• Title/Summary/Keyword: Information Security Learning

Search Result 1,001, Processing Time 0.024 seconds

Integrated Video Analytics for Drone Captured Video (드론 영상 종합정보처리 및 분석용 시스템 개발)

  • Lim, SongWon;Cho, SungMan;Park, GooMan
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.243-250
    • /
    • 2019
  • In this paper, we propose a system for processing and analyzing drone image information which can be applied variously in disasters-security situation. The proposed system stores the images acquired from the drones in the server, and performs image processing and analysis according to various scenarios. According to each mission, deep-learning method is used to construct an image analysis system in the images acquired by the drone. Experiments confirm that it can be applied to traffic volume measurement, suspect and vehicle tracking, survivor identification and maritime missions.

AI를 이용한 차량용 침입 탐지 시스템에 대한 평가 프레임워크

  • Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;jo, Hyo Jin
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.7-17
    • /
    • 2022
  • 운전자 보조 시스템을 통한 차량의 전자적인 제어를 위하여, 최근 차량에 탑재된 전자 제어 장치 (ECU; Electronic Control Unit)의 개수가 급증하고 있다. ECU는 효율적인 통신을 위해서 차량용 내부 네트워크인 CAN(Controller Area Network)을 이용한다. 하지만 CAN은 기밀성, 무결성, 접근 제어, 인증과 같은 보안 메커니즘이 고려되지 않은 상태로 설계되었기 때문에, 공격자가 네트워크에 쉽게 접근하여 메시지를 도청하거나 주입할 수 있다. 악의적인 메시지 주입은 차량 운전자 및 동승자의 안전에 심각한 피해를 안길 수 있기에, 최근에는 주입된 메시지를 식별하기 위한 침입 탐지 시스템(IDS; Intrusion Detection System)에 대한 연구가 발전해왔다. 특히 최근에는 AI(Artificial Intelligence) 기술을 이용한 IDS가 다수 제안되었다. 그러나 제안되는 기법들은 특정 공격 데이터셋에 한하여 평가되며, 각 기법에 대한 탐지 성능이 공정하게 평가되었는지를 확인하기 위한 평가 프레임워크가 부족한 상황이다. 따라서 본 논문에서는 machine learning/deep learning에 기반하여 제안된 차랑용 IDS 5가지를 선정하고, 기존에 공개된 데이터셋을 이용하여 제안된 기법들에 대한 비교 및 평가를 진행한다. 공격 데이터셋에는 CAN의 대표적인 4가지 공격 유형이 포함되어 있으며, 추가적으로 본 논문에서는 메시지 주기 유형을 활용한 공격 유형을 제안하고 해당 공격에 대한 탐지 성능을 평가한다.

Optimal Route Generation of Ships using Navigation Chart Information (해도 정보를 이용한 선박의 최적 항로 생성)

  • Min-Kyu Kim;Jong-Hwa Kim;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.369-370
    • /
    • 2022
  • 최근 자율 운항 선박에 대한 관심이 높아지고 있다. 특히, MUNIN (Maritime Unmanned Navigation through Intelligence in Networks) 프로젝트를 계기로 자율 운항 선박에 대한 개발과 연구가 활발히 진행되고 있다. 또한 국제해사기구 IMO는 자율 운항 선박 시대에 대응하기 위해 자율 선박을 MASS (Maritime Autonomous Surface Ship)라 정의하고 선박 자율화 정도에 따라 4단계 등급을 제시하고 있다. 완전한 자율 운항 선박에 대한 요구조건을 만족하기 위해서는 항로 결정과 제어기술이 필수적이다. 본 연구에서는 여러 가지 기술 중 선박의 최적경로를 생성하는 기법을 다룬다. 기존에 최적항로를 생성하기 위한 방법으로는 A*, Dijkstra와 같은 알고리즘들이 주로 사용되었다. 그러나 이와 같은 알고리즘은 섬이나 육지에 대한 충돌 회피는 고려하고 있지만 수심 및 연안 선박에 대한 규정들은 고려하지 않고 있어 실제로 적용하기에는 한계점이 있다. 따라서 본 연구에서는 안전을 위해 선박의 선저 여유 수심과, 해도에 규정되어 있는 선박 운항에 대한 여러 규정들을 반영하여 최적 항로를 생성하고자 한다. 최적 항로를 생성하기 위한 알고리즘으로는 강화학습 기반의 Q-learning 알고리즘을 적용하였다.

  • PDF

Conceptual Approaches to Training Specialists Using Multimedia Technologies

  • Shchyrbul, Oleksandr;Babalich, Viktoriya;Mishyn, Sergii;Novikova, Viktoriia;Zinchenko, Lina;Haidamashko, Iryna;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.123-130
    • /
    • 2022
  • Modernization of the educational sector requires globalization, democratization, and the transition to an information technology society. The main goal of education at the present stage is to solve the problem of ensuring the priority of the development of education and science. In modern conditions, the quality of training of qualified specialists is becoming particularly relevant. The great role of teacher education is emphasized by its main goal, which is to train specialists who can ensure the versatile and innovative development of a person as a person and the highest value of society, its mental, physical and aesthetic abilities, high moral qualities, and, consequently, the enrichment on this basis of the intellectual, creative and cultural potential of the people. Among the strategic tasks of modernizing higher education is to ensure informatization of the educational process and access to International Information Systems. The essence of the concept of multimedia is clarified. In the context of media education, multimedia lists a number of functions: informational, interpretive, cultural, entertainment, and educational. The need to meet the needs outlined in the article in the conditions of informatization of the educational process requires the teacher to have knowledge and skills in the field of multimedia pedagogical technologies, knowledge of advanced methods and means of modern science. It is considered what relevant concepts of media education have been developed and are being developed in Ukraine and form an important basis for the modernization of education, which will contribute to the construction of an information society in the country and the formation of civil society. Distance learning is considered - the most democratic form of education that allows broad segments of society to get an education. Distance learning methods are used in higher education institutions, in school education, in the system of advanced training of teachers, in the system of training managerial personnel.

