• Title/Summary/Keyword: threat classification

Search Result 98, Processing Time 0.022 seconds

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

Effects of Constitutional Food on Nurse's NK Cell Activity and Stress Reduction (체질푸드가 간호사의 스트레스 감소와 NK세포 활성도에 미치는 영향)

  • Park, Sun-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.500-509
    • /
    • 2019
  • The study looked at the effect of body food on stress reduction and NK cell activity in improving natural healing for nurses, and examined whether it is effective in preventing and curing human health. The study was conducted for 30 days on 22 nurses who currently worked for more than a year at a general hospital in Gyeonggi Province. Stress measurements were conducted through pulse wave measuring instrument, and blood tests were conducted on the activity of NK cells. Treatment of collected data was performed by Paired t-testing through the Stat program SPSS 21 and providing body food suitable for the physical quality of participants after the classification of the body based on the internal diameter of the emperor and scholarship. Studies have shown that the effect on reducing the stress of body food has significant positive effects and that body food is effective for the activity of NK cells. This study has the following significance: First, the main health threat factor for modern people is the increased resistance of natural healing through body food to stress, which has the potential to prevent disease. Second, immunodeficiency in disease prevention and treatment is very important, which can increase the natural healing power of the human body by increasing the activity of NK cells through body food.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on Deep Learning based Aerial Vehicle Classification for Armament Selection (무장 선택을 위한 딥러닝 기반의 비행체 식별 기법 연구)

  • Eunyoung, Cha;Jeongchang, Kim
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.936-939
    • /
    • 2022
  • As air combat system technologies developed in recent years, the development of air defense systems is required. In the operating concept of the anti-aircraft defense system, selecting an appropriate armament for the target is one of the system's capabilities in efficiently responding to threats using limited anti-aircraft power. Much of the flying threat identification relies on the operator's visual identification. However, there are many limitations in visually discriminating a flying object maneuvering high speed from a distance. In addition, as the demand for unmanned and intelligent weapon systems on the modern battlefield increases, it is essential to develop a technology that automatically identifies and classifies the aircraft instead of the operator's visual identification. Although some examples of weapon system identification with deep learning-based models by collecting video data for tanks and warships have been presented, aerial vehicle identification is still lacking. Therefore, in this paper, we present a model for classifying fighters, helicopters, and drones using a convolutional neural network model and analyze the performance of the presented model.

A Study on Space Creation and Management Plan according to Characteristics by Type in Each Small-Scale Biotope in Seoul - Base on the Amphibian Habitats - (서울시 소규모 생물서식공간 유형별 특성에 따른 조성 및 관리방안 연구 - 양서류 서식지를 중심으로 -)

  • Park, Ha-Ju;Han, Bong-Ho;Kim, Jong-Yup
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.52 no.2
    • /
    • pp.110-126
    • /
    • 2024
  • This study conducted a classification of small-scale biological habitats created in Seoul to analyze and synthesize location characteristics, habitat structure, biological habitat functions, and threat factors of representative sites, as well as derive creation and management problems according to the ecological characteristics. The aim was to suggest improvement measures and management items. Data collected through a field survey was used to categorize 39 locations, and 8 representative sites were selected by dividing them into location, water system, and size as classification criteria for typification. Due to the characteristics of each type, the site was created in an area where amphibian movement was disadvantageous due to low or disconnected connectivity with the hinterland forest, and the water supply was unstable in securing a constant flow and maintaining a constant water depth. The habitat structure has a small area, an artificial habitat structure that is unfavorable for amphibians, having the possibility of sediment inflow, and damage to the revetment area. The biological habitat function is a lack of wetland plants and the distribution of naturalized grasses, and threats include the establishment of hiking trails and decks in the surrounding area. Artificial disturbances occur adjacent to facilities. When creating habitats according to the characteristics of each type, it was necessary to review the possibility of an artificial water supply and introduce a water system with a continuous flow in order to connect the hinterland forest for amphibian movement and locate it in a place where water supply is possible. The habitat structure should be as large as possible, or several small-scale habitats should be connected to create a natural waterfront structure. In addition, additional wetland plants should be introduced to provide shelter for amphibians, and facilities such as walking paths should be installed in areas other than migration routes to prevent artificial disturbances. After construction, the management plan is to maintain various water depths for amphibians to inhabit and spawn, stabilize slopes due to sediment inflow, repair damage to revetments, and remove organic matter deposits to secure natural grasses and open water. Artificial management should be minimized. This study proposed improvement measures to improve the function of biological habitats through the analysis of problems with previously applied techniques, and based on this, in the future, small-scale biological habitat spaces suitable for the urban environment can be created for local governments that want to create small-scale biological habitat spaces, including Seoul City. It is significant in that it can provide management plans.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Study on Seismic Liquefaction Risk Map of Electric Power Utility Tunnel in South-East Korea (국내 동남권 지역의 전력구 지반에 대한 지진시 액상화 위험도 작성 연구)

