute promotion of entire studies by significantly reducing trial and error, and inefficiency in research process.

Implementation of Barrier-free Content by using Virtual Reality and Geospatial Information (가상현실과 공간정보를 이용한 배리어 프리 콘텐츠 개발에 관한 연구)

  • Kim, Byeongsun;Jeon, Haechan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.193-202
    • /
    • 2021
  • Barrier-free is defined as inclusive design of built environments such as building and its facilities that can be approached, entered and used by persons with disabilities. The purpose of this paper develops the content that can identify the physical barriers in the way of movement and provide information associated with barrier-free by using both Geospatial Information and Virtual Reality technology. For this, we conducted literature reviews to find the tackling barriers in terms of barrier-free access and extracted main functions to construct the content. Then, the prototype model which composed of VR engine and 3D geospatial data was implemented, and finally the utilization of the prototype was checked in accordance with barrier-free scenario. The developed prototype model of this study would be contributed to design the barrier-free of public places and access to public buildings for the mobility-disabled people.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

Development of Configuration Management Methodology for Rocket Development Test Facilities (발사체 개발 시험시설의 형상관리 방법론 개발)

  • Jeon, Chanmin;Choi, Minchan;Park, Taekeun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.3
    • /
    • pp.31-41
    • /
    • 2023
  • This study is a study to develop a configuration management methodology for efficient and systematic management in the event of configuration changes such as deformation, explosion, and remodeling of launch vehicle development test facilities, which are emerging as important national facilities in the era of full-scale space competition. Through the analysis of international standards for configuration management, a configuration management process framework to be applied to launch vehicle development test facilities is extracted, a survey was conducted on experts who performed life cycle engineering of launch vehicle development test facilities, and a configuration management methodology optimized for operation/management of domestic launch vehicle development test facilities was proposed. Identify the configuration for launch vehicle development test facilities, the configuration management manager, configuration management organization, and configuration management board approve/process the configuration changes, and after construction is completed according to design requirements, launch vehicle development test facilities try to manage the configuration in a controlled state.

Improvement of Administration Information Dataset Transfer Tools 'SIARD_KR' (행정정보 데이터세트 이관도구 SIARD_KR의 개선방안)

  • Byeon, Woo-Yeong;Yim, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.195-217
    • /
    • 2022
  • SIARD_KR is an administrative information dataset preservation tool. It is a partially modified version of SIARD, technology used for long-term preservation of relational databases developed by the Swiss Federal Archives, to suit Korea's situation better. Previous studies have focused on how SIARD is able to effectively extract all data contained in the relational database without loss. However, not all data contained in the database is meaningful information, that is, an administrative information dataset. This paper began, therefore, with the awareness of the problem of whether SIARD_KR reflects the characteristics of the administrative information dataset. SIARD_KR is not only a tool for extracting data stored in the DB. We want to see if it is capable of identifying and extracting only meaningful information, and maintaining meaningful information, even if it is separated from the original system. The purpose of this paper is to analyze the structure of SIARD_KR, identify expected problems, and suggest improvement measures for them.

Study on Robust Differential Privacy Using Secret Sharing Scheme (비밀 분산 기법을 이용한 강건한 디퍼렌셜 프라이버시 개선 방안에 관한 연구)

  • Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.311-319
    • /
    • 2017
  • Recently invasion of privacy problem in medical information have been issued following the interest in secondary use of large medical information. These large medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to the privacy laws such as Privacy Act and Medical Law, these informations including patients or health professionals' personal information are difficult to utilize secondary. Accordingly, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we study differential privacy processing procedure, one of various methods, and find out about the differential privacy problem using Laplace noise. Finally, we propose a new method using the Shamir's secret sharing method and symemetric key encryption algorithm such as AES for this problem.