http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
김인환,김덕윤,조성국,전병국,Kim, Inhwan,Kim, Dukyun,Cho, Sungkuk,Jeon, Byungkook 한국인터넷방송통신학회 2021 한국인터넷방송통신학회 논문지 Vol.21 No.3
대부분 해킹 과정에서 공격자는 자신의 원점 IP(Internet Protocol) 노출을 방지하고자 다양한 우회접속 방법을 이용한다. 따라서 방어자 입장에서 공격자의 원점 IP를 식별하는 것은 공격자를 인식하는데 있어 중요한 이슈이다. 공격자가 프록시(proxy)를 이용할 경우에는 웹 브라우저가 아닌 다른 응용프로그램을 통해서 원점 IP 확인이 가능하다. 그러나 이러한 방법은 VPN(Virtual Private Network)을 이용할 경우에는 아무런 효과가 없다. VPN은 모든 애플리케이션에 영향을 미치기 때문이다. 학술적으로는 네트워크 장비를 이용하여 IP를 역추적하는 다양한 방법이 연구되고 있으나 표준화, 개인정보보호 등의 문제로 인해 실현되기에는 아직 요원한 상태이다. 이러한 한계를 극복하기 위해 본 논문에서는 VPN을 사용하는 접속자의 네트워크 라우팅 테이블 정보를 이용하여 원점 IP를 탐지하는 실제적인 방법을 제안한다. 이 방법은 접속자의 네트워크 사용에는 영향을 미치지 않으며 개인정보 또한 수집하지 않는다. 더구나 다양한 VPN 툴을 사용하여 실제 인터넷에서 제안된 방법을 구현하고 검증하였다. In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.
디지털아카이브 전시장 관람객의 감정반응요인이 몰입과 만족을 통해 전시성과에 미치는 영향
김인환,황찬규,황인진,홍순근,Kim, Inhwan,Hwang, Changyu,Hwang, Injin,Hong, Soongeun 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.3
Recently, the exhibition industry based on digital archive has been rapidly growing and the industry sees an innovative change with diverse digital archive exhibition venues emerging. Enabling visitors to enjoy new and varied exhibition provides a turning point to the exhibition environment. In today's world where IT (Information Technology) leads social changes, new framework and contents are required to establish digital culture that connects traditional culture with advanced information telecommunications. The objective of this study is to identify factors that influence the audience in a digital archive exhibition venue and to analyze impacts of these factors on exhibition success based on immersion and satisfaction. The study presents a research model that applies significant variables of emotional response theory in which fundamental psychological desire of humans is emphasized. To empirically verify the research model, the author conducted a survey for students of S university in Seoul and for ordinary people who have been to digital archive exhibition venues.
김인환,류호찬,조경민,전병국,Kim, Inhwan,Ryu, Hochan,Jo, Kyeongmin,Jeon, Byungkook 한국인터넷방송통신학회 2021 한국인터넷방송통신학회 논문지 Vol.21 No.4
In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment. 대부분의 해킹 과정에서는 장기간에 걸쳐 내부에 침입하고 목적 달성을 위해 우회접속을 이용한 외부와 통신을 시도한다. 고도화되고 지능화된 사이버 위협에 대응하는 연구는 주로 시그니처 기반의 탐지 및 차단 방법으로 진행되었으나, 최근에는 위협 헌팅 방법으로 확장되었다. 조직적인 해킹그룹의 공격은 장기간에 걸쳐 지능형 지속 공격이면서, 우회 원격 공격이 대부분을 차지한다. 그러나 지능화된 인지 기술을 활용한 침입 탐지 시스템에서도 기존의 침입 형태에만 탐지성능을 발휘할 뿐이다. 따라서, 표적형 우회 원격 공격에 대한 대응은 기존의 탐지 방법과 위협 헌팅 방법으로도 여전히 한계점이 있다. 본 논문에서는 이러한 한계점을 극복하기 위해 조직적인 해킹그룹의 표적형 우회 원격 공격 위협을 탐지할 수 있는 모델을 제안한다. 이 모델은 우회 원격 접속자의 원점 IP 확인 방법을 적용한 위협 헌팅 절차를 설계하였고, 실제 국방 정보체계 환경에서 제안한 방법을 구현하여 유효성을 검증하였다.
김인환(Kim, Inhwan) 담화·인지언어학회 2021 담화와 인지 Vol.28 No.4
This paper explains the cause of the Korean eyse subject, which is construed as an actor, not a location. The marker eyse is an adverbial particle. However, the nominals that it encompasses show the same function as the subject in specific situations. This is also confirmed through a subjecthood test. This paper suggests three causes for this phenomenon as follows. First, eyse subject construction is based on the meaning of eyse. The marker eyse has various meanings. Among them, the meaning indicating the position of the actor is related to eyse subject construction. In eyse subject construction, the marker eyse maintains its original meaning. Second, the eyse subject is possible if the place and the actor are in a reference point relationship. This occurs when the two elements are always related to the place as a reference point and the actor as a goal. Third, the actor must be in an unspecified situation. Since the actor is unspecified, cognitively remarkable places replace the actor. In other words, the reference point relationship is realized as a metanomy. This process can be confirmed in a symbolic structure. When all three of these are satisfied, the eyse nominal is construed as the subject.
초임계유체를 이용한 재구성지질(Structured lipid) 정제
김인환(InHwan Kim) 고려대학교 보건과학연구소 2005 보건과학논집 Vol.31 No.2
Supercritical fluid system was applied to purify structured lipid from reaction mixture obtained from lipase-catalyzed acidolysis. The structured lipid was synthesized by acidolysis of olive oil and caprylic acid using Lipozyme RM IM from Rhizomucor miehei as a biocatalyst. Originally oleic acid was the predominant fatty acid on olive oil, composing over 80%. After acidolysis reaction, however, caprylic acid as well as oleic acid became the major fatty acids in structured lipid. After 24 h incubation, 21.0% of caprylic acid was incorporated into olive oil by Lipozyme IM. In order to remove free fatty acid from reaction mixture, supercritical carbon dioxide was used. Extraction process by supercritical carbon dioxide was carried out in the pressure range of 2000 to 3500 psi at 60 ℃. Finally, 2000 psi was an optimum pressure to purify structured lipid.
SPR 격자점 재구성을 통한 시간 진행 문제의 수렴 가속화
김인환(Inhwan Kim),이도형(Dohyung Lee) 대한기계학회 2005 대한기계학회 춘추학술대회 Vol.2005 No.11
Sparse Point Representation based on interpolation wavelet is implemented for the purpose of convergence acceleration of time-marching numerical scheme. In solving non-linear Burgers Equation, SPR reconstruct the grid points at each time step. This grid re-adaptation through SPR allows huge reduction of computation time without losing accuracy. It is thus believed that the application of the SPR to Navier-Stokes flow solver may enjoy considerable improvement of computational time and memory efficiency.