  • Choi, Jae-soon;Park, Inn-Joon;Hwang, Kyengmin;Jang, Jungbum
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.10
    • /
    • pp.13-19
    • /
    • 2018
  • Following the 2016 Gyeongju earthquake, the Pohang Earthquake occurred in 2017, and the south-east region in Korea is under the threat of an earthquake. Especially, in the Pohang Earthquake, the liquefaction phenomenon occurred in the sedimentation area of the coast, and preparation of countermeasures is very important. The soil liquefaction can affect the underground facilities directly as well as various structures on the ground. Therefore, it is necessary to identify the liquefaction risk of facilities and the structures against the possible earthquakes and to prepare countermeasures to minimize them. In this study, we investigated the seismic liquefaction risk about the electric power utility tunnels in the southeast area where the earthquake occurred in Korea recently. In the analysis of seismic liquefaction risk, the earthquake with return period 1000 years and liquefaction potential index are used. The liquefaction risk analysis was conducted in two stages. In the first stage, the liquefaction risk was analyzed by calculating the liquefaction potential index using the ground survey data of the location of electric power utility tunnels in the southeast region. At that time, the seismic amplification in soil layer was considered by soil amplification factor according to the soil classification. In the second stage, the liquefaction risk analysis based on the site response analyses inputted 3 earthquake records were performed for the locations determined to be dangerous from the first step analysis, and the final liquefaction potential index was recalculated. In the analysis, the site investigation data were used from the National Geotechnical Information DB Center. Finally, it can be found that the proposed two stage assessments for liquefaction risk that the macro assessment of liquefaction risk for the underground facilities including the electric power utility tunnel in Korea is carried out at the first stage, and the second risk assessment is performed again with site response analysis for the dangerous regions of the first stage assessment is reasonable and effective.

A Study of the Application of 'Digital Heritage ODA' - Focusing on the Myanmar cultural heritage management system - (디지털 문화유산 ODA 적용에 관한 시론적 연구 -미얀마 문화유산 관리시스템을 중심으로-)

  • Jeong, Seongmi
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.198-215
    • /
    • 2020
  • Official development assistance refers to assistance provided by governments and other public institutions in donor countries, aimed at promoting economic development and social welfare in developing countries. The purpose of this research is to examine the construction process of the "Myanmar Cultural Heritage Management System" that is underway as part of the ODA project to strengthen cultural and artistic capabilities and analyze the achievements and challenges of the Digital Cultural Heritage ODA. The digital cultural heritage management system is intended to achieve the permanent preservation and sustainable utilization of tangible and intangible cultural heritage materials. Cultural heritage can be stored in digital archives, newly approached using computer analysis technology, and information can be used in multiple dimensions. First, the Digital Cultural Heritage ODA was able to permanently preserve cultural heritage content that urgently needed digitalization by overcoming and documenting the "risk" associated with cultural heritage under threat of being extinguished, damaged, degraded, or distorted in Myanmar. Second, information on Myanmar's cultural heritage can be systematically managed and used in many ways through linkages between materials. Third, cultural maps can be implemented that are based on accurate geographical location information as to where cultural heritage is located or inherited. Various items of cultural heritage were collectively and intensively visualized to maximize utility and convenience for academic, policy, and practical purposes. Fourth, we were able to overcome the one-sided limitations of cultural ODA in relations between donor and recipient countries. Fifth, the capacity building program run by officials in charge of the beneficiary country, which could be the most important form of sustainable development in the cultural ODA, was operated together. Sixth, there is an implication that it is an ODA that can be relatively smooth and non-face-to-face in nature, without requiring the movement of manpower between countries during the current global pandemic. However, the following tasks remain to be solved through active discussion and deliberation in the future. First, the content of the data uploaded to the system should be verified. Second, to preserve digital cultural heritage, it must be protected from various threats. For example, it is necessary to train local experts to prepare for errors caused by computer viruses, stored data, or operating systems. Third, due to the nature of the rapidly changing environment of computer technology, measures should also be discussed to address the problems that tend to follow when new versions and programs are developed after the end of the ODA project, or when developers have not continued to manage their programs. Fourth, since the classification system criteria and decisions regarding whether the data will be disclosed or not are set according to Myanmar's political judgment, it is necessary to let the beneficiary country understand the ultimate purpose of the cultural ODA project.