Secure Training Support Vector Machine with Partial Sensitive Part

  • Park, Saerom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we propose a training algorithm of support vector machine (SVM) with a sensitive variable. Although machine learning models enable automatic decision making in the real world applications, regulations prohibit sensitive information from being used to protect privacy. In particular, the privacy protection of the legally protected attributes such as race, gender, and disability is compulsory. We present an efficient least square SVM (LSSVM) training algorithm using a fully homomorphic encryption (FHE) to protect a partial sensitive attribute. Our framework posits that data owner has both non-sensitive attributes and a sensitive attribute while machine learning service provider (MLSP) can get non-sensitive attributes and an encrypted sensitive attribute. As a result, data owner can obtain the encrypted model parameters without exposing their sensitive information to MLSP. In the inference phase, both non-sensitive attributes and a sensitive attribute are encrypted, and all computations should be conducted on encrypted domain. Through the experiments on real data, we identify that our proposed method enables to implement privacy-preserving sensitive LSSVM with FHE that has comparable performance with the original LSSVM algorithm. In addition, we demonstrate that the efficient sensitive LSSVM with FHE significantly improves the computational cost with a small degradation of performance.

A Study on the Law2Vec Model for Searching Related Law (연관법령 검색을 위한 워드 임베딩 기반 Law2Vec 모형 연구)

  • Kim, Nari;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1419-1425
    • /
    • 2017
  • The ultimate goal of legal knowledge search is to obtain optimal legal information based on laws and precedent. Text mining research is actively being undertaken to meet the needs of efficient retrieval from large scale data. A typical method is to use a word embedding algorithm based on Neural Net. This paper demonstrates how to search relevant information, applying Korean law information to word embedding. First, we extracts reference laws from precedents in order and takes reference laws as input of Law2Vec. The model learns a law by predicting its surrounding context law. The algorithm then moves over each law in the corpus and repeats the training step. After the training finished, we could infer the relationship between the laws via the embedding method. The search performance was evaluated based on precision and the recall rate which are computed from how closely the results are associated to the search terms. The test result proved that what this paper proposes is much more useful compared to existing systems utilizing only keyword search when it comes to extracting related laws.

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF

Detecting code reuse attack using RNN (RNN을 이용한 코드 재사용 공격 탐지 방법 연구)

  • Kim, Jin-sub;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.15-23
    • /
    • 2018
  • A code reuse attack is an attack technique that can execute arbitrary code without injecting code directly into the stack by combining executable code fragments existing in program memory and executing them continuously. ROP(Return-Oriented Programming) attack is typical type of code reuse attack and serveral defense techniques have been proposed to deal with this. However, since existing methods use Rule-based method to detect attacks based on specific rules, there is a limitation that ROP attacks that do not correspond to previously defined rules can not be detected. In this paper, we introduce a method to detect ROP attack by learning command pattern used in ROP attack code using RNN(Recurrent Neural Network). We also show that the proposed method effectively detects ROP attacks by measuring False Positive Ratio, False Negative Ratio, and Accuracy for normal code and ROP attack code discrimination.

Mobile Finger Signature Verification Robust to Skilled Forgery (모바일환경에서 위조서명에 강건한 딥러닝 기반의 핑거서명검증 연구)

  • Nam, Seng-soo;Seo, Chang-ho;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1161-1170
    • /
    • 2016
  • In this paper, we provide an authentication technology for verifying dynamic signature made by finger on smart phone. In the proposed method, we are using the Auto-Encoder-based 1 class model in order to effectively distinguish skilled forgery signature. In addition to the basic dynamic signature characteristic information such as appearance and velocity of a signature, we use accelerometer value supported by most of the smartphone. Signed data is re-sampled to give the same length and is normalized to a constant size. We built a test set for evaluation and conducted experiment in three ways. As results of the experiment, the proposed acceleration sensor value and 1 class model shows 6.9% less EER than previous method.

The Study on Reading Education Method to Improve the Cognitive Ability for the Petty officer Majoring Students in Community College (전문대학 부사관과의 인지 능력 향상을 위한 읽기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.123-131
    • /
    • 2018
  • The goal of this study is to look deeper into a reading education method for improving cognitive abilities of petty officer majoring students in community college level. Lack of the cognitive ability through the passing status of reading information processing highly can cause a problem for understanding information of context. Therefore, this study redefines the reading step to improve the cognitive ability. also, it sets up progress steps; material selection - learning - inspection - practice based on the cognitive abilities. To achieve those goals, there are two major ways. The first, setting up a proper reading assignment that is suitable for petty officer major students in community college level is a key step for this study. Second, the instructor leads the students to judge their own cognitive ability objectively by using a portfolio curriculum which contains a checking list of the portfolio, structuring a curriculum based on weekly achievements, self-checking, and setting up a direction of practice. The two presented ways are the most effective ways to develop students' cognitive ability based on continuous reading and checking. For the last, the study mentions a proposal for further tasks in this field of the study.

  • PDF