• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.026 seconds

Development of Walkability Search System (보행친화도 검색 시스템 개발)

  • Kim, Eun Jung;An, Donghyeok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.12
    • /
    • pp.987-997
    • /
    • 2019
  • Walk score, walkablity index of built environmental condition, has developed and used in everyday life in United States. The purpose of this study is to produce walk score in Seoul, and to develop computer-based walk score system for improving it's usage. This study covers city of Seoul, and the unit of spatial analysis is 100m × 100m grid cell. This study uses same methodology with walk score in US, the Geographic Information Systems(GIS) is used for calculating the values of walk score(N=58,062). This study implemented Java-based system that utilizes walk score dataset(latitude, longitude, and walk score). This system provided search functions including both lat/long-based and address-based options. Meanwhile, this system was designed to provide the closest value of walk score in dataset if location did not match the certain points in dataset. This study has significance to provide walk score system being easily available to all.

Development for establishing Big Data-based alley commercial area (빅데이터 기반 골목상권 영역설정 방법론 개발)

  • Hwang, Dong-Hyun;Ko, Kyeong-Seok;Park, Sang-June;Kim, Wan-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.784-792
    • /
    • 2018
  • In this study, we designed the area except the development market and the traditional market, where large scale shops were concentrated by realizing the real estate center of the alley commercial area. In addition, we have developed an area setting method for the alley area where reliability and rationality can be ensured by utilizing the actual data such as the business statistics, the survey data of the business, and the store business DB, which are managed by the local government or the state. The alley commercial areas were classified into five groups according to density. It is thought that users can distinguish the commercial areas from dense commercial areas to the commercial areas in order to utilize various commercial areas.

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.

Polar Remote Sensing in Korea (한국의 극지 원격탐사)

  • Kim, Hyun-Cheol;Hong, Sang-Hoon;Park, Sang-Eun;Lee, Hoonyol
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_2
    • /
    • pp.1155-1163
    • /
    • 2018
  • Recently, much attention has been focused on the change and role of the Arctic region due to climate change. Studies using various platforms are being conducted in the polar regions. Among them, monitoring of Arctic cryosphere information using remote sensing is the most important observational role of various scientific activities. This special issue introduces several studies on polar exploration monitoring in polar research. We hope that this special issue contributes to the sharing of information on the role of polar exploration in remote areas, as well as the identification of the current status of domestic polar exploration and remote environmental exploration. We are also looking forward to the efforts of Korean remote sensing experts to find out the persistent polar exploration field and to increase national support.

A New SC-FDE Transmission Structure for Coping with Narrow Band Jammers and Reducing Pilot Overhead (협대역 재머 대응과 파일럿 오버헤드 감소를 위한 새로운 SC-FDE 전송구조)

  • Joo, So-Young;Choi, Jeung-Won;Kim, Dong-Hyun;Jeong, Eui-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.981-987
    • /
    • 2019
  • In this paper, we propose a new SC-FDE (single carrier frequency domain equalization) structure to cope with narrow band interference signals or jammers and reduce pilot overhead. The conventional SC-FDE structure has a problem that the receiver performance degrades severely due to difficulty in time-domain channel estimation when narrow band jammers exist. In addition, the spectral efficiency is lowered by transmitting pilot at every SC-FDE block to estimate channel response. In order to overcome those problems, the proposed structure is devised to estimate frequency domain channel directly without time domain channel estimation. To reduce the pilot overhead, several data blocks are transmitted between two pilots. The channel estimate of each data block is found through linear interpolation of two channel estimates at two pilots. By performing frequency domain channel equalization using this channel estimate, the distortion by the channel is well compensated when narrow band jammers exist. The performance of the proposed structure is confirmed by computer simulation.

A New framework for IP Traceback : Inference of Logical Topology by Measuring Packet Losses (IP 역추적을 위한 새로운 접근 : 패킷 손실 기반의 논리적 전송 경로 추정)

  • 이준엽;이승형;양훈기;고재영;강철오;정주영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.39-47
    • /
    • 2002
  • This paper deals with study of a new framework for the traceback of distributed DoS(Denial of Service) attacks in the Internet, in which many sources flood "spoofed" IP packets towards a single victim. In our scheme, the destination host traces those anonymous packets' losses, and infers the logical end-to-end paths back towards the sources. This method is based on the fact that there is a strong correlation between packet losses when those packets traverse along a same route, and the simulation results show high probabilities of detecting the topology under a certain condition. Compared with previous approaches, our scheme has a number of distinct features: It can be performed in realtime or non-realtime, without any supports of routers or ISPs. Our results may be applied to the inference of physical topology and to support previous approaches.pproaches.

Lightweight IP Traceback Mechanism on IPv6 Network Environment (IPv6 네트워크 환경에서의 경량화된 IP 역추적 기법)

  • Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.93-102
    • /
    • 2007
  • A serious problem to fight DDoS attacks is that attackers use incorrect or spoofed IP addresses in the attack packets. Due to the stateless nature of the internet, it is a difficult problem to determine the source of these spoofed IP packets. The most of previous studies to prevent and correspond to DDoS attacks using the traceback mechanism have been accomplished in IPv4 environment. Even though a few studies in IPv6 environment were introduced, those have no detailed mechanism to cope with DDoS attacks. The mechanisms for tracing the origin of attacks in IPv6 networks have so many differences from those of IPv4 networks. In this paper we proposed a lightweight IP traceback mechanism in IPv6 network environment. When marking for traceback is needed, the router can generate Hop-by-Hop option and transmit the marked packet. We measured the performance of this mechanism and at the same time meeting the efficient marking for traceback.

An Efficient Method for Analyzing Network Security Situation Using Visualization (시각화 기반의 효율적인 네트워크 보안 상황 분석 방법)

  • Jeong, Chi-Yoon;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Na, Jung-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.107-117
    • /
    • 2009
  • Network administrator recognizes the abnormal phenomenon in the managed network by using the alert messages generated in the security devices including the intrusion detection system, intrusion prevention system, firewall, and etc. And then the series of task, which searches for the traffic related to the alert message and analyzes the traffic data, are required to determine where the abnormal phenomenon is the real network security threat or not. There are many alert messages to have to inspect in order to determine the network security situation. Also the much times are needed so that the network administrator can analyze the security condition using existing methods. Therefore, in this paper, we proposed an efficient method for analyzing network security situation using visualization. The proposed method monitors anomalies occurred in the entire IP address's space and displays the detail information of a security event. In addition, it represents the physical locations of the attackers or victims by linking GIS information and IP address. Therefore, it is helpful for network administrator to rapidly analyze the security status of managed network.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.