• Title/Summary/Keyword: Operating Systems

Search Result 4,766, Processing Time 0.03 seconds

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Study on the Experience of Unbelief in the Process of Providing Home Visiting Care Service: Focusing on the perspective of the Facility Director (재가방문요양 서비스 제공과정에서 겪는 불신경험에 관한 연구: 시설운영자 관점을 중심으로)

  • Jun-Suk Kim;Ji-Hye Kim;Jung-Mi Kim;Mi-Young Park;Byung Woo Lim
    • Journal of Industrial Convergence
    • /
    • v.21 no.10
    • /
    • pp.65-80
    • /
    • 2023
  • Through inductive content analysis, this study sought to examine the crisis experienced by the institution, the quality of service, and the distrust of the system and institution based on the experience of distrust in the home-visiting care service of bbeneficiary and guardians. FGI was conducted on five managers of institutions that provide home-visiting care services. As a result, the central phenomenon was found: deterioration of service quality, distrust of systems and institutions, and difficulties in opera-ting long-term care institutions. In order to improve the quality of home-visited care services and build trust in care workers and institutions, first, home-based associations or operating corporations should develop new education program plans and manuals to strengthen the capabilities of care workers and social workers. Second, the NHIS's monitoring system and the professional management system of care workers should be established. Third, it is necessary to improve awareness of the role, expertise, and rights of care workers, and fourth, improvement measures are required to reduce the turnover rate of care workers, which is the cause of the deterioration of the quality of long-term care services.

Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers (화이트 박스 블록 암호에 대한 최신 암호분석 기술 동향 연구)

  • Chaerin Oh;Woosang Im;Hyunil Kim;Changho Seo
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.9-18
    • /
    • 2023
  • Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making challenging verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures. adhering to the format of a research paper.

A Reflection of Aging Society in Online Communities: An Exploratory Study on Changes in Conversation Style and Language Usage (온라인 커뮤니티에서 보여지는 노령화 사회의 단면: 대화 방식과 사용 언어의 변화에 대한 탐색적 연구)

  • Jung Lee;Jinyoung Han;Juyeon Ham
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.51-68
    • /
    • 2023
  • With the emergence of the internet and the increasing use of online communities for over 20 years, the age range of users has also been rising. This study explores the linguistic changes that have occurred as the user age in online communities has increased. To do this, data was collected and analyzed from an online community that has been actively operating, despite new member registrations being closed nine years ago. By comparing the posts over an 11-year period from 2012 to 2022, changes such as an increase in average comments, a decrease in interrogative sentences, and a decrease in imperative statements were observed. The study also proposed loneliness due to aging and a decline in curiosity and confidence as potential causes of these changes. In South Korea, which is rapidly entering an aging society unprecedentedly fast on a global scale, the increase in single-person households has evolved loneliness from a personal issue to a social problem, manifested in an increase in solitary deaths and reclusive individuals. This research sheds light on one aspect of these social phenomena through the analysis of data from a large online community.

Evaluation of the linked operation of Pyeongrim Dam and Suyangje (dam) during period of drought (가뭄 시 평림댐과 수양제 연계 운영 평가)

  • Park, Jinyong;Lee, Seokjun;Kim, Sungi;Choi, Se Kwang;Chun, Gunil;Kim, Minhwan
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.4
    • /
    • pp.301-310
    • /
    • 2024
  • The spatial and temporal non-uniform distribution of precipitation makes water management difficult. Due to climate change, nonuniform distribution of precipitation is worsening, and droughts and floods are occurring frequently. Additionally, the intensity of droughts and floods is intensifying, making existing water management systems difficult. From June 2022 to June 2023, most of the water storage rates of major dams in the Yeongsan river and Seomjin river basin were below 30%. In the case of Juam dam, which is the most dependent on water use in the basin, the water storage rate fell to 20.3%, the lowest ever. Pyeongnim dam recorded the lowest water storage rate of 27.3% on May 4, 2023. Due to a lack of precipitation starting in the spring of 2022, Pyeongnim dam was placed at a drought concern level on June 19, 2022, and entered the severe drought level on August 21. Pyeongrim dam and Suyangje(dam) have different operating institutions. Nevertheless, the low water level was not reached at Pyeongnim dam through organic linkage operation in a drought situation. Pyeongnim dam was able to stably supply water to 63,000 people in three counties. In order to maximize the use of limited water resources, we must review ways to move water smoothly between basins and water sources, and prepare for water shortages caused by climate change by establishing a consumer-centered water supply system.

