• Title/Summary/Keyword: 패턴 지도 방안

Search Result 373, Processing Time 0.024 seconds

Effective Normalization Method for Fraud Detection Using a Decision Tree (의사결정나무를 이용한 이상금융거래 탐지 정규화 방법에 관한 연구)

  • Park, Jae Hoon;Kim, Huy Kang;Kim, Eunjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.133-146
    • /
    • 2015
  • Ever sophisticated e-finance fraud techniques have led to an increasing number of reported phishing incidents. Financial authorities, in response, have recommended that we enhance existing Fraud Detection Systems (FDS) of banks and other financial institutions. FDSs are systems designed to prevent e-finance accidents through real-time access and validity checks on client transactions. The effectiveness of an FDS depends largely on how fast it can analyze and detect abnormalities in large amounts of customer transaction data. In this study we detect fraudulent transaction patterns and establish detection rules through e-finance accident data analyses. Abnormalities are flagged by comparing individual client transaction patterns with client profiles, using the ruleset. We propose an effective flagging method that uses decision trees to normalize detection rules. In demonstration, we extracted customer usage patterns, customer profile informations and detection rules from the e-finance accident data of an actual domestic(Korean) bank. We then compared the results of our decision tree-normalized detection rules with the results of a sequential detection and confirmed the efficiency of our methods.

"위험관리 기반 침해사고 조기 대응 체계" 구축 사례

  • Kim, Jin-Seob
    • Review of KIISC
    • /
    • v.20 no.6
    • /
    • pp.73-87
    • /
    • 2010
  • 정신한은행은 '10년 1 월부터 6월까지 약 6개월 동안 "위험관리 기반의 침해사고 조기 대응체계 구축" 프로젝트를 수행하여 침해 시도 조기 탐지 및 대응을 위한 "침해사고 조기 경보 시스템" 및 "침해 사고 대응 프로세스 전산화"와 침해 사고의 사전 예방 강화를 위한 "정보시스템 상시 취약점 점검 체계"를 모두 하나의 프레임웍으로 묶어 통합 구축하였다. 신한은행은 이를 통해 내부망 및 인터넷 서비스망에 대해서 이마 알려진 네트웍 침입 패턴뿐만 아니라 네트웍 트래픽 전반에 대한 모니터링을 대폭 강화하여 기존 침입탐지 시스템이나 디도스 대응 시스템 등에서 탐지가 불가능했던 신종 침입 유형이나 소규모 디도스 공격 트래픽도 자동화된 탐지가 가능하게 되었다. 그리고 탐지된 침입시도의 유행 및 위험 수준에 따라서 사전 정의된 침해사고 대응 프로세스를 통해, 정보보안 담당자가 관련 부서 및 경영진의 요구사항에 각각 최적화된 전용 상황 모니터링 화면을 공유하며 침해사고를 효과적으로 공동 대응할 수 있게 되었다. 또한 정보시스템 전반에 대하여 상시 취약점 점검을 실시하고 그 점검 결과를 데이터베이스로 구축하고 정보시스템의 위험 수준에 따른 체계화된 대응 방안을 수립할 수 있게 되었다. 신한은행은 금번 구축된 시스템을 정보보안 영역 전반으로 확대하여 동일 프레임웍에서 위험관리 기반의 내부 정보 유출 체계를 구축하고, 향후 그룹사에도 확대 적용하여 전체 그룹사의 보안 수준을 제고하는 데 활용할 계획이다. * 금번 구축 사례에서 소개된 침해사고 조기 대응체계는 구축 완료 시점에 사내 명칭 공모를 통해 "Ageis"로 선정되었으며, 본 사례에서도 전체 시스템을 가리킬 때 Ageis로 지칭한다. Aegis는 그라스 신화에서 Zeus 신이 딸 Athena 신에게 주었다는 방패로서 보호, 후원, 지도 등의 뜻을 가지며, 이지스 또는 아이기스 라고 발음된다.

