• Title/Summary/Keyword: New Address Information

Search Result 703, Processing Time 0.024 seconds

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

A Study on the Threat Analysis and Risk Assessment of Ship Ballast Water System (선박 평형수 시스템의 위협 분석 및 위험 평가에 관한 연구)

  • Hyoseok Lim;Yonghyun Jo;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.961-972
    • /
    • 2024
  • As IT and OT systems become integrated into ship operations, the security of propulsion, control, communication, and navigation systems has become increasingly critical. In response, the International Association of Classification Societies (IACS) will enforce cybersecurity requirements starting from July 2024. IACS No. 171 (Recommendations on Incorporating Cyber Risk Management into Safety Management Systems) presents quantitative assessment methods; however, there is room for improvement. This study aims to address these issues by applying the TARA framework, outlined in ISO/SAE 21434 for connected vehicles, to identify attack surfaces and conduct risk assessments of the Ballast Water Treatment System(BWTS), which is crucial for navigational safety. Moreover, the study conducts a comparative analysis of the quantitative risk assessments of IACS No. 171 and the TARA framework, proposing the need for and considerations of a new risk assessment framework, VeTARA, specifically tailored for ships. This research is expected to contribute to the enhancement of cyber risk management in maritime operations.

Harmonizing Private Key Security and Ethereum Account System Flexibility: A FIDO2 and AA-Based Cryptocurrency Wallet (개인키 보안과 이더리움 계정 시스템의 유연성 조화: FIDO2와 AA 기반 암호화폐 지갑)

  • Dawoon Jung;Beomjoong Kim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1073-1088
    • /
    • 2024
  • This study proposes a novel model to address the security, usability, and scalability challenges of cryptocurrency wallets. The model is implemented as a web application that combines FIDO2 (Fast Identity Online v2) with Account Abstraction (AA), offering enhanced security by storing private keys within the Trusted Execution Environment (TEE) of users' mobile devices. By utilizing two types of private keys, the model supports three account types, allowing users to flexibly select security levels and functionalities according to their needs. The research findings show that the proposed model provides strong security against various attack scenarios while also improving usability and scalability. By integrating hardware wallet-level security with the convenience of software wallets, this new paradigm for cryptocurrency wallets is expected to contribute to the widespread adoption of blockchain technology

Foreword to the Special Issue on the 2017 Environmental Spatial Information Research Papers Competition (2017 '친(親)환경도우미' 환경공간정보 우수논문 공모전)

  • Kim, Shin-yup;Lee, Woo-Kyun;Kim, Sang-Wan;Yoon, Jeong-Ho;Lee, Hoonyol;Park, No-Wook
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_2
    • /
    • pp.1041-1046
    • /
    • 2017
  • The Ministry of Environment(ME) has been producing and providing various environmental spatial information including land-cover maps in order to effectively cope with environmental issues. With the advent of the 4th industrial revolution era and the frequent occurrence of environmental disasters, the necessity of combining the environmental spatial information with the newest technology is increasing. By considering the increased necessity, the ME and the Korean Society of Remote Sensing held the 2017 Environmental Spatial Information Research Paper Competition with the aim of both discovering new application fields of environmental spatial information and supporting outstanding researchers. The outstanding 9 papers were finally selected after reviewing 51 papers submitted for the competition. This special issue includes the 9 papers that address advanced methodologies and application results based on environmental spatial information, as well as recent environmental issues. We expect the methodologies and applications presented in this special issue would be a reference anthology for users of environmental spatial information.

A Study on Software Implementation for Validation of Electronic Navigational Chart Regarding Standard Check for S-10X Data (S-10X 데이터 표준 검사를 위한 전자해도 검증 소프트웨어 구현에 관한 연구)

  • LEE, Ha-Dong;KIM, Ki-Su;CHOI, Yun-Su;KIM, Ji-Yoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.83-95
    • /
    • 2018
  • With recent technological advances in the shipbuilding industry, vessels have been improved in size and performance. As a result, an accident such as grounding, caused by a single ship-to-ship collision, could lead to a large-scale maritime disaster. Considering the seriousness of the situation, the international community has been consistently updating the standards for Electronic Navigational Chart(ENC) to improve the maritime safety. S-57, the existing ENC standard governed by the International Hydrographic Organization(IHO), includes standards for generating conventional binary-type ENC data sets. The S-57 standard, however, has not been updated since the release of Version 3.1 in December 2000. Since then, the standard has failed to reflect technological development regarding maritime spacial information, which has been consistently improving. In an effort to address this concern, the IHO designated S-100, i.e., the next-generation ENC production standard. S-100 differs from S-57 in data exchange type. Contrary to the conventional ENC standards, which use binary-type data, S-10X, based on the next-generation ENC standards, uses ENC data composed of Feature Catalogue, Portrayal Catalogue, and GML. Considering this fact, it is necessary to update S-58, the ENC validation check standard, or designate a new standard for ENC validation checks. This study is developed own software to implement validation checks for new types of data, and identified improvement points based on the test results.

