http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
길민욱,차준남,이극 한국융합보안학회 2002 융합보안 논문지 Vol.2 No.2
우회공격 기술이란 침입탐지 시스템의 취약점을 이용하여 정상적인 침입탐지를 회피하는 기술이다. 본 논문에서는 첫째, 침입탐지 시스템에 대한 우회공격 기술을 분류하고, 두 번째로 기존의 침입탐지 시스템에서 사용할 수 있는 우회공격 탐지 모델을 제시하고 마지막으로 우회공격 탐지 시스템을 설계 구현한다. IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement detection system of IDS evasion.
Track 3 컴퓨터과학 : 후반보수연산을 이용한 HCN 망 비용 개선과 알고리즘
길민욱 ( Min Wook Gill ),김정섭 ( Jeong Seop Kim ),이형옥 ( Hyeong Ok Lee ) 한국컴퓨터교육학회 2014 한국컴퓨터교육학회 학술발표대회논문집 Vol.18 No.2
클라우드 시스템이나 슈퍼컴퓨터 설계에서 효율적인 상호연결망을 선택하는 것은 중요한 문제이다. 가장 단순한 상호연결망으로는 하이퍼큐브(Hypercube)가 있다. 이를 개선한 것으로 1994년 제안된 계층 큐빅 네트워크(Hierarchical Cubic Network)가 있으며, 하이퍼큐브 대비 62.5% 작은 망 비용을 가진다. 본 연구에서는 계층 큐빅 네트워크 구조에 절반보수연산 에지를 추가한 구조를 제안하고, 라우팅 알고리즘을 개발하여 지름(diameter)을 분석하였다. 본 연구 결과로 하이퍼큐브 대비 망 비용이 75% 개선되었다.
공통평가기준 기반 정보보호제품 취약성 평가 요구사항 및 프로세스
이지연,길민욱 한국지식정보기술학회 2011 한국지식정보기술학회 논문지 Vol.6 No.2
CC(Common Criteria) requires to collect vulnerability information and vulnerability analysis by using penetration testing for evaluating IT security products. However, CC has been criticized from developers or QA managers due to its complexity of terms, abstract description of evaluation methods and non-existence of guidelines. In this paper, we propose a guideline of vulnerability assessment for developers and evaluators by analyzing and summarizing of its requirements and processes defined in CC. To do this, we classify the evaluation process of AVA assurance family into 4 parts and describe each evaluation working systematically unit under every steps.
장성만,길민욱,이극,Jang Sung-Man,Kil Min-Wook,Lee Geuk 한국디지털콘텐츠학회 2002 한국디지털콘텐츠학회논문지 Vol.3 No.2
It is necessary to change internet protect from version 4 (IPv4) to version 6 (IPv6). A converter from IPv4 to IPv6 is working in a laboratory not in practice. In this paper, we review internet protocol versions (IPv6) and design IPv4 to IPv6 converter. The IPv4 to IPv6 converter also has security prediction capability so as to deal with security problem when IPv4 packet is converted to IPv6 packet.
김봉한,이봉근,길민욱 한국지식정보기술학회 2010 한국지식정보기술학회 논문지 Vol.5 No.3
In this paper, possible security vulnerabilities analysis in network system environments are studied by analyzing previous hacking incidents. The paper suggests a method to identify problems with the files tampered by security attacks as well as to analyze the related log files and processes. In addition, tools used in attacks are analyzed to find efficient ways to apply security enhancement tools, and security vulnerabilities in network protocols and their countermeasures are also examined. Possible security vulnerabilities is analyzed following a "query-and-response" approach, so that they can be easily applicable to similar attacks detected in the future.
농촌지역 고등학생의 사이버 음란물 접촉 실태에 관한 연구
김은실,김봉한,길민욱 한국지식정보기술학회 2010 한국지식정보기술학회 논문지 Vol.5 No.5
In this paper, 10 December 2009 to 20 February 2010 over 1,537 high school students in rural areas the survey on the status of the cyber-pornography through contact investigation and analysis of the content on the Internet, cyber-pornography,information about the students' behavior has been studied and used. High school students in rural areas as urban high school students, are exposed to cyber-pornography, real-world analysis of the influence was considerable.