Research on Overheating Prediction Methods for Truck Braking Systems (화물차의 제동장치에서 발생하는 과열 예측방안 연구)

  • Beom Seok Chae;Young Jin Kim;Hyung Jin Kim
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.54-61
    • /
    • 2024
  • Recently, due to the increase in domestic and international online e-commerce platforms and the increase in container traffic at domestic ports, the operating ratio of large trucks has increased, and the number of truck fires is continuously increasing. In particular, spontaneous combustion is the most common cause of truck fires. Various academic approaches have been attempted to prevent truck fires, but due to the lack of research on the spontaneous tire ignition phenomenon that occurs during braking, this research directly designed and manufactured an experimental device to establish an environment similar to the braking system of a truck. A non-contact temperature sensor was installed on the brake device of the experimental device to collect temperature data generated from the brake device. Based on the data collected from the temperature sensor of the brake device and the temperature sensor on the tire surface, the ARIMA model among the time series prediction models was used to Appropriate parameters were selected to suit the temperature change trend, and as a result of comparing and analyzing the measured and predicted data, an accuracy of over 90% was obtained. Based on this, a plan was proposed to reduce the rate of fires in trucks by providing real-time warnings and support for truck drivers to respond to overheating phenomena occurring in the braking system.

Direction of Elderly Education in the Age of Science and Technology (과학기술 시대 노인교육의 방향)

  • Yoon Ok Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2024
  • The purpose of this study is to explore the direction of elderly education in the age of science and technology. The research contents to achieve the research purpose are, first, to examine the current status of elderly education, and second, to suggest the direction of elderly education in the age of science and technology. Due to the current status of education for the elderly, education for the elderly continues to change and develop, and various programs and activities are provided to help the elderly enjoy a richer retirement life. According to the survey report on the elderly, 11.9% of all elderly people participate in learning activities. Senior welfare centers accounted for the largest number of institutions conducting learning activities for elderly education learning activities participants at 35.5%. First, in the direction of elderly education in the age of science and technology, education on the use of digital technology and information is necessary in the composition of elderly education contents. Second, in the case of elderly education methods, customized elderly education methods are needed. Third, in the case of operating elderly education institutions, specialized education centers for elderly education must be further strengthened and supported. The international community is already forming a consensus that the establishment of new social systems and financial investment due to the increase in the elderly population should be considered a new growth engine rather than a social crisis. Although there is a burden on the social security sector due to the increase in the elderly population, there is a shift in the direction of recognizing the potential capabilities and experiences of the elderly and returning them to social resources. Elderly education in the age of science and technology needs to change to a direction that can build a healthy and progressive society in the future.

Analysis of Obstacles in the Export Process of Korean Ginseng (고려인삼 수출과정에서의 장애요소 분석 - 중국, 홍콩, 대만에 대한 고려인삼 수출을 중심으로)

  • Hongjian Lin
    • Journal of Ginseng Culture
    • /
    • v.6
    • /
    • pp.116-134
    • /
    • 2024
  • This study aimed to identify the issues in Korean ginseng exports through analyzing the ginseng market. Therefore, the study examined the current ginseng production status in South Korea and China, the major ginseng-producing countries in Northeast Asia, including cultivated areas, harvested areas, and production volumes. For South Korea, specific data on ginseng, such as average prices, operating costs, and production costs, were compiled to demonstrate the production competitiveness of Korean ginseng from a production perspective. Furthermore, as major ginseng-exporting countries, South Korea, China, and Hong Kong's export trends, including export quantities, export values, and export prices, as well as crucial export items and tariff rates, were summarized to showcase the export competitiveness of Korean ginseng. Additionally, this study aimed to understand the consumption patterns of ginseng in China, Hong Kong, and Taiwan by presenting various cases and events in these countries. Based on information related to production, export, and consumption, this study identified obstacles in the ginseng export process, including market downturns, weakened price competitiveness of Korean ginseng, increased market share of competing products like Chinese and Western ginseng, a lack of promotion and marketing, and insufficient development and export of various ginseng products. In response, strategies for overcoming these obstacles were proposed, including diversifying exports, establishing effective production systems, enhancing quality and branding, strengthening promotion and marketing efforts, and developing various ginseng products.

