• Title/Summary/Keyword: Log management

Search Result 738, Processing Time 0.031 seconds

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Evaluating the Visual Contrast Rating of the Landscape Impact Factors - A case study for the Buildings in Natural Landscape - (경관영향 요소별 경관 대비성 평가 - 자연경관에 도입되는 건축물을 중심으로 -)

  • Choi, Won-Bin;Shin, Ji-Hoon
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.3
    • /
    • pp.87-96
    • /
    • 2018
  • While cities became bigger and bigger since 1990s, many indiscretely high buildings started to be built in the mountain areas inside a city and in the rural areas in the suburb of each city. To regulate such indiscrete developments, the government prepared for some relevant legal and institutional criteria by having enacted the "Landscape Act" and established a strong management means in the legal and institutional aspects by having introduced the natural landscape deliberation system and the landscape deliberation one into the "Natural Environment Conservation Act." However, since some uniform levels of absolute height and no. of stories are suggested legally and institutionally, it is hard to consider the effects of a real building structure onto the relevant landscape. Accordingly, this thesis is intended to grasp the contrast of the landscape elements in the allowable height section, which is presented through landscape sensitivity. As the results from the visual contrast rating on a small apartment complex located in Dangjin and a large scale of apartment complex in Seosan as the apartment complexes surrounded with natural landscapes that were selected as the subjects of this study, the following conclusion can be finalized. First, there were deducted some factors, that is, forms, lines, colors, textures and sizes as the ones with which can measure and evaluate the contrasting properties when a structure gets into a natural landscape. Second, in case of a small scale of apartment complex (in the foreground) compared to a large one (in the foreground), it was found that the contrasting properties were bigger. In addition, it was also found that the contrasting property of the landscape factor of the foreground compared to that of the middle one becomes bigger depending on a distance. Third, as the results from an evaluation on the contrasting properties of the landscape factor depending on the changes of each floor of a structure, it was found that the factors, that is, forms, lines, colors, textures and sizes are very significant. Among those factors, the factors, forms and lines in a small scale of apartment complex (in the foreground) showed each log regression. But in all of the other cases, they showed each line regression. Fourth, as the results from examining the regression coefficients of the landscape factor, the coefficients of the shapes and lines have similar coefficients and the colors and the textures have similar ones, too. In case of the sizes of apartment complexes, the colors and the textures of a large apartment complex (in the foreground) have similar coefficients, in case of that in the middle ground, the shapes and lines have similar coefficients. Fifth, as the results from estimating the contrasting properties of the landscape factor on the floors within the allowed scope of the landscape sensitivity, it was found that the contrasting property was 3.5 to 4.9 in case of a small scale of apartment complex (in the foreground), but 2.5to 3.7 in case of a small scale of one. In case of a large scale of apartment complex, the value was 3.5 to 5.3, but in case of a large one in the middle ground was 2.9 to 4.9. Sixth, it was comprehended that the contrasting properties of the landscape factor become different depending on each size of apartment complex and the distance of a view point. In this study, it is intended to find the meaning from the aspect that the results can be used as the baseline data for comprehending a proper range of heights of structures objectively during a natural landscape deliberation or a landscape deliberation.

Histamine Bronchial Provocation Test -Timed Tidal Breathing Technique- (히스타민 기관지유발 검사 -일정시간 흡입법-)

