• Title/Summary/Keyword: design venture

Search Result 248, Processing Time 0.026 seconds

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

A Study of Effectiveness of the APP Curriculum using Smartphone Authoring Tool (스마트폰 저작도구를 이용한 APP 교육과정의 효율성 연구)

  • Chang, Young-Hyun;An, Jae-Min;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.295-298
    • /
    • 2011
  • This paper is to analyze an app curriculum using smartphone authoring solution for the education of smartphone applications with optimized effectiveness by reducing time period of development. In addition, The best goal will find the effective training methodology for developers to develop application program running on smartphones with quick and easy way. The final goal of the paper is to find the best way on how to develop business application programs using an authoring solution for smartphone application. In conclusion, this paper covers the best solution and education of an high-tech authoring solution design for the effective smartphone applications to be used by experienced developers with perfect knowledge of the field for practical on-site.

  • PDF

Designing and Embodying of Web-based SMTS for Career Education Geared to Each Student (맞춤형 진로교육을 위한 웹기반 SMTS의 설계와 구현)

  • An, Jae-Min;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.397-400
    • /
    • 2010
  • As basic data about students' career education in high school are being managed only in forms of NEIS, which is supported by Ministry of Education, Science and Technology, and the information for career education that homeroom teachers have operated by off-line system, it is hard to use them as practical decision support system for students' career education. In this study, we intend to design and embody web-based Student Management Total System by constructing DB of students' e-portfolios, school records and counselling data etc. And our ultimate goal with this system is helping teachers to carry out more effective career education geared to each individual student's talent and aptitude by integrating and sharing information about their career on the web site systematically.

  • PDF

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

Design Research of Blockchain, Machine Learning for the management of financing fund (융자성 기금관리를 위한 블록체인, 머신러닝 설계 연구)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1201-1208
    • /
    • 2019
  • The government has operated financing fund under the National Finance Act for the smooth conduct of national policy. But, It is exposed to problems such as the possibility of abuse of fund and the lack of after-loan management. In this paper, It uses fintech such as the blockchain and machine learning to solve these problems. The fund operation procedure is designed as a consortium blockchain, and it suggests the application of PBFT negotiation algorithm and the smart contract. In case of the fund management, it suggests utilizing multilayer artificial neural network model of machine learning and a module of result interpretation. The introduction of this research approach will improve the transparency and efficiency of the financing fund, ensure the credibility and also contribute to the improvement of the fund management and the establishment of the fund policy.

A Systematic Review Study on the Start-Up Sustainability Factors by Franchises Growth Cycle in Korea : Focusing on the ERIS Model

  • Kim, Insook;YANG, Jihee
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.2
    • /
    • pp.23-33
    • /
    • 2021
  • Purpose: The purpose of this study is to provide basic data such as development of sustainable support policies and performance management evaluation to support sustainable management of domestic franchises by deriving the sustainable growth cycle of domestic franchises. Research design, data, and methodology: This study is based on systematic review study. We combined search terms such as "Start-up", "Sustainability" and "Success" with four databases, RISS, KISS, e-article and DBpia and searched a total of 1,219 articles published by April 21, 2021. In the process, 35 studies were selected and analyzed after an expert review, excluding documents whose overlapping documents, gray zones (e.g., reports, conference presentations, etc.), degree papers, foreign language literature, and dependent variables were not related to the Sustainability factors. Using ERIS model, which is applied to research on the results of startup, and the franchise's growth cycle, which reflects the growth stage of franchises, we analyzed the factors behind the sustainability of franchise. Result: The results of the study are as follows. First, research on the sustainability of franchise has continued since 2009 in Korea, and has been conducted in various fields such as social welfare in addition to venture, start-up and management. Second, sustainability factors of franchise were analyzed from the ERIS performance model indicating the performance of venture, and the 68 subfactors were derived. Third, it is confirmed that there are important factors that affect the sustainable growth of franchise startups in each franchise's growth cycle. Conclusions: It is significant that through this study, we provided better understanding of the factors that sustain sustainability of franchises, policy suggestions, and presented the direction of future study. Theoretical suggestion is that the main reason for the continuous growth of franchise in each domestic franchise is based on the ERIS performance model. The practical implication is that the headquarters and Franchisor can use it to establish and evaluate performance indicators based on the business growth cycle. The results of this study are expected to be used as basic data for development and performance management evaluation of franchise start-up support policies to support the sustainable management of domestic franchises.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Consortium Blockchain and Machine Learning Design for Efficient Government fund expenditure in Untact Era (Untact 시대의 효율적인 정부자금 지출을 위한 Consortium Blockchain과 Machine Learning 설계)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.178-186
    • /
    • 2021
  • COVID-19 occurred in China in December 2019 and spread to the world. Untact culture becoming commonplace due to the spread of COVID-19, is accelerating digital transformation across society. The government is increasing government fund to overcome national crisis situations such as COVID-19. In order to efficiently execute these government funds, the government and policy financial institutions need to come up with two measures. One is to establish a transparent government fund execution process, and the other is to secure the objectivity of the review process. In this paper, to solve this problem, we designed the execution process of government funds from the government to end users with Consortium Blockchain, and designed a machine learning algorithm for internal review of policy financial institutions. The research data proposed in this paper will be helpful in setting the future government policy direction for government fund execution.