A Study on the Selection Method of Subject Parcel to Alter Land Category by Fuzzy GIS Analysis - Focused on Road State of Government Owned and Public Land - (퍼지 GIS 공간분석에 의한 지목변경 대상필지 선정방법에 관한 연구 - 국공유지 도로현황을 중심으로 -)

  • Cho, Tae-In;Choi, Byoung-Gil
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2011
  • The purpose of this study is to research into a method of selecting the subject parcel with a change in the category of land given surveying the land alteration state focusing on the present state of road in the government-owned and public land by using the fuzzy membership function and GIS spatial analysis. It selected the old town center of Incheon Jung-gu, and the new downtown & the forest land of Gyeyang-gu as the research subject region, and carried out GIS spatial analysis on a serial cadastral map, urban planning road layer of Korea Land Information System, practical width of road layer of Road Name Address Management System & cadastral data base, and then calculated the suitable index for the subject parcel with a change in the category of land by using the fuzzy membership function with having the critical value as the area ratio of each parcel on a serial cadastral map that was incorporated into road layer or practical width of road layer. It finally selected the parcel, which is different in land category from the real land usage, as the final subject parcel for altering land category, by using the screen of visualizing the suitable index and the aerial ortho photograph. As a result of the final selection, the fuzzy GIS spatial analysis method, which was suggested in this study, is judged to be efficient in the selection period and the methodology compared to the existing manual method. It could be confirmed to be more suitable method for downtown than forest land and for the new downtown than the old town center.

Empirical Study of the Influences of Motives for Using SNS on Relational Capital of SNS and Continuous Usage of SNS (SNS의 이용동기가 SNS의 사회적 자본과 지속적 사용의도에 미치는 영향에 관한 실증연구)

  • Oh, Eun-Hae;Lee, Jeong-Hwa;Lee, Jeong-Ae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.138-149
    • /
    • 2019
  • The purpose of this study is to empirically address the influences of motives for using SNS on relational bridging and relational bonding in SNS and motives for continuous use SNS by applying the concepts of bonding and bridging, defined in the social capital theory, and major motives for using SNS are classified into three categories-social, information, and recreation categories - based on the previous studies and the usage and gratification theories. Through this study, it was revealed that motives of all these three categories-social, information, and recreation categories-have significant influences over relational bridging and relational bonding in SNS while relational bridging and relational bonding in SNS have significant influences over consistent motives for using SNS so the hypothesis of this study is accepted. It was also proven that motives of all these three categories - social, information, and recreation categories-for using SNS are important factors for creating new communities or expand relationships with other SNS users sharing similar interests. In addition, it was found that SNS users constantly use SNS to build relationships that could create a strong bond between individuals and receive emotional supports when necessary and to expand its own network by creating new relationships with other SNS users.

Analysis and Modeling of Essential Concepts and Process for Peer-Reviewing Data Paper (데이터논문 동료심사를 위한 핵심 개념 분석과 프로세스 모델링)

  • Sungsoo Ahn;Sung-Nam Cho;Youngim Jung
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.321-346
    • /
    • 2023
  • A data paper describing research data helps credit researchers producing the data while helping other researchers verify previous research and start new research by reusing the data. Publishing a data paper and depositing data to a public data repository are increasing with these benefits. A domestic academic society that plans to publish data papers faces challenges, including timely acquiring tremendous knowledge concerning data paper structures and templates, peer review policy and process, and trustworthy data repositories, as a data paper has different characteristics, unlike a research paper. However, the need for more research and information concerning the critical elements of data paper and the peer-review process makes it difficult to operate for data paper review and publication. To address these issues, we propose essential concepts of the data paper and the data paper peer-review, including the process model of the peer-review with in-depth analysis of five data journals' data paper templates, articles, and other guides worldwide. Academic societies intending to publish or add data papers as a new type of paper may establish policies and define a peer-review process by adopting the proposed conceptual models, effectively streamlining the preparation of data paper publication.

A Study on the Analysis and Methods to Improve the Management System for Building Energy Database (국가 건물에너지통합관리시스템의 데이터 품질 분석 및 개선방안 연구)

  • Kim, Sung-Min;Yoon, Jong-Don;Kwon, Oh-In;Shin, Sung-Eun
    • Journal of Energy Engineering
    • /
    • v.25 no.1
    • /
    • pp.131-144
    • /
    • 2016
  • Damage occur frequently around the world on climate change and the main cause of greenhouse gas emissions regulation is growing. To this end, the government has built integrated management system for national building energy. The building energy information is total 6.8 million complex. Integrated management system for national building energy database are matched building registers information and energy information of the supply agencies. However, the matching process has its limitations so advanced work is in progress continuously. This study analyzed integrated management system for national building energy database quality and limitations and deduce improvement plan to increase system reliability and availability. The existing database matching average rate is 85.6%. 58.2% of the total non-matching data type has no building information. To ensure the ease of new database matching and the accuracy of the existing database matching, address standarization and building properties system are needed between building information and energy information. Also, The system construction is required to include information on other energy sources like petroleum energy which has high proportion of non-urban areas and small residential areas and renewable energy which has high potential in development and utilization.