Research on APC Verification for Disaster Victims and Vulnerable Facilities (재난약자 및 취약시설에 대한 APC실증에 관한 연구)

  • Seungyong Kim;Incheol Hwang;Dongsik Kim;Jungjae Shin;Seunggap Yong
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.199-205
    • /
    • 2024
  • Purpose: This study aims to improve the recognition rate of Auto People Counting (APC) in accurately identifying and providing information on remaining evacuees in disaster-vulnerable facilities such as nursing homes to firefighting and other response agencies in the event of a disaster. Methods: In this study, a baseline model was established using CNN (Convolutional Neural Network) models to improve the algorithm for recognizing images of incoming and outgoing individuals through cameras installed in actual disaster-vulnerable facilities operating APC systems. Various algorithms were analyzed, and the top seven candidates were selected. The research was conducted by utilizing transfer learning models to select the optimal algorithm with the best performance. Results: Experiment results confirmed the precision and recall of Densenet201 and Resnet152v2 models, which exhibited the best performance in terms of time and accuracy. It was observed that both models demonstrated 100% accuracy for all labels, with Densenet201 model showing superior performance. Conclusion: The optimal algorithm applicable to APC among various artificial intelligence algorithms was selected. Further research on algorithm analysis and learning is required to accurately identify the incoming and outgoing individuals in disaster-vulnerable facilities in various disaster situations such as emergencies in the future.

Development Plan for the Consequence Management in Response to Large-Scale Wildfire Disasters Using Air Force Transport Aircraft (C-130) (공군 수송기(C-130)를 활용한 대형산불 재난 대응 시 사후관리(CM) 발전방안)

  • Sangduk Kim;Minki Kim
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.232-243
    • /
    • 2024
  • Purpose: Recently, large-scale forest fires caused by climate change, natural disasters, and human factors have been increasing every year in the East Coast and Taebaek Mountains region. Although forest fire extinguishing using helicopters is currently increasing, the need to introduce air force transport aircraft has continued to be raised due to the importance of early fire extinguishment to respond to large forest fires and the difficulty of extinguishing forest fires between sheep. This study seeks to present a plan for developing a post-fire management system for several aspects - achieving operational objectives, overcoming the operating environment, selecting a staging area, and efficient operation measures - to efficiently perform forest fire extinguishing missions using Air Force transport aircraft. Method: Based on literature research on forest fire extinguishing, forest fire extinguishing experiments using fixed-wing aircraft, and the operation status and operation method of forest fire extinguishing helicopters, the pros and cons of helicopter operation and the effects of large forest fire extinguishing using a large transport aircraft (C-130) Analyze the effectiveness of operation through analysis. Results: When extinguishing a large forest fire, an effective CM (Consequence Management) application plan was derived, including effective operation, control, command system, dispatch request, and forest fire extinguishment when integrating helicopter and fixed-wing aircraft (C-130). Conclusion: The application of the concept of CM (Consequence Management) is partially applied to some areas of chemical, biological, and radiological (CBRNE) protection in Korea, but efficient operation, control, and command systems are established when integrated operation of helicopters and large aircraft (C-130) in forest fire extinguishment. the concept of CM (Consequence Management), which is operated in advanced countries, was applied for safety management, dispatch requests, and forest fire extinguishing, thereby contributing to the establishment of a more advanced disaster and post-disaster management system.