Empirical Analysis of Induced Demand Resulted from LTE Service Launching (LTE 서비스 도입에 따른 유도된 수요 발생에 관한 실증 연구)

  • Lee, Sang-Woo;Choi, Sun-Me;Park, Jun-Seon;Park, Myeong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.741-749
    • /
    • 2012
  • Since introduction of smart phone in Korean mobile telecommunication market, mobile internet service market has changed dramatically. Although there have been many heated discussion of pro and cons of recent tremendous growth of mobile traffic, mobile data service market has contributed to re-development of whole telecommunication market. This paper is aimed at empirically test and confirms the occurrence of induced demand resulted from LTE service launching. In conclusion, we suggest the direction of regulation and policy for sustainable development of mobile internet service.

Open Platform for Improvement of e-Health Accessibility (의료정보서비스 접근성 향상을 위한 개방형 플랫폼 구축방안)

  • Lee, Hyun-Jik;Kim, Yoon-Ho
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1341-1346
    • /
    • 2017
  • In this paper, we designed the open service platform based on integrated type of individual customized service and intelligent information technology with individual's complex attributes and requests. First, the data collection phase is proceed quickly and accurately to repeat extraction, transformation and loading. The generated data from extraction-transformation-loading process module is stored in the distributed data system. The data analysis phase is generated a variety of patterns that used the analysis algorithm in the field. The data processing phase is used distributed parallel processing to improve performance. The data providing should operate independently on device-specific management platform. It provides a type of the Open API.

A Study on the Temporary Space Use for Urban Regeneration Strategy (도시재생 전략으로서 일시적 공간 활용에 관한 연구)

  • Lee, Do Kyoung;Kim, Jong Gu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.2
    • /
    • pp.247-255
    • /
    • 2020
  • Currently, urban regeneration is carried out mostly in a permanent and fixed way of planning, and due to the nature of the master plan, it is limited to immediately accepting the opinions of residents. In this study, the factors of idle space were derived based on a temporary use strategy, and the direction of idle space was presented by comparing the importance of experts with the survey of residents' perceptions and preferences. As a result, residents preferred to improve the aging physical environment first because of the target location characteristics, while experts ranked it in line to reflect the importance of the use of temporary uses that can quickly improve the urban environment. Therefore, it is desirable to recognize the importance of the temporary use strategy and to refine the priorities of the two groups and conduct a temporary test to derive the optimal utilization measures and reflect them in the master plan. In order to implement a temporary use strategy in the future, it is necessary to present a space utilization plan that reflects detailed prior investigation through analysis of target location characteristics and usage patterns.

A Study on Problems and Improvements of Face Mapping during Tunnel Construction (국내 터널시공 중 막장지질조사의 문제점 및 개선방안에 관한 연구)

  • Kim Kwang-Yeom;Kim Chang-Yeng;Yim Sung-Bin;Yun Hyun-Seok;Seo Yong-Seok
    • The Journal of Engineering Geology
    • /
    • v.16 no.3 s.49
    • /
    • pp.265-273
    • /
    • 2006
  • Face mapping during tunnel construction is useful and critical to predict the characteristics and stability condition of following tunneling sections and to select optimum support pattern. Therefore, a detailed geological survey of the tunnel faces, as important as a routine underground survey and a RMR evaluation, should provide critical information of the tunnel face condition in terms of the engineering geological condition and the safety of working environment for the following tunneling section. But the results of the face investigation have not been applied satisfactorily during tunneling due to limitation of technique, experience and time. This study analyze problems of face mapping in tunnel construction site by using statistical results of face mapping sheets obtained from completed tunnels, and suggest several opinions to improve face mapping during tunnel construction.