  • Chung, Yeon-Tae;Won, Kyung-Sook;Park, Hae-Shim
    • Tuberculosis and Respiratory Diseases
    • /
    • v.41 no.3
    • /
    • pp.270-276
    • /
    • 1994
  • Background: The measurement of nonspecific bronchial hyperreactivity is valuable for diagnosis and management of bronchial asthma. Methacholine or histamine is used for the pharmacologic provocation test. Usually a methacholine bronchial provocation test is performed by a dosing technique with counted number of breaths. A dosimeter is indispensable in the dosing technique. Recently a timed tidal breathing technique which dose not need an expensive dosimeter was introduced. We measured the degree of nonspecific bronchial hyperreactivity to histamine using a simple timed tidal breathing technique. Method: Forty two healthy volunteers, 12 patients with bronchial asthma(BA), 10 patients with rhinitis(RH) and 10 patients with upper respiratory infection(URI) participated in the study. The subject's nose was clipped and inhalation continued during tidal breathing for 2 minutes via a face mask. $FEV_1$ was measured at 30 seconds, 90 seconds after inhalation and inhalation of next solution was continued until there was a fall in $FEV_1$ of 20%. Histamine PC20 was defined as the concentration at 20% fall of $FEV_1$ and it was obtained from the log dose-response curve by linear interpolation. Results: Inhalation of serial dilution of histamine could be performed in all patients without significant side effects. The geometric mean${\pm}$standard deviation of histamine PC20 in healthy volunteers is $8.27{\pm}2.22mg/ml$, BA group $0.33{\pm}3.02mg/ml$, RH group $0.85{\pm}3.24mg/ml$, and URI group $1.47{\pm}1.98mg/ml$. Conclusion: Histamine bronchial provocation test using timed tidal breath method is a simple and suitable tool for management of patients with bronchial hyperreactivity.

  • PDF

Longitudinal Pattern of Large Wood Distribution in Mountain Streams (산지계류에 있어서 유목의 종단적 분포특성)

  • Seo, Jung Il;Chun, Kun Woo;Kim, Min Sik;Yeom, Kyu Jin;Lee, Jin Ho;Kimura, Masanobu
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.1
    • /
    • pp.52-61
    • /
    • 2011
  • Whereas recent researches have elucidated the positive ecological roles of large wood (LW) in fishbearing channels, LW is also recognized as a negative factor of log-laden debris flows and floods in densely populated areas. However in Republic of Korea, no study has investigated longitudinal variations of LW distribution and dynamic along the stream corridor. Hence to elucidate 1) physical factors controlling longitudinal distribution of LW and 2) their effect on variation in LW load amount, we surveyed the amount of LW with respect to channel morphology in a mountain stream, originated from Mt. Ki-ryong in Inje, Gangwondo. Model selection in the Generalized Linear Model procedure revealed that number of boulder (greater than or equal to 1.0 m in diameter), bankfull channel width and their interaction were the best predictors explaining LW load volume per unit channel segment area (unit LW load). In general, boulders scattered within small mountain streams influence LW retention as flow obstructions. However, in this study, we found that the effect of the boulders vary with the channel width; that is, whereas the unit LW load in the segment with narrow channel width increased continuously with increasing boulder number, it in the segment with wide channel width did not depend on the boulder number. This should be because that, in two channels having different widths, the rates of channel widths reduced by boulders are different although boulder numbers are same. Our findings on LW load varying with physical factors (i.e., interaction of boulder number and channel width) along the stream corridor suggest understanding for longitudinal continuum of hydrogeomorphic and ecologic characteristics in stream environments, and these should be carefully applied into the erosion control works for systematic watershed management and subsequent disaster prevention.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

The Analysis on the Relationship between Firms' Exposures to SNS and Stock Prices in Korea (기업의 SNS 노출과 주식 수익률간의 관계 분석)

