• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.038 seconds

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

The Transmission of Tele-Information System using BlueTooth (블루투스를 이용한 웹으로의 원격 의료정보 전송 시스템)

  • 채희영;강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.130-133
    • /
    • 2002
  • As a society advances, an aging phenomenon and many diseases which did not exist in old times are happening. Especially, in case of the aged patient, because we cant know the time the condition of the patients health become worse, the study of the Tele-information system has been actively carried out by the necessity of a persistent observation. A ECG signal a kind of a vital signals has been widely used to the medical information system as an usual clinical diagnosis for the patients who possess heart diseases. BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self - error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, It will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present According to this, Bluetooth module transmits the medical information, which is input from the outside among the operations that use the Bluetooth to the Bluetooth module that is connected the host PC. And the system that the host PC transmits the medical information from the connected Bluetooth module to the Internet has once embedded. this study let the host PC embedded in advance of the existing system and transmit the medical information by the addition of the Tcp/Ip protocol stark under all embedded environments to internet.

  • PDF

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.

A Study of General Population's Awareness and Attitudes Toward Medical Records : Focusing on Open Notes (진료기록에 대한 일반인의 인식과 태도 : 오픈노트(Open Notes) 운동을 중심으로)

  • Choi, Ju-Hee;Chun, Kyung-Ju;Lee, Sang-Ok;Kim, Yoo-Ri;Pak, Ju-Hyun;Chang, Chul-Hun;Kim, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.512-522
    • /
    • 2016
  • The purpose of this study was to investigate general population's awareness and attitudes toward medical records and an 'Open Notes' system which allows the general public to access their medical records anytime on the hospital website. This study also examines the possibility of making the 'Open Notes' system available to Korean medical community and the general public. The results of this study shows that the general population usually used internet for health information. They obtained their medical records from the hospital mostly for the purpose of submitting to insurance company. They also believed that medical records that hospital and doctors provided might be forged or falsified. The majority of them responded that they could trust their doctors and hospitals more if they could have access to their own medical records anytime. Most of the respondents agreed that the Open Notes system would be beneficial for the general public and that it should be implemented in Korea. And they would be willing to participate in the Open Notes system if it is introduced. In conclusion, if the Open Notes system which emphasizes transparency in medical records is introduced, it could enhance the trust between doctor and patient. The trust doctor-patient relation would make patients more likely to comply and be satisfied with doctors.

The Relationship among Service Quality, Customer Satisfaction and Revisit Intention in Food Court - Focusing a Large Discount Store - (푸드코트의 서비스 품질과 고객만족, 재방문의도의 관계분석 연구 - 대형할인점을 중심으로 -)

  • Cho, Woo-Hyeong;Lee, Yeon-Jung
    • Culinary science and hospitality research
    • /
    • v.22 no.2
    • /
    • pp.252-269
    • /
    • 2016
  • This study was conducted to analyze the influence of the service quality of the food court on customer satisfaction, revisit intention in a discount store. Among the 400 surveys, 371 participants were collected and 350 respondents were analyzed for the statistical analysis to verify research purposes. SPSS 21.0 program was used to derive the following: factor analysis, reliability analysis, simple regression, and multiple regression analysis. Results shown that, first, service quality at the discount store can affect the customer's satisfaction. The factors which can affect the customer's satisfaction are type, empathy and credibility but guarantee and reactivity don't affect it. Second, service quality at the discount store can affect a customer's revisiting. The factors which can affect the customer's revisiting are type, guarantee, empathy and credibility but reactivity doesn't affect it. Third, the customer's satisfaction at the discount store can affect the customer's revisit intention. Through this study, food court service quality can affect not only the customers' satisfaction but also consumers' revisit intention. Therefore, the company and the management need to keep researching and developing various menus, customer service training, and hygiene training in order to set the customer at ease along with making a comfortable mood and set up a dine out & meeting system.

The Inplementation of Fault-Tolerant Dual System Using the Hot-Standby Sparing Technique (핫 스탠바이 스페어링 기법을 이용한 고장 감내 이중화 시스템 설계)

  • Shin Jin wook;Park Dong sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10A
    • /
    • pp.1113-1122
    • /
    • 2004
  • This paper is basically to achieve the high-availability and high-reliability of the control system from the implementation of the fault-tolerant system using the hot-standby sparing technique. To meet the objective, we design and implement a board with fault tolerance I/O bus to detect the fault. Warm-standby sparing technique is the fault tolerance technique usually used for switching control system in present. This technique can be easily implemented, but can not detect the fault quickly and can malfunction because of the hardware fault. The hot-standby sparing fault tolerant technique implemented in this paper is consists of dual processor modules and a I/O processor using fault tolerant I/O bus. The proposed method can find the faults as soon as possible, so it can prevent from wrong operation. Also it is possible to normal re-service due to the short recovering time. To implement the fault-tolerant dual system with fault detection be, two daughter, called FTMA and FTIA, boards designed and implemented are applied to the system. And we also simulated the proposed method to verify the high-availability and high-reliability of the control system using Markov process.

