• 제목/요약/키워드: Internal Network Information

검색결과 506건 처리시간 0.024초

제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구 (A Study on Event Log Correlation Analysis for Control System Threat Analysis)

  • 김종민;김민수;이동휘
    • 융합보안논문지
    • /
    • 제17권5호
    • /
    • pp.35-40
    • /
    • 2017
  • 제어시스템은 공공 네트워크와의 통신망 융합에 따라 다양한 루트를 통해 정보유출 및 변조 등의 위협이 제어시스템에서도 그대로 나타날 수 있다. 최근 다양한 보안에 대한 이슈와 새로운 공격기법에 의한 침해 사례가 다변화됨에 따라서, 단순히 차단 및 확인 등의 학습을 통해 정보를 데이터베이스화하는 보안 시스템으로는 새로운 형태의 위협에는 대처하기 힘들어지고 있으며, 보안 접근 권한을 가진 내부자에 의한 보안위협에 대해서도 기존의 보안장비로는 대응하기가 어렵다. 내부자에 의한 위협에 대응하기 위해 내부 시스템에서 실시간으로 발생한 Event Log를 수집하고 분석하여야 한다. 이에 따라 본 연구에서는 제어시스템에서 실시간으로 발생한 Event Log들을 토대로 상관분석을 통해 Event Log간 요소들의 상관관계의 여부를 알 수 있었으며, 분석결과를 바탕으로 이 분야의 연구에 기여할 수 있을 것으로 판단된다.

The Role of Smart Technologies in Training Future Specialists

  • Oksana, Popovych;Rostislav, Motsyk;Iryna, Mozul;Karina, Fedchenko;Andrii, Zhbanchyk;Olena, Terenko;Oleksandr, Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.153-159
    • /
    • 2022
  • The article discusses the use of smart technologies in the training of future specialists. Today, learning using smart technologies is becoming a new educational standard, where information is presented in a logical sequence, computer training systems have powerful functions for the educational process. The functions of smart technologies are highlighted. It is noted that smart technologies are successfully used in the field of education and professional training. The concept of "smart education" is characterized. Smart education is an educational paradigm that underlies a new type of education system. The implementation of the smart education paradigm is aimed at the process of obtaining competencies and competencies for flexible and adapted interaction with the social, economic and technological environment. Smart education should ensure that the benefits of the global information society can be used to meet educational needs and interests. A special place is occupied by computer-based educational multimedia systems that allow you to deepen your knowledge, reduce the duration of training, and increase the number of students per teacher. The main principles of smart education are highlighted. Improving the efficiency of training in a modern higher education institution is impossible without the introduction of smart technologies in the organization of the educational process.

중풍환자의 변증에 따른 맥상의 분포 (Study on the Pulse Diagnosis for Pattern Identifications in Stroke Patients)

  • 이정섭;강병갑;고미미;김보영;김정철;이인;김윤식;조기호;최선미;방옥선
    • 동의생리병리학회지
    • /
    • 제22권6호
    • /
    • pp.1378-1382
    • /
    • 2008
  • This study is aim to evaluate pulse diagnosis as indicators for classification of the pattern identifications in stroke patients. To get the clinical information, we recruited the onset 1 month stroke patients through the multicenter network which consists of 13 oriental hospitals. The clinical informations about three pairs of pulse wave form and levels of their significancy based on the case report form (CRF) were collected and their distribution in each pattern identification were analyzed. The results are as follows Fire-Heat group shows high portions of floating pulse, rapid pulse and solid pulse. Qi Defficiency group has a greater portion of deep pulse, slow pulse, deficient pulse. The well-defined character of Phlegm-Retained Fluid, Yin Defficiency, Static Blood groups cannot be explained by pulse wave form. These results show a rough relationship between the pulse diagnosis and pattern identifications of stroke therefore, further studies are required to determine the pulse diagnosis as significant indicators of stroke pattern identification.