  • Kim, Taehwan;Jung, Woo-Jin;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.233-253
    • /
    • 2014
  • Can the stock market really be predicted? Stock market prediction has attracted much attention from many fields including business, economics, statistics, and mathematics. Early research on stock market prediction was based on random walk theory (RWT) and the efficient market hypothesis (EMH). According to the EMH, stock market are largely driven by new information rather than present and past prices. Since it is unpredictable, stock market will follow a random walk. Even though these theories, Schumaker [2010] asserted that people keep trying to predict the stock market by using artificial intelligence, statistical estimates, and mathematical models. Mathematical approaches include Percolation Methods, Log-Periodic Oscillations and Wavelet Transforms to model future prices. Examples of artificial intelligence approaches that deals with optimization and machine learning are Genetic Algorithms, Support Vector Machines (SVM) and Neural Networks. Statistical approaches typically predicts the future by using past stock market data. Recently, financial engineers have started to predict the stock prices movement pattern by using the SNS data. SNS is the place where peoples opinions and ideas are freely flow and affect others' beliefs on certain things. Through word-of-mouth in SNS, people share product usage experiences, subjective feelings, and commonly accompanying sentiment or mood with others. An increasing number of empirical analyses of sentiment and mood are based on textual collections of public user generated data on the web. The Opinion mining is one domain of the data mining fields extracting public opinions exposed in SNS by utilizing data mining. There have been many studies on the issues of opinion mining from Web sources such as product reviews, forum posts and blogs. In relation to this literatures, we are trying to understand the effects of SNS exposures of firms on stock prices in Korea. Similarly to Bollen et al. [2011], we empirically analyze the impact of SNS exposures on stock return rates. We use Social Metrics by Daum Soft, an SNS big data analysis company in Korea. Social Metrics provides trends and public opinions in Twitter and blogs by using natural language process and analysis tools. It collects the sentences circulated in the Twitter in real time, and breaks down these sentences into the word units and then extracts keywords. In this study, we classify firms' exposures in SNS into two groups: positive and negative. To test the correlation and causation relationship between SNS exposures and stock price returns, we first collect 252 firms' stock prices and KRX100 index in the Korea Stock Exchange (KRX) from May 25, 2012 to September 1, 2012. We also gather the public attitudes (positive, negative) about these firms from Social Metrics over the same period of time. We conduct regression analysis between stock prices and the number of SNS exposures. Having checked the correlation between the two variables, we perform Granger causality test to see the causation direction between the two variables. The research result is that the number of total SNS exposures is positively related with stock market returns. The number of positive mentions of has also positive relationship with stock market returns. Contrarily, the number of negative mentions has negative relationship with stock market returns, but this relationship is statistically not significant. This means that the impact of positive mentions is statistically bigger than the impact of negative mentions. We also investigate whether the impacts are moderated by industry type and firm's size. We find that the SNS exposures impacts are bigger for IT firms than for non-IT firms, and bigger for small sized firms than for large sized firms. The results of Granger causality test shows change of stock price return is caused by SNS exposures, while the causation of the other way round is not significant. Therefore the correlation relationship between SNS exposures and stock prices has uni-direction causality. The more a firm is exposed in SNS, the more is the stock price likely to increase, while stock price changes may not cause more SNS mentions.

Development of a Predictive Model Describing the Growth of Staphylococcus aureus in Pyeonyuk marketed (시중 유통판매 중인 편육에서의 Staphylococcus aureus 성장예측모델 개발)

  • Kim, An-Na;Cho, Joon-Il;Son, Na-Ry;Choi, Won-Seok;Yoon, Sang-Hyun;Suh, Soo-Hwan;Kwak, Hyo-Sun;Joo, In-Sun
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.3
    • /
    • pp.206-210
    • /
    • 2017
  • This study was performed to develope mathematical models for predicting growth kinetics of Staphylococcus aureus in the processed meat product, pyeonyuk. Growth patterns of S. aureus in pyeonyuk were determined at the storage temperatures of 4, 10, 20, and $37^{\circ}C$ respectively. The number of S. aureus in pyeonyuk increased at all the storage temperatures. The maximum specific growth rate (${\mu}_{max}$) and lag phase duration (LPD) values were calculated by Baranyi model. The ${\mu}_{max}$ values went up, while the LPD values decreased as the storage temperature increased from $4^{\circ}C$ to $37^{\circ}C$. Square root model and polynomial model were used to develop the secondary models for ${\mu}_{max}$ and LPD, respectively. Root Mean Square Error (RMSE) was used to evaluate the developed model and the fitness was determind to be 0.42. Therefore the developed predictive model was useful to predict the growth of S. aureus in pyeonyuk and it will help to prevent food-born disease by expanding for microbial sanitary management guide.

