• Title/Summary/Keyword: 정보기술보안

Search Result 5,225, Processing Time 0.039 seconds

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.

A Study on the Next-Generation Coastal Guard System (차세대 해안경계시스템에 관한 연구)

  • Lee, Jang-Il;Shin, Eui-Soo;Cha, Ji-Eun
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.115-138
    • /
    • 2022
  • The Korean military is preparing for successful manpower reduction using advanced science and technology, in addition to carrying out the initiative of the Defense Innovation 4.0. Accordingly, studies on core technologies related to defense reform have been conducted both internally and externally in the military, and the corresponding results have also been applied. Nevertheless, compared to the development of such technologies, it is considered necessary to have more preparation for the policies related to the operation of the newly introduced equipment. As for the placement of personnel and the organization of time in service (TIS) with respect to the operation of surveillance equipment, there has been a tendency to sustain the conventional practice. Therefore, this study intends to suggest the schemes for facilitating policy improvements in the operation of manpower and security regulations in the field of information for the purpose of introducing a successful next-generation coastal guard system. To do this, the approach of this study was focused on the policies for the operation of the guard system. This is in contrast to previous studies that centered on its equipment and technologies. In addition, how to efficiently operate the guard system was also studied in view of cognitive science by deriving the most efficient time for a person to execute surveillance through the monitor based on the previous studies.

  • PDF

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

A Study of Service Innovation in the Airport Industry using AHP (계층화 분석법을 활용한 공항 산업 서비스 혁신 연구)

  • Hong hwan Ahn;Han Sol Lim;Seung Kyun Ra;Bong Gyou Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.71-81
    • /
    • 2024
  • In response to the COVID-19 pandemic, the global airport industry is actively introducing 4th Industrial Revolution technology-based systems for quarantine and passenger safety, and test bed construction and prior verification using airport infrastructure and resources are actively being conducted. Analysis of recent cases shows that despite the changing travel patterns of airport users and the diversification of airport service demands, most testbeds construction studies are still focused on suppliers, and task prioritization is also determined by decision makers. There is a tendency to rely on subjective judgment. In order to find practical ways to become a first mover that leads innovation in the aviation industry, this study selected tasks and derived priorities to build testbeds from a service perspective that reflects various customer service needs and changes. Research results using the AHP analysis method resulted in priorities in the order of access transportation and parking services (29.2%), security screening services (23.4%), and departure services (21.8%), and these analysis results were tested in the airport industry. It shows that innovation in testbeds construction is an important factor. In particular, the establishment of smart parking and UAM transportation testbeds not only helps strengthen airports as centers of technological innovation, but also promotes cooperation with companies, research institutes, and governments, and provides an environment for testing and developing new technologies and services. It can be a foundation for what can be done. The results and implications produced through this study can serve as useful guidelines for domestic and foreign airport practitioners to build testbeds and establish strategies.

Heterostructures of SnO2-Decorated Cr2O3 Nanorods for Highly Sensitive H2S Detection (고감도 H2S 감지를 위한 SnO2 장식된 Cr2O3 nanorods 이종구조)

  • Jae Han Chung;Yun-Haeng Cho;Junho Hwang;Su hyeong Lee;Seunggi Lee;See-Hyung Park;Sungwoo Sohn;Donghwi Cho;Kwangjae Lee;Young-Seok Shim
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.1
    • /
    • pp.40-47
    • /
    • 2024
  • The creation of vertically aligned one-dimensional (1D) nanostructures through the decoration of n-type tin oxide (SnO2) on p-type chromium oxide (Cr2O3) constitutes an effective strategy for enhancing gas sensing performance. These heterostructures are deposited in multiple stages using a glancing angle deposition technique with an electron beam evaporator, resulting in a reduction in the surface porosity of the nanorods as SnO2 is incorporated. In comparison to Cr2O3 films, the bare Cr2O3 nanorods exhibits a response 3.3 times greater to 50 ppm H2S at 300℃, while the SnO2-decorated Cr2O3 nanorods demonstrate an eleven-fold increase in response. Furthermore, when subjected to various gases (CH4, H2S, CO2, H2), a notable selectivity toward H2S is observed. This study paves the way for the development of p-type semiconductor sensors with heightened selectivity and sensitivity towards H2S, thus advancing the prospects of gas sensor technology.

