• Title/Summary/Keyword: 원동

Search Result 880, Processing Time 0.024 seconds

Privacy Preserving Data Publication of Dynamic Datasets (프라이버시를 보호하는 동적 데이터의 재배포 기법)

  • Lee, Joo-Chang;Ahn, Sung-Joon;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.139-149
    • /
    • 2008
  • The amount of personal information collected by organizations and government agencies is continuously increasing. When a data collector publishes personal information for research and other purposes, individuals' sensitive information should not be revealed. On the other hand, published data is also required to provide accurate statistical information for analysis. k-Anonymity and ${\iota}$-diversity models are popular approaches for privacy preserving data publication. However, they are limited to static data release. After a dataset is updated with insertions and deletions, a data collector cannot safely release up-to-date information. Recently, the m-invariance model has been proposed to support re-publication of dynamic datasets. However, the m-invariant generalization can cause high information loss. In addition, if the adversary already obtained sensitive values of some individuals before accessing released information, the m-invariance leads to severe privacy disclosure. In this paper, we propose a novel technique for safely releasing dynamic datasets. The proposed technique offers a simple and effective method for handling inserted and deleted records without generalization. It also gives equivalent degree of privacy preservation to the m-invariance model.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack (연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석)

  • Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.185-190
    • /
    • 2009
  • As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.

Global Value Chain Change and Government R&D Investment Strategy due to Trade Dispute with Japan - Focussing on Automobile Industry (대일 무역분쟁으로 인한 글로벌 가치사슬 변화와 정부 R&D 투자전략 - 자동차산업을 중심으로 -)

  • Jung, Jae-Woong;Won, Dong-Kyu;Kim, Kwang-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.12-23
    • /
    • 2021
  • Due to high proportion of exports, Korea has a higher dependence on the global value chain (GVC) than other major developed countries. This reason, Korea has a structure that is sensitive to GVC changes. This is because Korean exports are concentrated on specific countries and items, and most of the materials for export tend to depend on imports. Currently, export restrictions resulting from trade disputes with Japan can affect the industry of Korea as a whole due to the supply of core materials. Therefore, in order to minimize economic damage caused by export regulations in the current situation, it is necessary to reorganize the GVC, through efforts to rapidly diversify imports and localize imports that depend on Japan. To this end, it is necessary to derive and classify imported goods that depend on Japan, and to localize items that are difficult to diversify imports, and prompt R&D investment is required for this. This study aims to support R&D investment policy through quantitative analysis based on big data rather than a decision-making method based on expert-centered qualitative analysis.

Examining Economic Activities of Disabled People Using Media Big Data: Temporal Trends and Implications for Issue Detection (언론 빅데이터를 이용한 장애인 경제활동 분석: 키워드의 시기별 동향과 이슈 탐지를 위한 시사점)

  • Won, Dong Sub;Park, Han Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.548-557
    • /
    • 2021
  • The purpose of this study was to determine the statistical usefulness of using atypical text data collected from media that are easy to collect to overcoming limits of the existing data related to economic activities of disabled people. In addition, by performing semantic network analysis, major issues by period that could not be grasped by statistical analysis were also identified. As a result, semantic network analysis revealed that the initiative of the public sector, such as the central and local government bodies, was strongly shown. On the other hand, in the private purchase sector, it was also possible to confirm the consumption revitalization trend and changes in production activities in the recent issue of Covid-19. While the term "priority purchase" had a statistically significant relation with the other two terms "vocational rehabilitation" and "employment for the disabled". For the regression results, while the term "priority purchase" had a statistically significant association with the other two terms "vocational rehabilitation" and "employment for the disabled". Further, some statistical analyses reveal that keyword data taken from media channels can serve as an alternative indicator. Implications for issue detection in the field of welfare economy for the disabled is also discussed.

Malicious Traffic Classification Using Mitre ATT&CK and Machine Learning Based on UNSW-NB15 Dataset (마이터 어택과 머신러닝을 이용한 UNSW-NB15 데이터셋 기반 유해 트래픽 분류)

  • Yoon, Dong Hyun;Koo, Ja Hwan;Won, Dong Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.99-110
    • /
    • 2023
  • This study proposed a classification of malicious network traffic using the cyber threat framework(Mitre ATT&CK) and machine learning to solve the real-time traffic detection problems faced by current security monitoring systems. We applied a network traffic dataset called UNSW-NB15 to the Mitre ATT&CK framework to transform the label and generate the final dataset through rare class processing. After learning several boosting-based ensemble models using the generated final dataset, we demonstrated how these ensemble models classify network traffic using various performance metrics. Based on the F-1 score, we showed that XGBoost with no rare class processing is the best in the multi-class traffic environment. We recognized that machine learning ensemble models through Mitre ATT&CK label conversion and oversampling processing have differences over existing studies, but have limitations due to (1) the inability to match perfectly when converting between existing datasets and Mitre ATT&CK labels and (2) the presence of excessive sparse classes. Nevertheless, Catboost with B-SMOTE achieved the classification accuracy of 0.9526, which is expected to be able to automatically detect normal/abnormal network traffic.

