• Title/Summary/Keyword: cyber learning system

Search Result 275, Processing Time 0.022 seconds

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.

Design of Cyber-Educational System for Self-directed Learning (자기주도형 학습을 위한 가상교육 시스템 설계)

  • 임승린
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2001
  • All of the students must trace to the predetermined course of curriculum in traditional education system. There are some absurdity that nearly the same subjects, which are different each other, are treating partially the same contents. Therefore This paper proposes the cyber-educational system which constructs curriculum divided to modular parts for efficient self-directed learning in performing internet-based remote education. The preliminary experiment for two subjects shows that the proposed system gives about 9.4% of time reduction than traditional system.

  • PDF

The Recognition of Cyber Education and Development Plan of Chungcheongnam-do Civil Servants (충청남도 정예공무원의 사이버교육 인식과 발전방안)

  • Song, Seung-hun;Kim, Eui-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2184-2190
    • /
    • 2017
  • In the age of knowledge informationization, various educational programs utilizing cyber education were introduced to schools, corporate education, military service, lifelong education facilities as well as public education and training programs. In the case of the national government officials, the education and local government officials, which are organized by cyber center in the national civil service personnel development center, are organized by 15 cities and provincial public service training institutes. In 2008, it became to be mandatory for them to receive education and training over a certain period of a year through the introduction of the regular learning system of public officials, and cyber education got active in the education and training of public officials. The purpose of this study is to suggest the development plan of cyber education based on the results of the analysis of the trainees of the civil servants of Chungcheongnam-do who participated in the cyber education in the viewpoint of the public education and training system.

Design and development of SCORM based e-Learning contents about Mathematics for the KERIS' Cyber Home Education System (KERIS의 사이버가정학습 시스템에 적합한 SCORM기반 수학과 e-Learning 컨텐츠 설계 및 개발)

  • Lee Hye-Gyung;Kim Hyang-Sook
    • Communications of Mathematical Education
    • /
    • v.20 no.3 s.27
    • /
    • pp.425-441
    • /
    • 2006
  • Entering upon 21th, the internet which bring the digital era, are changing the paradigm of education and cultivating creative and challenging person, which is the core of competitive power in knowledge-information society, is more emphasized than ever. To meet the needs of the present times, it has been concentrating its effort to improve learning-environment using e-Learning in the field of teaching. E-schoolbooks that were introduced recently by way of showing an example are representative case of this intention. Though many e-learning contents are being developed, the more speedily a society grow, the shorter the life of contents are. Moreover, the contents developed are impossible to use directly for tele-education system, so standard types adjusted for various kind of system are showing up. Among them the leading standard type is SCORM(Sharable Content Object Reference Medel) made in ADL(Advanced Distributed Learning) Corporation. The KERIS' Cyber Home Education System adopted this and is using it. So, in this study, we set the goal at designing and developing an e-learning contents and an experiment-focused mathematics that suit the KERIS' Cyber Home Education System on the basis of SCORM.

  • PDF

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Student-Centered Discrete Mathematics Class with Cyber Lab (학생중심의 대학 이산수학 강의 운영사례)

  • Lee, Sang-Gu;Lee, Jae Hwa
    • Communications of Mathematical Education
    • /
    • v.33 no.1
    • /
    • pp.1-19
    • /
    • 2019
  • This study deals with the case of student-centered discrete mathematics class with cyber lab. First, we provided lecture notes and cyber labs we developed. In particular, discrete mathematics is a course that covers the principles of algorithms. The purpose of this study is to provide students with basic mathematics, aiming to actively participate in the learning process, to improve their abilities and to reach the ultimate goal of student success with confidence. Second, based on interactions, students were able to prepare for the lectures, review, question, answer, and discussion through an usual learning management system of the school. Third, all the students generated materials through one semester, which were reported, submitted, presented and evaluated. It was possible to improve the learning effectiveness through the discussions and implementation of using some easy open source programming language and codes. Our discrete math laboratory could be practiced without any special knowledge of coding. These lecture models allow students to develop critical thinking skills while describing and presenting their learning and problem-solving processes. We share our experience and our materials including lecture note and cyber lab as well as a possible model of student-centered mathematics class that does not give too much of work load for instructors. This study shares a model that demonstrates that any professor will be able to have an individualized, customized, and creative discrete education without spending much of extra time and assistant, unlike previous research.

A Study on The Adaptive Navigation Support Technology for Individualized Cyber Learning System (사이버 교육 시스템에서의 개별학습을 위한 적응적 탐색 지원 기법 연구)

  • Park, Jongsun;Kim, Kiseok
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.85-98
    • /
    • 2002
  • In this study, We are developed learner traits analysis and profile management software modules to develop learnable courseware fits to learner's individual traits in cyber learning system. We specified learner's personal information, performance information, preference information and portfolio information as learner's traits variables in this study, these four types of information are managed in learner profile management DB based on elaborate analysis to learner's traits. And we consists of curriculum sequencing module using high and low level sequencing technology, these are used in organizing learning contents sequencing with learning topic and specific learning task. The advice algorithm module developed based on adaptive navigational support and rule based technology. This Result of Research are able to be used for develop learnable courseware fits to learner's individual traits in cyber learning systems.

  • PDF

Implementation of Secured Smart-Learning System using Encryption Function (암호기능을 이용한 안전한 스마트-러닝 시스템 구현)

  • Yang, J.S.;Hong, Y.S.;Yoon, E.J.;Choi, Y.J.;Chun, S.K.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.195-201
    • /
    • 2013
  • The government has invested much budget for 5years to do the Smart-education and operate digital textbook services since 2011. The private enterprises also decided to focus on constructing Smart learning system by investing much budget. If these systems are constructed nationwide and therefore can access to cyber university by using smart devices, we can reduce the information gap and study online lectures to get a grade whenever, whoever and wherever we want to. However, these convenient systems can cause serious problems like falsifying grades by hacking if security systems are weak. In this paper, we formulated cyber university which is secured in terms of security. For this, we simulated the smart-learning system which strengthened the security, considering code algorithm and encryption technique.

Production Equipment Monitoring System Based on Cloud Computing for Machine Manufacturing Tools

  • Kim, Sungun;Yu, Heung-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.197-205
    • /
    • 2022
  • The Cyber Physical System(CPS) is an important concept in achieving SMSs(Smart Manufacturing Systems). Generally, CPS consists of physical and virtual elements. The former involves manufacturing devices in the field space, whereas the latter includes the technologies such as network, data collection and analysis, security, and monitoring and control technologies in the cyber space. Currently, all these elements are being integrated for achieving SMSs in which we can control and analyze various kinds of producing and diagnostic issues in the cyber space without the need for human intervention. In this study, we focus on implementing a production equipment monitoring system related to building a SMS. First, we describe the development of a fog-based gateway system that links physical manufacturing devices with virtual elements. This system also interacts with the cloud server in a multimedia network environment. Second, we explain the proposed network infrastructure to implement a monitoring system operating on a cloud server. Then, we discuss our monitoring applications, and explain the experience of how to apply the ML(Machine Learning) method for predictive diagnostics.