• Title/Summary/Keyword: cyber communication

Search Result 795, Processing Time 0.03 seconds

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case (사이버공격의 국가 경제적 손실분석 - 보이스 피싱을 중심으로)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2341-2346
    • /
    • 2012
  • Voice phishing against the old or weak persons have used the methods which are social engineering in the object and financial structure and function. Until recently Voice phishing from Chaina caused economic devastation and the economic loss by phishing grows with the South Koreans in the whole. Korean government and public organizations involved have been strengthening protection system and a financial security devices. But it is not easy to verify how much effects of security measures are. In this paper I will study the economic loss caused by voice phishing and potential economic effects of security measures and security device reinforcements of the Republic of Korea. Direct costs are reported about 100 million dollars and potential economic effects of voice phinshing secure measures may be around 320 million dollars.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.

A Delphi Study on Competencies of Mechanical Engineer and Education in the era of the Fourth Industrial Revolution (4차 산업혁명 시대 기계공학 분야 엔지니어에게 필요한 역량과 교육에 관한 델파이 연구)

  • Kang, So Yeon;Cho, Hyung Hee
    • Journal of Engineering Education Research
    • /
    • v.23 no.3
    • /
    • pp.49-58
    • /
    • 2020
  • In the era of the fourth industrial revolution, the world is undergoing rapid social change. The purpose of this study is to predict the expected changes and necessary competencies and desired curriculum and teaching methods in the field of mechanical engineering in the near future. The research method was a Delphi study. It was conducted three times with 20 mechanical engineering experts. The results of the study are as follows: In the field of mechanical engineering, it will be increased the situational awareness by the use of measurement sensors, development of computer applications, flexibility and optimization by user's needs and mechanical equipment, and demand for robots equipped with AI. The mechanical engineer's career perspectives will be positive, but if it is stable, it will be a crisis. Therefore active response is needed. The competencies required in the field of mechanical engineering include collaborative skills, complex problem solving skills, self-directed learning skills, problem finding skills, creativity, communication skills, convergent thinking skills, and system engineering skills. The undergraduate curriculum to achieve above competencies includes four major dynamics, basic science, programming coding education, convergence education, data processing education, and cyber physical system education. Preferred mechanical engineering teaching methods include project-based learning, hands-on education, problem-based learning, team-based collaborative learning, experiment-based education, and software-assisted education. The mechanical engineering community and the government should be concerned about the education for mechanical engineers with the necessary competencies in the era of the 4th Industrial Revolution, which will make global competitiveness in the mechanical engineering fields.

The Revitalization Schemes for Virtual Communities in Apartment Complexes - The Status and Classification of the Virtual Communities - (아파트 단지 내 사이버 공동체 활성화 방안 연구 I - 사이버 공동체 실태와 콘텐츠의 유형화 -)

  • Kang, Soon-Joo;Lee, Young-Ae
    • Journal of the Korean housing association
    • /
    • v.19 no.1
    • /
    • pp.57-66
    • /
    • 2008
  • In the past, strong social bands, which had spontaneous communities, existed in Korean traditional society. However, while it's developing through industrialization; monolithic apartment houses were introduced which causes less interaction between neighbors. With the growing attention to the higher living quality, various schemes to revitalize the community spirits have been groped, including to improve in hardhearted neighborhood relationships and to cope with the dreariness in the city. With the development of the internet and the spread of 'digital home', the communities in cyber space have been especially revitalized since the information-oriented society. In a move to strengthen the communities in apartment complexes, this study tries to find the revitalization scheme for virtual communities in apartment complexes by analyzing the contents of its web sites and understanding the world of virtual community. These are compared and analyzed. The related virtual communities ("cafe" or "blogs") are also analyzed. The results are as follows. 1) There are some differences among the contents provided by apartment virtual community developing companies, still, it could be categorized into four types; "apartment complex introduction and management information" "community revitalization" "living guide" "individual services" 2) The contents provided by self-organized communities of residents neither require additional charge nor special membership for information while the formation is not systematized. 3) In the comparison of apartment virtual community developing companies with residents self-organized communities, "apartment complex introduction and management information" on freeboard, notice, request and Q&A, and "community revitalization" on communication board are both provided throughout the web sites. 4) The contents provided by apartment virtual community developing companies makes the information available in a wide range with managers, on the other hand, self-organized communities emphasize on showing attachment and concern of residents and requiring communications between neighborhoods.