모바일 빅 데이터 트래픽 환경에서 새로운 이동통신 주파수의 활성화 방안 연구 (A Study on Activation of New Mobile Communication Spectrum in the Environment of Mobile Big Data Traffic)

  • 정우기
    • 한국위성정보통신학회논문지
    • /
    • 제7권2호
    • /
    • pp.42-46
    • /
    • 2012
  • 본 논문은 모바일 광대역 서비스가 활성화되면서 나타나는 모바일 빅 데이터 트래픽의 발생이 모바일 광대역 서비스의 발전을 제약하지 않도록 이동통신 주파수 활성화를 위한 기술 및 경제적 환경 조건을 분석하고 활성화 방안을 제시한다. 새로운 이동통신 주파수의 활성화를 위해서는 투자의 비용과 수익의 균형이 이루어져야 한다. 모바일 빅 데이터 트래픽을 처리하기 위한 새로운 이동통신 주파수의 활성화는 기술과 경제적 요인 그리고 통신사업자 내부 요인과 외부 요인이 결합되어 있다. 투자비용은 내부 요인인 자본적 비용(Capital Expenditure), 운용비용(Operating Expenditure)과 외부요인인 주파수 할당 대가와 관련 있으며 수익은 내부요인인 요금제와 외부 요인인 망중립성 문제와 관련 있다. 새로운 이동통신 주파수의 활성화는 투자비용에 주파수 할당 대가를 포함하고 투자수익에 네트워크 증설이 가능한 요금제 운영과 외부 콘텐츠에 의한 트래픽 증가에 따른 수익이 포함되어 투자비용과 수익이 균형을 이루어야 한다.

Two-Year Hospital-Wide Surveillance of Central Line-Associated Bloodstream Infections in a Korean Hospital

  • Seo, Hye Kyung;Hwang, Joo-Hee;Shin, Myoung Jin;Kim, Su young;Song, Kyoung-Ho;Kim, Eu Suk;Kim, Hong Bin
    • Journal of Korean Medical Science
    • /
    • 제33권45호
    • /
    • pp.280.1-280.9
    • /
    • 2018
  • Background: Surveillance and interventions of central line-associated bloodstream infections (CLABSIs) had mainly been targeted in intensive care units (ICUs). Central lines are increasingly used outside ICUs. Therefore, we performed a hospital-wide survey of CLABSIs to evaluate the current status and develop strategies to reduce CLBASI rates. Methods: All hospitalized patients with central venous catheters (CVCs) were screened for CLABSIs from January 2014 through December 2015 at a 1,328 bed tertiary care teaching hospital in Korea using an electronic data-collecting system. Clinical information including type of CVC was collected. CLABSI rates were calculated using the definitions of the National Health and Safety Network after excluding mucosal barrier injury laboratory-confirmed bloodstream infection (BSI). Results: A total of 154 CLABSIs were identified, of which 72 (46.8%) occurred in general wards and 82 (53.2%) in ICUs (0.81 and 2.71 per 1,000 catheter days), respectively. Nontunneled CVCs were most common (68.6%) among 70 CLABSI events diagnosed within one week of their maintenance. On the other hand, tunneled CVCs and peripherally inserted central catheters (PICCs) were more common (60.5%) among 114 CLABSI events diagnosed more than a week after maintenance. Whereas the majority (72.2%) of CLABSIs in ICUs were associated with non-tunneled CVCs, tunneled CVCs (38.9%) and PICCs (36.8%) were more common in general wards. Conclusion: CLABSIs are less common in general wards than in ICUs, but they are more often associated with long-term indwelling catheters. Therefore, interventions to prevent CLABSIs should be tailored according to the type of ward and type of catheter.