Investigation of an Acceptable Hemolysis Index Using Re-collected Samples (재채혈된 검체를 이용한 허용 Hemolysis Index에 대한 연구)

  • Hong Bum KIM;Dong Il WON;Kyoung Ae SON;Jin Man KIM;Yu Jin WOO
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.56 no.1
    • /
    • pp.32-42
    • /
    • 2024
  • This study compared the results of hemolyzed samples and re-collected samples to investigate a hemolysis influence and an acceptable hemolysis index (HI). Before and after hemolysis, alkaline phosphatase (ALP), aspartate aminotransferase (AST), alanine aminotransferase (ALT), amylase (Amy), direct bilirubin (D-bil), total bilirubin (T-bil), creatine phosphokinase (CK), gamma glutamyl transferase (GGT), iron, potassium (K), lactate dehydrogenase (LDH), magnesium (Mg), phosphorus (Phos), total protein (TP), and uric acid (UA) showed significant results in the paired t-test. LDH, K, iron, AST, CK, GGT, TP, Amy and Phos had a high correlation between the degree of hemolysis and the results of samples. When comparing Roche's cut-off HI with HIQChigh obtained using quality control (QC) high standard deviation (SD), AST, D-bil, CK, and LDH were similar, but Amy, GGT, K, iron, Phos, and TP were lower than the cut-off HI of Roche, while ALP and ALT were higher. Some analytes which showed no significant results in the paired t-test, were found to have significant results in HI>200. Hence, it is suggested that the hemolyzed sample should be rejected if HI>200. Based on this study that some analytes were affected when HI<100, we recommend to set the standard of hemolysis starting from HI>50.

The Chemical Composition of the Nagdong River Downstream Water (낙동강 하류수의 수질조성에 대하여)