The Effects on Parcel Service Satisfaction in Logistics Information Technology of Parcel Company (택배기업의 물류정보기술이 택배서비스 만족도에 미치는 영향 - 인터넷쇼핑몰 택배서비스 이용자 중심 -)

  • Kim, Seon-Gu;Choi, Yong-Seok
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.3
    • /
    • pp.91-112
    • /
    • 2011
  • The rapid growth of e-commerce market and changes in distribution channels and consumption patterns have brought about the continuous growth of the domestic parcel service market. To cope with the growth and environmental changes of the parcel service market, parcel companies have made efforts to improve logistics process and construct an information system for customer satisfaction. Since they have focused on a high quality parcel service through a variety of information technology rather than price competition, the importance of logistics information technology has been greatly perceived. Accordingly, this study examined that how information technology and information system quality of parcel companies was perceived by customers and how it influenced parcel service use and satisfaction. To achieve this purpose, this study developed a valid and reliable measurement instrument for logistics information system quality and customer satisfaction based on literature reviews. Then empirical research was made through a questionnaire survey. As a result, six determinants of logistics information system quality were derived: economy, SMS information, tracking web-site information, stability, speed, and accuracy. All factors but economy were found to have positive effects on customer satisfaction in parcel service. Finally, the theoretical and practical implications of the findings were also discussed.

Impact of Information and Communication Technologies on Spatial Structure (정보화와 정보기술이 공간구조에 미친 영향)

  • 박삼옥;최지선
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.119-144
    • /
    • 2003
  • This study attempts to figure out the impact of Information and communication technologies (ICTs) on spatial structure and to speculate on spatial strategies in the electronic economy from a geographical perspective. The unprecedented development of ICTs based on the explosive use of the Internet was enough to lead to the expectation that physical distance would not be a significant barrier in business activities. In fact, however, at least at a current stage, the development of ICTs has not automatically removed the inequality in spatial structure. The accessibility to electronic space is different by economic and social status within a country as well as between countries. The importance of place, locality, and place-specific assets has been strengthened in the global economy. Physical proximity is still of great importance because it helps to minimize transaction costs, to exploit place-specific social networks, and to accumulate credibility for successful businesses. Likewise, the development of electronic commerce such as B2B and B2C EC also does not necessarily result in the ignorance of place and locality. Rather, the recognition of the importance of spatial strategies is extremely important for the success in online businesses. As a conclusion, the spatial dimension becomes more important in the digital era for successful businesses and balanced regional developments than ever before. The need for the improvement of ICT infrastructures, the development of human resources, and the establishment of regional innovation systems in peripheral areas cannot be overemphasized even in the digital era.

  • PDF

Generator of Dynamic User Profiles Based on Web Usage Mining (웹 사용 정보 마이닝 기반의 동적 사용자 프로파일 생성)

  • An, Kye-Sun;Go, Se-Jin;Jiong, Jun;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.389-390
    • /
    • 2002
  • It is important that acquire information about if customer has some habit in electronic commerce application of internet base that led in recommendation service for customer in dynamic web contents supply. Collaborative filtering that has been used as a standard approach to Web personalization can not get rapidly user's preference change due to static user profiles and has shortcomings such as reliance on user ratings, lack of scalability, and poor performance in the high-dimensional data. In order to overcome this drawbacks, Web usage mining has been prevalent. Web usage mining is a technique that discovers patterns from We usage data logged to server. Specially. a technique that discovers Web usage patterns and clusters patterns is used. However, the discovery of patterns using Afriori algorithm creates many useless patterns. In this paper, the enhanced method for the construction of dynamic user profiles using validated Web usage patterns is proposed. First, to discover patterns Apriori is used and in order to create clusters for user profiles, ARHP algorithm is chosen. Before creating clusters using discovered patterns, validation that removes useless patterns by Dempster-Shafer theory is performed. And user profiles are created dynamically based on current user sessions for Web personalization.