• Title/Summary/Keyword: AI보안

Search Result 290, Processing Time 0.027 seconds

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning (강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구)

  • Jeongyoon Kim; Jongyoul Park;Sang Ho Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • With the development of ICT and network, security management of IT infrastructure that has grown in size is becoming very difficult. Many companies and public institutions are having difficulty managing system and network security. In addition, as the complexity of hardware and software grows, it is becoming almost impossible for a person to manage all security. Therefore, AI is essential for network security management. However, since it is very dangerous to operate an attack model in a real network environment, cybersecurity emulation research was conducted through reinforcement learning by implementing a real-life network environment. To this end, this study applied reinforcement learning to the network environment, and as the learning progressed, the agent accurately identified the vulnerability of the network. When a network vulnerability is detected through AI, automated customized response becomes possible.

Research Trends in Domestic and International Al chips (국내외 인공지능 반도체에 대한 연구 동향 )

  • Hyun Ji Kim;Se Young Yoon;Hwa Jeong Seo
    • Smart Media Journal
    • /
    • v.13 no.3
    • /
    • pp.36-44
    • /
    • 2024
  • Recently, large-scale artificial intelligence (AI) such as ChatGPT have been developed, and as AI is used across various industrial fields, attention is focused on AI chips (semiconductors). AI chips refer to chips designed for calculations for AI algorithms, and many companies at domestic and abroad, such as NVIDIA, Tesla, and ETRI, are developing AI chips. In this paper, we survey research trends on nine types of AI chips. Currently, many attempts have been made to improve the computational performance of most AI chips, and semiconductors for specific purposes are also being designed. In order to compare various AI semiconductors, each chip is analyzed in terms of operation unit, speed, power, and energy efficiency. We introduce currently existing optimization methodologies for AI computation. Based on this, future research directions for AI semiconductors are presented in this paper.

A Security Framework for ML service based on Cloud (클라우드 기반 머신러닝 서비스 보안 프레임워크)

  • Seo, Han-Gyeol;Kang, Dong-Yoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.192-195
    • /
    • 2021
  • AI 모델 서비스 제공에 강제되는 높은 메모리 사용량을 해결하기 위해 일반적으로 클라우드 컴퓨팅 기술을 이용한다. 클라우드 기반 서비스는 개발자로 하여금 메모리 사용량에 대한 걱정을 덜어주고 서비스 이용자에게는 편리하게 양질의 서비스를 제공받을 수 있게 한다. 하지만 보안 대책이 미흡한 클라우드 서비스는 서비스를 제공받아 얻는 이익만을 생각하기에는 보안사고로 인한 피해가 막대할 수 있다. AI 기술이 인간의 삶에 깊이 파고든 현 상황에서 우리가 대부분 이용하는 클라우드에 기반 서비스의 보안 문제는 그 중요도가 굉장히 높다고 할 수 있다. 이를 위해 본 논문에서는 클라우드 기반 머신러닝 서비스를 분석하여 어떤 공격이 이루어질 수 있는지 분석하고 그에 대한 연구된 방어법들의 효과를 확인하여 효과적인 것들을 선별하고 접목시키는 시도를 한다.

A Detection of Behavior and Emotion for Companion animal using AI (AI 기법을 이용한 반려동물의 행동 및 감정 탐지)

  • Lee, Jeong-Woo;Lee, Ha-Rang;Shin, Dong-Jin;Weon, IL-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.580-582
    • /
    • 2022
  • 본 본문은 영상을 통해 반려동물의 행동과 감정을 인식하는 연구이다. 이러한 연구는 반려동물과 인간의 삶을 향상시키는데 도움을 줄 수 있다. 제안된 시스템의 유용성은 실험을 통해 검증하였고, 어느 정도 의미 있는 결과를 얻을 수 있었다.

IMT-2030 지능화와 보안 표준화

  • Jae Hoon Nah;Jong Hyun Kim;Jongyoul Park
    • Review of KIISC
    • /
    • v.34 no.4
    • /
    • pp.23-28
    • /
    • 2024
  • IMT-2020(5G)에 비교하여 IMT-2030(6G)의 주요 차이점은 서비스 및 지능의 수용에 있다. IMT-2020(6G)의 기본 스펙이 ITU-R WP 5D에서 기술 능력 요구사항(TPR: Technical Performance Requirement)으로 구체화가 진행되고 있으며, 이를 검증하기 위한 평가 방안이 동시에 개발이 되고 있다. 네트워크에서 AI의 이용은 여러 가지 측면이 있는데, 사용자 서비스의 활용과 사용자 서비스의 원활한 구축을 위한 기반 기술로서 AI가 고려될 수 있다. 본 고에서는 IMT-2030(6G)에 적용을 목표로 하는 지능화와 보안 항목 표준화를 ITU-R WP 5D의 6월 회의를 중심으로 기술 성능 요구사항에 대하여 살펴본다.