Effects of pH and Redox Conditon on Silica Sorption in Submerged soils (담수조건(湛水條件)에서 토양산도(土壤酸度)와 산화환원(酸化還元) 전위(電位)가 토양(土壤)의 규산흡착(珪酸吸着)에 미치는 영향(影響))

  • Lee, Sang-Eun;Neue, Heins Ulitz
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.25 no.2
    • /
    • pp.111-126
    • /
    • 1992
  • Silica sorption isotherm belonged to the C-type with weak L-type characteristics according to the classification system of adsorption isotherm. Silica sorption isothem fitted well to the Freundlich and Tempkin equation but not to the Langmuir equation. The color interference probably due to $Fe^{2+}$ during spectrometric silca determination by Molybdenum-blue method affected the sorption isotherm in reduced soils or low pH. Four parameters such as the intercept of Freundlich equation, the slope of Tempkin equation, the "Silica reactivity", and the "C-type slope", where the last two parameters were termed in the current study, were examined to assess treatment effects on silica sorption. Among them the "C-type slope" was found out to be the best parameter. The C-type isotherms showed the same high correlation coefficient as Freundlich and Tempkin equation when regressed to the sorption isothem. Plotting the C-type slope on a logarithmic scale vs. the pH showed high linearity. Using the "C-type slope" as a perameter, the pH and soil type affected the silica sorption while the effect of redox condtion was not significant. All Fe and Al extracted by the various reagents, and OM were highly correlated to silica sorption. Among them $Fe_d$ was identified as the highest influencing soil property. Since there is no equivalent reliable method to discriminate the forms of the soil Al-oxides their likely importance remains unclear.

  • PDF

Development of Evaluation Model for ITS Project using the Probabilistic Risk Analysis (확률적 위험도분석을 이용한 ITS사업의 경제성평가모형)

  • Lee, Yong-Taeck;Nam, Doo-Hee;Lim, Kang-Won
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.3 s.81
    • /
    • pp.95-108
    • /
    • 2005
  • The purpose of this study is to develop the ITS evaluation model using the Probabilistic Risk Analysis (PRA) methodology and to demonstrate the goodness-of-fit of the large ITS projects through the comparative analysis between DEA and PRA model. The results of this study are summarized below. First, the evaluation mode] using PRA with Monte-Carlo Simulation(MCS) and Latin-Hypercube Sampling(LHS) is developed and applied to one of ITS projects initiated by local government. The risk factors are categorized with cost, benefit and social-economic factors. Then, PDF(Probability Density Function) parameters of these factors are estimated. The log-normal distribution, beta distribution and triangular distribution are well fitted with the market and delivered price. The triangular and uniform distributions are valid in benefit data from the simulation analysis based on the several deployment scenarios. Second, the decision making rules for the risk analysis of projects for cost and economic feasibility study are suggested. The developed PRA model is applied for the Daejeon metropolitan ITS model deployment project to validate the model. The results of cost analysis shows that Deterministic Project Cost(DPC), Deterministic Total Project Cost(DTPC) is the biased percentile values of CDF produced by PRA model and this project need Contingency Budget(CB) because these values are turned out to be less than Target Value(TV;85% value), Also, this project has high risk of DTPC and DPC because the coefficient of variation(C.V) of DTPC and DPC are 4 and 15 which are less than that of DTPC(19-28) and DPC(22-107) in construction and transportation projects. The results of economic analysis shows that total system and subsystem of this project is in type II, which means the project is economically feasible with high risk. Third, the goodness-of-fit of PRA model is verified by comparing the differences of the results between PRA and DEA model. The difference of evaluation indices is up to 68% in maximum. Because of this, the deployment priority of ITS subsystems are changed in each mode1. In results. ITS evaluation model using PRA considering the project risk with the probability distribution is superior to DEA. It makes proper decision making and the risk factors estimated by PRA model can be controlled by risk management program suggested in this paper. Further research not only to build the database of deployment data but also to develop the methodologies estimating the ITS effects with PRA model is needed to broaden the usage of PRA model for the evaluation of ITS projects.

