RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Ntoe on Bayes Risks of Estimators

        이세열 제주대학교 1984 논문집 Vol.17 No.-

        The Bayes estimation theory is based on the prior space, the sample space, the loss function and the posterior distribution, etc. In this paper we observe some loss functions which are concerned with mean, median and mode of the posterior distribution of the parameter, and we derive, using the predictive distribution and the posterior distribution, the retation of Bayes risks.

      • KCI등재

        서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구

        이세열,김용수,심귀보,Lee, Se-Yul,Kim, Yong-Soo,Sim, Kwee-Bo 한국지능시스템학회 2003 한국지능시스템학회논문지 Vol.12 No.2

        서비스 거부 공격은 침입을 위한 침입시도 형태로 나타나며 대표적인 공격으로 Syn Flooding 공격이 있다. Syn Flooding 공격은 신뢰성 및 연결 지향적 전송서비스인 TCP의 종단간에 3-way handshake의 취약점을 이용한 공격이다. 본 논문에서는 네트워크 기반의 지능적 침입 방지 모델을 제안한다. 제안하는 모델은 Syn Flooding 공격을 탐지하기 위하여 패킷 정보를 수집하고 분석한다. 이 모델은 퍼지인식도(Fuzzy Cognitive Maps)를 적용한 결정모듈의 분석 결과를 활용하여 서비스 거부 공격의 위험도를 측정하고 공격에 대응하도록 대응모듈을 학습시킨다. 제안하는 모델은 Syn Flooding 공격의 위험을 격감 또는 방지하는 네트워크 기반의 지능적 침입 방지 모델이다. A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.

      • KCI등재

        서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구

        이세열,김용수,심귀보 한국지능시스템학회 2003 한국지능시스템학회논문지 Vol.11 No.3

        A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability. This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack. 서비스 거부 공격은 침입을 위한 침입시도 형태로 나타나며 대표적인 공격으로 Syn Flooding 공격이 있다. Syn Flooding 공격은 신뢰성 및 연결 지향적 전송서비스인 TCP의 종단간에 3-way handshake의 취약점을 이용한 공격이다. 본 논문에서는 네트워크 기반의 지능적 침입 방지 모델을 제안한다. 제안하는 모델은 Syn Flooding 공격을 탐지하기 위하여 패킷 정보를 수집하고 분석한다. 이 모델은 퍼지인식도(Fuzzy Cognitive Maps)를 적용한 결정모듈의 분석 결과를 활용하여 서비스 거부 공격의 위험도를 측정하고 공격에 대응하도록 대응모듈을 학습시킨다. 제안하는 모델은 Syn Flooding 공격의 위험을 격감 또는 방지하는 네트워크 기반의 지능적 침입 방지 모델이다.

      • KCI등재

        자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델

        이세열,Lee, Seyul 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.3

        Nowadays, networked computer systems play an increasingly important role in our society and its economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is the reason computer security has become an essential concern for network administrators. Recently, a number of Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of intrusion. Therefore, probe detection has become a major security protection technology to detection potential attacks. Probe detection needs to take into account a variety of factors ant the relationship between the various factors to reduce false negative & positive error. It is necessary to develop new technology of probe detection that can find new pattern of probe. In this paper, we propose an hybrid probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) in dynamic environment such as Cloud and IoT. Also, in order to verify the proposed method, experiments about measuring detection rate in dynamic environments and possibility of countermeasure against intrusion were performed. From experimental results, decrease of false detection and the possibilities of countermeasures against intrusions were confirmed.

      • 복강 내 화학요법에 이용된 활성화 탄소 육아종에 의한 F-18 FDG PET/CT의 위양성 소견: 증례

        이세열,김찬영,양두현,Lee, Se-Youl,Kim, Chan-Young,Yang, Doo-Hyun 대한위암학회 2006 대한위암학회지 Vol.6 No.4

        F-18 FDG-PET/CT는 위암의 재발여부를 평가하는데 있어서 이용될 수 있으나 위양성을 일으키는 경우가 종종 보고된다. 저자들은 위암으로 위절제술과 Mitomycin C를 이용한 복강 내 화학요법 시행 후 F-18 FDG-PET/CT상 위양성의 복강 내 활성화 탄소 육아종을 경험하였다. 46세 남자환자는 수술 후 6개월째 시행한 CT상 우측 대장 뒤에서 종물이 발견되었으나 크기 변화 없다가 36개월째 크기의 증가를 보여 시행한 F-18 FDG-PET/CT상 전이 종양이 의심되었다. 진단적 개복술을 시행하여 제거한 종양은 조직학적 검사상 활성화 탄소 육아종으로 진단되었다. 이처럼 복강 내 화학요법을 시행한 환자의 F-18 FDG-PET/CT의 해석에 있어서 활성화 탄소 육아종에 의한 위양성 소견의 가능성을 염두에 두어야 할 것이다. F-18 FDG-PET/CT could be used to evaluate the surveillance of recurrent stomach cancer, but some cases reported as false-positives. The authors found an activated charcoal granuloma from intraperitoneal chemotherapy by using a curative resection and mitomycin C for stomach cancer. A mass behind the right colon that showed on CT 6 months after an operation in a 46-year-old male patient had no progression in size, but 36 months after the operation, an increase was seen on F-18 FDG-PET/CT, and a metastatic tumor was suspected. The tumor was resected by an explorative laparotomy and was diagnosed as being an activated charcoal granuloma based on the histologic finding. Based on this case, we should be reminded of the possibility of a false-positive on analysis of F-18 FDG-PET/CT caused by an activated charcoal granuloma in a patient who has intraperitoneal chemotherapy.

      • KCI등재후보

        디지털 영상에서의 자막추출을 이용한 자막 특성 분석에 관한 연구

        이세열 한국지식정보기술학회 2009 한국지식정보기술학회 논문지 Vol.4 No.2

        The purpose of this study is to analyze the composition for visual character to make the process of television programs. The study can be classified as a visual communication methods onto a target audiences. At the beginning of using visual character was communication method as an insufficiency of television programs. However, in recent years, television industry using visual character in many ways into television programs that it can be classified not only to developed the communication method as a function of effects, but also to changed substitute a variety of graphic pattern of visual character in television programs. As a matter of fact, this study have some implication in terms of using a visual character to making television program, therefore, the results show that different ways of using visual character into the diversity of television programs were discussed.

      • KCI등재

        TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델

        이세열,김용수,Lee, Se-Yul,Kim, Yong-Soo 한국지능시스템학회 2003 한국지능시스템학회논문지 Vol.14 No.7

        The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

      • KCI등재

        방향성 가중치가 적용된 모듈기반의 개선된 하이브리드 침입시도탐지모델

        이세열,안재현 한국지식정보기술학회 2014 한국지식정보기술학회 논문지 Vol.9 No.6

        The rapid advances and spread of network-based technologies have managed in increasing network related attacks and threats which result in insecurity system and possibilities of malicious intrusions. Recently, a number of Detection System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of intrusion. Therefore, probe detection has become a major security protection technology to detection potential attacks. Probe detection needs to take into account a variety of factors and the relationship between the various factors to reduce false negative & positive error. It is necessary to develop new technology of probe detection that can find new pattern of probe. In this paper, we propose an improved hybrid probe detection based on 3-step modules. 3-step modules have session pattern analysis module, oriented weight module, and fuzzy cognitive map module. For the performance evaluation, the KDD CUP99 data made by MIT was used. Most of Detection System sensors provide less than 10% rate of false positives. The experiment results show that this approach can effectively reduce false positive rate and has a high detection rate.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