A Study on Automatic Detection of Speed Bump by using Mathematical Morphology Image Filters while Driving (수학적 형태학 처리를 통한 주행 중 과속 방지턱 자동 탐지 방안)

  • Joo, Yong Jin;Hahm, Chang Hahk
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.21 no.3
    • /
    • pp.55-62
    • /
    • 2013
  • This paper aims to detect Speed Bump by using Omni-directional Camera and to suggest Real-time update scheme of Speed Bump through Vision Based Approach. In order to detect Speed Bump from sequence of camera images, noise should be removed as well as spot estimated as shape and pattern for speed bump should be detected first. Now that speed bump has a regular form of white and yellow area, we extracted speed bump on the road by applying erosion and dilation morphological operations and by using the HSV color model. By collecting huge panoramic images from the camera, we are able to detect the target object and to calculate the distance through GPS log data. Last but not least, we evaluated accuracy of obtained result and detection algorithm by implementing SLAMS (Simultaneous Localization and Mapping system).

A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments (스팸메일 모의훈련 현장실험을 통한 기업의 인적 취약요인 연구)

  • Lee, Jun-hee;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.847-857
    • /
    • 2019
  • Recently, various cyber threats such as Ransomware and APT attack are increasing by e-mail. The characteristic of such an attack is that it is important to take administrative measures by improving personal perception of security because it bypasses technological measures such as past pattern-based detection The purpose of this study is to investigate the human factors of employees who are vulnerable to spam mail attacks through field experiments and to establish future improvement plans. As a result of sending 7times spam mails to employees of a company and analyzing training report, It was confirmed that factors such as the number of training and the recipient 's gender, age, and workplace were related to the reading rate. Based on the results of this analysis, we suggest ways to improve the training and to improve the ability of each organization to carry out effective simulation training and improve the ability to respond to spam mail by awareness improvement.

ECPS: Efficient Cloud Processing Scheme for Massive Contents (클라우드 환경에서 대규모 콘텐츠를 위한 효율적인 자원처리 기법)

  • Na, Moon-Sung;Kim, Seung-Hoon;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.17-27
    • /
    • 2010
  • Major IT vendors expect that cloud computing technology makes it possible to reduce the contents service cycle, speed up application deployment and skip the installation process, reducing operational costs, proactive management etc. However, cloud computing environment for massive content service solutions requires high-performance data processing to reduce the time of data processing and analysis. In this study, Efficient_Cloud_Processing_Scheme(ECPS) is proposed for allocation of resources for massive content services. For high-performance services, optimized resource allocation plan is presented using MapReduce programming techniques and association rules that is used to detect hidden patterns in data mining, based on levels of Hadoop platform(Infrastructure as a service). The proposed ECPS has brought more than 20% improvement in performance and speed compared to the traditional methods.

Effective brain-wave DB building system using the five senses stimulation (오감자극을 활용한 효율적인 뇌파 DB구축 시스템)

  • Shin, Jeong-Hoon;Jin, Sang-Hyeon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.4
    • /
    • pp.227-236
    • /
    • 2007
  • Ubiquitous systems have grown explosively over the few years. Nowadays users' needs for high qualify service lead a various type of user terminals. One of various type of user interface, various types of effective human computer interface methods have been developed. In many researches, researchers have focused on using brain-wave interface, that is to say, BCI. Nowadays, researches which are related to BCI are under way to find out effective methods. But, most researches which are related to BCI are not centralized and not systematic. These problems brought about ineffective results of researches. In most researches related in HCI, that is to say - pattern recognition, the most important foundation of the research is to build correct and sufficient DB. But there is no effective and reliable standard research conditions when researchers are gathering brain-wave in BCI. Subjects as well as researchers do not know effective methods for gathering DB. Researchers do not know how to instruct subjects and subjects also do not know how to follow researchers' instruction. To solve these kinds of problems, we propose effective brain-wave DB building system using the five senses stimulation. Researcher instructs the subject to use the five senses. Subjects imagine the instructed senses. It is also possible for researchers to distinguish whether brain-wave is right or not. In real time, researches verify gathered brain-wane data using spectrogram. To verify effectiveness of our proposed system, we analyze the spectrogram of gathered brain-wave DB and pattern. On the basis of spectrogram and pattern analysis, we propose an effective brain-wave DB building method using the five senses stimulation.

  • PDF