• 제목/요약/키워드: Internal Network Information

검색결과 502건 처리시간 0.032초

전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구 (A Study on Leakage of Critical Information via the Power Analysis of Power Lines)

  • 한경호;이성호
    • 전기학회논문지
    • /
    • 제63권11호
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

Summary of Maritime Cyber Attacks and Risk Management

  • Al-Absi, Mohammed Abdulhakim;Al-Absi, Ahmed Abdulhakim;Kim, Ki-Hwan;Lee, Young-Sil;Lee, Hoon Jae
    • International journal of advanced smart convergence
    • /
    • 제11권3호
    • /
    • pp.7-16
    • /
    • 2022
  • The targets of cyber-attacks are not limited to the websites and internal IT systems of shipping agencies. Ships and ports have become important targets for cyber attackers. This paper examines the current state of ship network security, introduces the International Maritime Organization's resolution on ship network security management, and summarizing the cyber-attacks in maritime so the readers can have a general understanding of maritime environment.

정보기술(IT)의 터널 설계 분야에의 적용사례 (Application of Information Technology in Tunnel Design - A case study)

  • 유충식;김주미;김진하
    • 한국터널공학회:학술대회논문집
    • /
    • 한국터널공학회 2005년도 학술발표회 논문집
    • /
    • pp.105-116
    • /
    • 2005
  • This study investigated the applicability of the Artificial Neural Network(ANN) technique for prediction of tunnel behavior. For training data collection, a series of finite element analyses were conducted for actual tunnel project site. Using the data, optimimzed ANNs were developed through a sensitivity study on internal parameters. The developed ANNs can make tunneling related predictions such as tunnel crown settlement, shotcrete lining stress, ground surface settlement, and groundwater inflow rate. The results indicated that the developed ANNs can be used as an effective and efficient tool for tunnelling related prediction in practical tunneling situations.

  • PDF

흉부 CT 영상에서 비소세포폐암 환자의 재발 예측을 위한 종양 내외부 영상 패치 기반 앙상블 학습 (Ensemble Learning Based on Tumor Internal and External Imaging Patch to Predict the Recurrence of Non-small Cell Lung Cancer Patients in Chest CT Image)

  • 이예슬;조아현;홍헬렌
    • 한국멀티미디어학회논문지
    • /
    • 제24권3호
    • /
    • pp.373-381
    • /
    • 2021
  • In this paper, we propose a classification model based on convolutional neural network(CNN) for predicting 2-year recurrence in non-small cell lung cancer(NSCLC) patients using preoperative chest CT images. Based on the region of interest(ROI) defined as the tumor internal and external area, the input images consist of an intratumoral patch, a peritumoral patch and a peritumoral texture patch focusing on the texture information of the peritumoral patch. Each patch is trained through AlexNet pretrained on ImageNet to explore the usefulness and performance of various patches. Additionally, ensemble learning of network trained with each patch analyzes the performance of different patch combination. Compared with all results, the ensemble model with intratumoral and peritumoral patches achieved the best performance (ACC=98.28%, Sensitivity=100%, NPV=100%).

State Management of the Development of National Cybersecurity Systems

  • Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.11-16
    • /
    • 2022
  • The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.

External vs. Internal: An Essay on Machine Learning Agents for Autonomous Database Management Systems

  • Fatima Khalil Aljwari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.164-168
    • /
    • 2023
  • There are many possible ways to configure database management systems (DBMSs) have challenging to manage and set.The problem increased in large-scale deployments with thousands or millions of individual DBMS that each have their setting requirements. Recent research has explored using machine learning-based (ML) agents to overcome this problem's automated tuning of DBMSs. These agents extract performance metrics and behavioral information from the DBMS and then train models with this data to select tuning actions that they predict will have the most benefit. This paper discusses two engineering approaches for integrating ML agents in a DBMS. The first is to build an external tuning controller that treats the DBMS as a black box. The second is to incorporate the ML agents natively in the DBMS's architecture.

초고속망을 이용한 원격 종합 한의학 의료정보 시범시스템 구축 (Construction of Multimedia-based Total Oriental Medicine Information Retrieval and Remote Medical Examination System Based on Thesaurus)

  • 양옥렬;이용주
    • 한국정보처리학회논문지
    • /
    • 제7권2S호
    • /
    • pp.594-607
    • /
    • 2000
  • The goal of this research is to develop a Remote Medical Examination System on Oriental Medicine on the very high sped information communication network. We developed a remote medical examination system based on the sample examination data of 10 patients and develop the information of search database based on contents. We analyzed the sample data and the requirements of patients, doctors, and nurses. By the analyzed result, we designed and constructed a prototype are as follow: the multimedia ORDBMS server system, network interface technology, internal/external database schema design, oriental medicine expert knowledge base design, inter-data search algorithm design and thesaurus.

  • PDF

Implementation of Multipurpose PCI Express Adapter Cards with On-Board Optical Module

  • Koo, Kyungmo;Yu, Junglok;Kim, Sangwan;Choi, Min;Cha, Kwangho
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.270-279
    • /
    • 2018
  • PCI Express (PCIe) bus, which was only used as an internal I/O bus of a computer system, has expanded its function to outside of a system, with progress of PCIe switching processor. In particular, advanced features of PCIe switching processor enable PCIe bus to serve as an interconnection network as well as connecting external devices. As PCIe switching processors more advanced, it is required to consider the different adapter card architecture. This study developed multipurpose adapter cards by applying an on-board optical module, a latest optical communications element, in order to improve transfer distance and utilization. The performance evaluation confirmed that the new adapter cards with long cable can provide the same bandwidth as that of the existing adapter cards with short copper cable.

클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델 (Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment)

  • 김영수;이병엽
    • 한국콘텐츠학회논문지
    • /
    • 제18권6호
    • /
    • pp.434-442
    • /
    • 2018
  • 오늘날 보안 위협이 점차 증가하고, 인터넷을 통한 외부악성 코드에 감염된 디바이스에 의해서 중요 데이터가 유출되는 피해가 증가하고 있다. 따라서 내부망에 연결된 디바이스에 대한 인증을 통해서 업무용 서버로의 접근을 차단하는 내부망 분리 모델이 필요하다. 이를 위한 VDI (Virtual Desktop Infrastructure)방식을 사용한 논리적 망 분리는 내부망에 연결된 물리 디바이스와 가상 디바이스 간에는 정보 교환이 차단되는 방식으로 중요 데이터의 유출을 방지하고 있으나 미등록 디바이스를 사용하여 내부망의 업무용 서버에 접근하여 중요 자료를 유출하는 공격에는 취약하다. 따라서 이의 해결책으로 VDI(Virtual Desktop Infrastructure) 기술에 블록체인 기술을 수용하여 블록체인 기반 망 분리 모델을 제안한다. 이는 VDIVirtual Desktop Infrastructure) 방식의 논리적 망 분리의 보안 취약점인 디바이스의 위변조에 대한 식별 능력과 디바이스의 무결성 강화를 통한 내부의 중요 데이터의 유출 위협을 감소시키는데 기여한다.

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.