  • WON Jong Hun;LEE Bae Jung
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.14 no.2
    • /
    • pp.47-58
    • /
    • 1981
  • Relationships between the electrical conductivity and the contents of the chloride, sulfate, calcium, magnesium, sodium, potassium and total major inorganic ions, and between each, chemical conservative constituents were calculated with the data which sampled at the lesions of Mulgeum and between Namji and Wondong from March 1974 to April 1980. Semilogarithmic relations were found between the electrical conductivity and the contents of monovalent ions, and logarithmic relations were found between the electrical conductivity and the contents of divalent ions at the both regions. The relational equations between the electrical conductivity $\lambda_{25}$and the contents of the major inorganic ions at Mulgeum are as follows: $log\;Cl(ppm)\;=\;2.37{\cdot}\lambda_{25}(m{\mho}/cm)+0.733{\pm}0.141$, $log\;SO_4(ppm)=1.12{\cdot}log\lambda_{25}(m{\mho}/cm)+2.14{\pm}0.18$, $log\;Ca(ppm)=0.615{\cdot}log\lambda_{25}(m{\mho}/cm)+1.67{\pm}0.12$, $log\;Mg(ppm)=0.756{\cdot}log\lambda_{25}(m{\mho}/cm)+1.27{\pm}0.11$, $log\;Na(ppm)=2.82{\cdot}\lambda_{25}(m{\mho}/cm)+0.551{\pm}0.133$, $log\;K(ppm)=1.33{\cdot}\lambda_{25}(m{\mho}/cm)+0.136{\pm}0.095$, and total inorganic ions $C(ppm)=399{\cdot}\lambda_{25}(m{\mho}/cm)-0.9{\pm}14.6$. The relational equations between the electrical conductivity ($\lambda_{25}$) and the contents of the major inorganic ions at the region between Namji and Wondong a.e as follows: $log\;Cl(ppm)=4.27{\cdot}\lambda_{25}(m{\mho}/cm)+0.380{\pm}0.138$, $log\;SO_4(ppm)=0.915{\cdot}log\lambda_{25}(m{\mho}/cm)+1.95{\pm}0.18$, $log\;Ca(ppm)=0.756{\cdot}log\lambda_{25}(m{\mho}/cm)+1.74{\pm}0.12$, $log\;Mg(ppm)=1.00{\cdot}log\lambda_{25}(m{\mho}/cm)+1.41{\pm}0.10$. $log\;Na(ppm)=2.47{\cdot}\lambda_{25}(m{\mho}/cm)+0.614{\pm}0.065$, $log\;K(ppm)=1.62{\cdot}\lambda_{25}(m{\mho}/cm)+0.030{\pm}0.060$, and total inorganic ions $C(ppm)=323{\cdot}\lambda_{25}(m{\mho}/cm)+11.7{\pm}9.3$. Logarithmic relations were found between each chemical conservative constituents at Mulgeum and the equations are as follows: $log\;Cl(ppm)=0.711{\cdot}log\;SO_4(ppm)+0.488{\pm}0.206$, $log\;Cl(ppm)=0.337{\cdot}log\;Ca(ppm)+0.822{\pm}0.130$, $log\;Cl(ppm)=0.605{\cdot}log\;Mg(ppm)-0.017{\pm}0.154$, $Cl(ppm)=0.676{\cdot}Na(ppm)+2.31{\pm}4.67$, $log\;Cl(ppm)=0.406{\cdot}log\;K(ppm)-0.092{\pm}0.112$, $log\;SO_4(ppm)=0.378{\cdot}log\;Ca(ppm)+0.721{\pm}0.125$, $log\;SO_4(ppm)=0.462{\cdot}log\;Mg(ppm)+0.107{\pm}0.118$, $log\;SO_4(ppm)=0.592{\cdot}log\;Na(ppm)+0.313{\pm}0.191$, $log\;SO_4(ppm)=0.308{\cdot}log\;K(ppm)-0.019{\pm}0.120$, $Ca(ppm)=0.262{\cdot}Mg(ppm)+0.74{\pm}1.71$. $log\;Ca(ppm)=1.10{\cdot}log\;Na(ppm)-0.243{\pm}0.239$, $Ca(ppm)=0.0737{\cdot}K(ppm)+1.26{\pm}0.73$, $log\;Mg(ppm)=0.0950{\cdot}Na(ppm)+0.587{\pm}0.159$, $log\;Mg(ppm)=0.0518{\cdot}K(ppm)+0.111{\pm}0.102$, and $Na(ppm)=0.0771{\cdot}K(ppm)+1.49{\pm}0.59$. Logarithmic relations were found between each chemical conservative constituents except a relationship between the chloride and calcium contents at the region between Namji and Wondong, and the equations are as follows : $log\;Cl(ppm)=0.312{\cdot}log\;SO_4(ppm)+0.907{\pm}0.210$, $log\;Cl(ppm)=0.458{\cdot}log\;Mg(ppm)+0.135{\pm}0.130$, $Cl(ppm)=0.484{\cdot}logNa(ppm)+0.507{\pm}0.081$, $Cl(ppm)=0.0476{\cdot}K(ppm)+1.41{\pm}0.34$, $log\;SO_4(ppm)=0.886{\cdot}log\;Ca(ppm)+0.046{\pm}0.050$, $log\;SO_4(ppm)=0.422{\cdot}log\;Mg(ppm)+0.139{\pm}0.161$, $log\;SO_4(ppm)=0.374{\cdot}log\;Na(ppm)+0.603{\pm}0.140$, $log\;SO_4(ppm)=0.245{\cdot}log\;K(ppm)+0.023{\pm}0.102$, $log\;Ca(ppm)=0.587{\cdot}log\;Mg(ppm)+0.003{\pm}0.088$, $log\;Ca(ppm)=0.892{\cdot}log\;Na(ppm)+0.028{\pm}0.109$, $log\;Ca(ppm)=0.294{\cdot}log\;K(ppm)-0.001{\pm}0.085$, $log\;Mg(ppm)=0.600{\cdot}log\;Na(ppm)+0.674{\pm}0.120$, $log\;Mg(ppm)=0.440{\cdot}log\;K(ppm)+0.038{\pm}0.081$, and $log\;Na(ppm)=0.522{\cdot}log\;K(ppm)-0.260{\pm}0.072$.