하이브리드 피처 생성 및 딥 러닝 기반 박테리아 세포의 세분화 (Segmentation of Bacterial Cells Based on a Hybrid Feature Generation and Deep Learning)

  • 임선자;칼렙부누누;권기룡;윤성대
    • 한국멀티미디어학회논문지
    • /
    • 제23권8호
    • /
    • pp.965-976
    • /
    • 2020
  • We present in this work a segmentation method of E. coli bacterial images generated via phase contrast microscopy using a deep learning based hybrid feature generation. Unlike conventional machine learning methods that use the hand-crafted features, we adopt the denoising autoencoder in order to generate a precise and accurate representation of the pixels. We first construct a hybrid vector that combines original image, difference of Gaussians and image gradients. The created hybrid features are then given to a deep autoencoder that learns the pixels' internal dependencies and the cells' shape and boundary information. The latent representations learned by the autoencoder are used as the inputs of a softmax classification layer and the direct outputs from the classifier represent the coarse segmentation mask. Finally, the classifier's outputs are used as prior information for a graph partitioning based fine segmentation. We demonstrate that the proposed hybrid vector representation manages to preserve the global shape and boundary information of the cells, allowing to retrieve the majority of the cellular patterns without the need of any post-processing.

퍼지기법을 이용한 침입 탐지 시스템 오류경고메시지 축소 모델 설계 (Design of False Alerts Reducing Model Using Fuzzy Technique for Intrusion Detection System)

  • 성경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.794-798
    • /
    • 2007
  • 정보기술이 발달함에 따라 보안 사고가 증가되면서 시스템에 대한 침입을 방어하기 위한 여러 도구들이 개발되어왔다. 시스템에 대한 불법침입을 탐지하는 침입탐지시스템은 과다한 오류경고메시지 발생으로 인하여 침입 판단의 어려움이 따르고 있다. 본 연구는 오류경고메시지의 축소를 위한 방법으로 네트워크 내부에서 발생하는 긍정오류 탐지를 축소하고, 판단자의 불확실성을 감소시키기 위하여 퍼지기법을 적용한 긍정오류 경고메시지를 축소시킬 수 있는 모델을 설계하여 탐지의 정확성 향상에 활용할 수 있을 것이다.

  • PDF

웨이블렛변환을 이용한 부분방전 종류의 특징추출에 관한 연구 (A Study on Feature Extraction of Partial Discharge Type Using Wavelet Transform)

  • 박재준
    • 정보학연구
    • /
    • 제6권1호
    • /
    • pp.65-70
    • /
    • 2003
  • 본 논문에서 우리는 변압기의 부분방전형태를 진단하기위하여 새로운 방법을 제시하였다. 웨이블렛 변화을 위하여, 다우비치 필터가 사용되어졌다. 우리는 3개의 전극 종류(침대평판자극, IEC전극, 보이드 전극)마다 고주파 전류신호에 관한 통계적인 특징 파라메터(최대값, 평균값, 분산, 왜도, 첨쇄도)를 추출하기위하여 사용하였다. 역시 이들 계수들은 변압기내 내부부분방전의 신호의 정체를 알기위하여 사용되어졌다. 그 결과로서 고주파전류신호의 진폭과 평균값의 비교로부터 우리는 IEC electrode> Void electrode> Needle-Plane electrode의 결과를 얻었다. 반면에 왜도와 첨쇄도의 경우, 우리는 Void electrode> IEC electrode> Needle-Plane electrode을 얻었다.

  • PDF

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Study on Decision-Making Factors of Big Data Application in Enterprises: Using Company S as an Example

  • Huang, Yun Kuei;Yang, Wen I.;Chan, Ching Sen
    • 동아시아경상학회지
    • /
    • 제4권1호
    • /
    • pp.5-15
    • /
    • 2016
  • With vigorous development of global network community, smart phones and mobile devices, enterprises can rapidly collect various kinds of data from internal and external environments. How to discover valuable information and transform it into new business opportunities from big data which grow rapidly is an extremely important issue for current enterprises. This study treats Company S as the subject and tries to find the factors of big data application in enterprises by a modified Decision Making Trial and Evaluation Laboratory (DEMATEL) and perceived benefits - perceived barriers relation matrix as reference for big data application and management of managers or marketing personnel in other organizations or related industry.