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Design and Implementation of a Backup System for Object based Storage Systems (객체기반 저장시스템을 위한 백업시스템 설계 및 구현)

  • Yun, Jong-Hyeon;Lee, Seok-Jae;Jang, Su-Min;Yoo, Jae-Soo;Kim, Hong-Yeon;Kim, Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2008
  • Recently, the object based storage devices systems(OSDs) have been actively researched. They are different from existing block based storage systems(BSDs) in terms of the storage unit. The storage unit of the OSDs is an object that includes the access methods, the attributes of data, the security information, and so on. The object has no size limit and no influence on the internal storage structures. Therefore, the OSDs improve the I/O throughput and the scalability. But the backup systems for the OSDs still use the existing backup techniques for the BSDs. As a result, they need much backup time and do not utilize the characteristics of the OSDs. In this paper, we design and implement a new object based backup system that utilizes the features of the OSDs. Our backup system significantly improves the backup time over existing backup systems because the raw objects are directly transferred to the backup devices in our system. It also restores the backup data much faster than the existing systems when system failures occur. In addition, it supports various types of backup and restore requests.

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.

Implementation of Web Services Framework for Web Services on Universal Networks (유니버설 네트워크 상에서 웹서비스 프레임워크 구현)

  • Yim, Hyung-Jun;Oh, Il-Jin;Hwang, Yun-Young;Lee, Kyong-Ha;Lee, Kang-Chan;Lee, Seung-Yun;Lee, Kyu-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.143-157
    • /
    • 2008
  • Ubiquitous Web Services is able to be specified future Web Services technology for connecting with various application services in any device and network environments. The devices, in ubiquitous environment, have dynamic characteristic such as location and statuse. So, we must support methods of dynamic service discovery in ad-hoc network. There are many related works at transaction, security, QoS, semantic and Web Services composition with various fields. Recently, the studies are interested in the Ubiquitous by development of computing and network technology. However, they are an early stage. For this reason, in this paper, we propose a WSUN(Web Services on Universal Networks) for Ubiquitous Web Services. It is a SOA based framework. And this paper extracts necessity of WSUN environment from scenario. The framework is composed of US Broker(Universal Service Broker). It is designed for satisfying the conditions and supports dynamic service discovery using a US Registry (Universal Service Registry). Consequently. clients are able to discover and use Universal Service by protocol stack of the US Broker for Web Services. And it is a strong point which supports interoperability between heterogeneous networks.

Novel Extraction Method for Unknown Chip PDN Using De-Embedding Technique (De-Embedding 기술을 이용한 IC 내부의 전원분배망 추출에 관한 연구)

  • Kim, Jongmin;Lee, In-Woo;Kim, Sungjun;Kim, So-Young;Nah, Wansoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.6
    • /
    • pp.633-643
    • /
    • 2013
  • GDS format files, as well as layout of the chip are noticeably needed so as to analyze the PDN (Power Delivery Network) inside of IC; however, commercial IC in the market has not supported design information which is layout of IC. Within this, in terms of IC having on-chip PDN, characteristic of inside PDN of the chip is a core parameter to predict generated noise from power/ground planes. Consequently, there is a need to scrutinize extraction method for unknown PDN of the chip in this paper. To extract PDN of the chip without IC circuit information, the de-embedding test vehicle is fabricated based on IEC62014-3. Further more, the extracted inside PDN of chip from de-embedding technique adopts the Co-simulation model which composes PCB, QFN (Quad-FlatNo-leads) Package, and Chip for the PDN, applied Co-simulation model well corresponds with impedance from measured S-parameters up to 4 GHz at common measured and simulated points.