  • PDF

The Efficacy of Interferon(IFN)-${\gamma}$ in Idiopathic Pulmonary Fibrosis (특발성 폐섬유화증에서 Interferon-${\gamma}$의 효과)

  • Park, Joo Hun;Oh, Yeon Mok;Shim, Tae Sun;Lim, Chae-Man;Koh, Younsuck;Lee, Sang-Do;Kim, Woo Sung;Kim, Won Dong;Kim, Dong Soon
    • Tuberculosis and Respiratory Diseases
    • /
    • v.56 no.6
    • /
    • pp.611-618
    • /
    • 2004
  • Background : Idiopathic pulmonary fibrosis(IPF), a subtype of IIP(idiopathic interstitial pneumonia), is a fatal disease with a 3-5 year median survival. Many attempts at treating this condition have failed to demonstrate a survival benefit in IPF. Recently Ziesche et $al^{12}$ reported the efficacy of IFN-${\gamma}$ for treating IPF but there is still some controversy. The aim of this study was to determine the efficacy of IFN-${\gamma}$ in patients with advanced IPF who had not been responsive to steroid and cytotoxic agents. Method : Nine patients with advanced IPF(age: $55.4{\pm}15.3$ years, Male: Female=8:1) were enrolled. One year treatment regime with 2 million IU of IFN-${\gamma}$ administered subcutaneously three times a week, and low dose prednisolone(10-30 mg/d) was also used. In the case of a definite aggravation and serious side effects, the IFN-${\gamma}$ was discontinued. During the IFN-${\gamma}$ trial, a pulmonary function test and chest radiography were checked every three month throughout the study. Result : 1) Among 9 patients, only 4 patients were able to complete the 12 month treatment with IFN-${\gamma}$, and 5 patients died during the treatment period. 2) No improvement either in the respiratory symptoms or pulmonary functions were observed any of the patients, even in those who completed the 12 months trial of IFN-${\gamma}$, 3) At the time of IFN-${\gamma}$ trial, the survivors who finished the IFN-${\gamma}$ treatment for 12 months had a higher oxygen level($81.3{\pm}2.8$ vs. $67.4{\pm}8.4$, P=0.024) and a better pulmonary function(FVC: $61.3{\pm}5.1$ % predicted vs. $45.7{\pm}12.3%$, P=0.048, and $D_Lco$: $45.0{\pm}5.0%$ predicted vs. $30.8{\pm}11.2%$, P=0.048) than the non-survivors. Conclusion : Our data suggested that IFN-${\gamma}$ therapy was not effective in the patients with advanced IPF refractory compared with other therapeutic agents. Furthermore, these results suggest that severe impairment of the pulmonary function and hypoxemia during the IFN-${\gamma}$ therapy requires special attention.

Prevalence of NTM Pulmonary Infection in the Patients with Bronchiectasis (기관지확장증 환자에서 폐 비결핵성 마이코박테리아증의 유병률)

  • Lee, Jung Yeon;Song, Jae-Woo;Hong, Sang-Bum;Oh, Yeon-Mok;Lim, Chae-Man;Lee, Sang Do;Koh, Younsuck;Kim, Woo Sung;Kim, Dong Soon;Kim, Won Dong;Shim, Tae Sun
    • Tuberculosis and Respiratory Diseases
    • /
    • v.57 no.4
    • /
    • pp.311-319
    • /
    • 2004
  • Background : It has been well known that bronchiectasis (BE) is a predisposing condition for pulmonary NTM infection, whereas there are some suggestions that BE, especially nodular BE, may be a result of NTM pulmonary infection. This retrospective study was done to investigate the prevalence of NTM pulmonary infection in the patients with BE. Methods : Eight hundred sixty-six patients, who underwent chest CT and sputum AFB examination and had BE detected by chest CT at Asan Medical Center in 2002, were included in this study. They were divided into Group I (bilateral BE, especially in RML, lingular or both lower lobes; 134), Group II (BE accompanied with fibrocavitary lesions commonly found in tuberculosis, usually both upper lobes; 233) and Group III (except Group I, II; 499) according to the radiological findings. Group I was subdivided into Group I+ (62) or Group I- (72) according to the presence or absence of centrilobular nodules, respectively. The sputum AFB examination, clinical and radiological findings were analyzed and compared between groups. Results : The number of patients who had at least one positive NTM culture was significantly higher in Group I+ compared with others (p<0.05); 24.2% in Group I+, 6.9% in Group I-, 9.9% in Group II, 6.0% in Group III and 4.1% in control. The number of patients who had true NTM infection defined by ATS guideline was higher in Group I+ (5, 8.1%) compared with others (p<0.05). In all groups, M. avium-intracellulare comlex was the most common isolates. Conclusion : Even though true NTM pulmonary disease was more prevalent in the patients with nodular BE, especially located in RML, left linguar, or both lower lobes, only a small population of the patients with nodular BE met the ATS diagnostic criteria for NTM pulmonary disease. The other patients in nodular BE group may have subclinical stage of NTM infection or completely different diseases from NTM infection. Long-term clinical studies are needed to clarify this issue.