  • PDF

A Study on the Understanding and Solving Tasks of AI Convergence Education (AI 융합교육의 이해와 해결 과제에 대한 고찰)

  • Sook-Young Choi
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.147-157
    • /
    • 2023
  • In this study, we approached from the perspective of AI convergence education in elementary, middle and high schools to understand AI convergence education. We examined what capabilities AI convergence education ultimately seeks to pursue, and analyzed various examples of AI convergence education in three dimensions: core curriculum, convergence model, AI learning elements and learning activities. In addition, factors to be considered in order for AI convergence education to be actively carried out include the cultivation of AI convergence education capabilities of teachers, the development and dissemination of AI teaching and learning methods and teaching and learning models, and evaluation methods for AI convergence education.

A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services (안전한 AI 서비스를 위한 국내 정책 및 가이드라인 개선방안 연구)

  • Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.975-987
    • /
    • 2023
  • With the advancement of Artificial Intelligence (AI) technologies, the provision of data-driven AI services that enable automation and intelligence is increasing across industries, raising concerns about the AI security risks that may arise from the use of AI. Accordingly, Foreign countries recognize the need and importance of AI regulation and are focusing on developing related policies and regulations. This movement is also happening in Korea, and AI regulations have not been specified, so it is necessary to compare and analyze existing policy proposals or guidelines to derive common factors and identify complementary points, and discuss the direction of domestic AI regulation. In this paper, we investigate AI security risks that may arise in the AI life cycle and derive six points to be considered in establishing domestic AI regulations through analysis of each risk. Based on this, we analyze AI policy proposals and recommendations in Korea and validate additional issues. In addition, based on a review of the main content of AI laws in the US and EU and the analysis of this paper, we propose measures to improve domestic guidelines and policies in the field of AI.

A study on community care using AI technology (AI 기술을 활용한 커뮤니티케어에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.151-156
    • /
    • 2023
  • Currently, ICT is widely used in caring for the elderly living alone and preventing the disappearance of the elderly with dementia. Therefore, in this study, based on the government policy direction for the 4th industrial revolution, the use of AI technology-based care services, which are gradually increasing in community care, was sought to explore the current status and prospects for utilization and activation.AI speakers and caring robots, services that can be used for community care, help solve various problems experienced by the elderly, and are also used to relieve lack of conversation or loneliness by adding emotional functions. In order to activate community care using AI technology in the future: First, there is a need for continuous education to familiarize the elderly with AI devices and 'user experience (UX) design' for the elderly. Second, it is necessary to use human-centered technology that has a complementary relationship and enables emotional mutual relationships rather than using function-oriented technology. Third, it is necessary to solve ethical problems such as guaranteeing the user's right to self-determination and protecting privacy.

Analysis on Lightweight Methods of On-Device AI Vision Model for Intelligent Edge Computing Devices (지능형 엣지 컴퓨팅 기기를 위한 온디바이스 AI 비전 모델의 경량화 방식 분석)

  • Hye-Hyeon Ju;Namhi Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • On-device AI technology, which can operate AI models at the edge devices to support real-time processing and privacy enhancement, is attracting attention. As intelligent IoT is applied to various industries, services utilizing the on-device AI technology are increasing significantly. However, general deep learning models require a lot of computational resources for inference and learning. Therefore, various lightweighting methods such as quantization and pruning have been suggested to operate deep learning models in embedded edge devices. Among the lightweighting methods, we analyze how to lightweight and apply deep learning models to edge computing devices, focusing on pruning technology in this paper. In particular, we utilize dynamic and static pruning techniques to evaluate the inference speed, accuracy, and memory usage of a lightweight AI vision model. The content analyzed in this paper can be used for intelligent video control systems or video security systems in autonomous vehicles, where real-time processing are highly required. In addition, it is expected that the content can be used more effectively in various IoT services and industries.