Present status and prospect for development of mushrooms in Korea

  • Jang, Kab-Yeul;Oh, Youn-Lee;Oh, Minji;Im, Ji-Hoon;Lee, Seul-Ki;Kong, Won-Sik
    • 한국균학회소식:학술대회논문집
    • /
    • 2018.05a
    • /
    • pp.27-27
    • /
    • 2018
  • The production scale of mushroom cultivation in Korea is approximately 600 billion won, which is 1.6% of the Korean gross agricultural output. Annually, ca. 190,000 tons of mushrooms are harvested in Korea. Although the numbers of mushroom farms and cultivators are constantly decreasing, the total mushroom yields are increasing due to the large-scale cultivation facilities and automation. The recent expansion of the well-being trend causes increase in mushroom consumption in Korea: annual per capita consumption of mushroom was 3.9kg ('13) that is a little higher than European's average. Thus the exports of mushrooms, mainly Flammulina velutipes and Pleurotus ostreatus, have been increased since the middle of 2000s. Recently, however, it is slightly reduced. However, Vietnam, Hong Kong, the United States, the Netherlands and continued to export, and the country has increased recently been exported to Australia, Canada, Southeast Asia and so on. Canned foods of Agaricus bisporus was the first exports of the Korean mushroom industry. This business has reached the peak of the sale in 1977-1978. As Korea initiated trade with China in 1980, the international prices of mushrooms were sharply fall that led to shrink the domestic markets. According to the high demand to develop new items to substitute for A. bisporus, oyster mushroom (Pleurotus ostreatus) was received the attention since it seems to suit the taste of Korean consumers. Although log cultivation technique was developed in the early 1970s for oyster mushroom, this method requires a great deal of labor. Thus we developed shelf cultivation technique which is easier to manage and allows the mass production. In this technique, the growing shelf is manly made from fermented rice straw, that is the unique P. ostreatus medium in the world, was used only in South Korea. After then, the use of cotton wastes as an additional material of medium, the productivity. Currently it is developing a standard cultivation techniques and environmental control system that can stably produce mushrooms throughout the year. The increase of oyster mushroom production may activate the domestic market and contribute to the industrial development. In addition, oyster mushroom production technology has a role in forming the basis of the development of bottle cultivation. Developed mushroom cultivation technology using bottles made possible the mass production. In particular, bottle cultivation method using a liquid spawn can be an opportunity to export the F.velutipes and P.eryngii. In addition, the white varieties of F.velutipes were second developed in the world after Japan. We also developed the new A.bisporus cultivar "Sae-ah" that is easy to grown in Korea. To lead the mushroom industry, we will continue to develop the cultivars with an international competitive power and to improve the cultivation techniques. Mushroom research in Korea nowadays focuses on analysis of mushroom genetics in combination with development of new mushroom varieties, mushroom physiology and cultivation. Further studied are environmental factors for cultivation, disease control, development and utilization of mushroom substrate resources, post-harvest management and improvement of marketable traits. Finally, the RDA manages the collection, classification, identification and preservation of mushroom resources. To keep up with the increasing application of biotechnology in agricultural research the genome project of various mushrooms and the draft of the genetic map has just been completed. A broad range of future studies based on this project is anticipated. The mushroom industry in Korea continually grows and its productivity rapidly increases through the development of new mushrooms cultivars and automated plastic bottle cultivation. Consumption of medicinal mushrooms like Ganoderma lucidum and Phellinus linteus is also increasing strongly. Recently, business of edible and medicinal mushrooms was suffering under over-production and problems in distribution. Fortunately, expansion of the mushroom export helped ease the negative effects for the mushroom industry.

  • PDF