http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이성일 ( Sungil Lee ),이수철 ( Suchul Lee ),이준락 ( Jun-rak Lee ),염흥열 ( Heung-youl Youm ) 한국인터넷정보학회 2018 인터넷정보학회논문지 Vol.19 No.1
인터넷 웜, 컴퓨터 바이러스 등 네트워크에 위협적인 악성트래픽이 증가하고 있다. 특히 최근에는 지능형 지속 위협 공격 (APT: Advanced Persistent Threat), 랜섬웨어 등 수법이 점차 고도화되고 그 복잡성(Complexity)이 증대되고 있다. 지난 몇 년간 침입탐지시스템(IDS: Intrusion Detection System)은 네트워크 보안 솔루션으로서 중추적 역할을 수행해왔다. 침입탐지시스템의 효과적 활용을 위해서는 탐지규칙(Rule)을 적절히 작성하여야 한다. 탐지규칙은 탐지하고자 하는 악성트래픽의 핵심 시그니처를 포함하며, 시그니처를 포함한 악성트래픽이 침입탐지시스템을 통과할 경우 해당 악성트래픽을 탐지하도록 한다. 그러나 악성트래픽의 핵심 시그니처를 찾는 일은 쉽지 않다. 먼저 악성트래픽에 대한 분석이 선행되어야 하며, 분석결과를 바탕으로 해당 악성트래픽에서만 발견되는 비트패턴을 시그니처로 사용해야 한다. 만약 정상 트래픽에서 흔히 발견되는 비트패턴을 시그니처로 사용하면 수많은 오탐(誤探)을 발생시키게 될 것이다. 본고에서는 네트워크 트래픽을 분석하여 핵심 시그니처를 추출하는 기법을 제안한다. 제안 기법은 LDA(Latent Dirichlet Allocation) 알고리즘을 활용하여, 어떠한 네트워크 트래픽에 포함된 시그니처가 해당 트래픽을 얼마나 대표하는지를 정량화한다. 대표성이 높은 시그니처는 해당 네트워크 트래픽을 탐지할 수 있는 침입탐지시스템의 탐지규칙으로 활용될 수 있다. Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.
데스크탑 규모의 간결한 롤투롤 나노임프린팅 기반 나노패턴 연속가공 시스템 개발
이정수(Jeongsoo Lee),이지훈(Jihun Lee),남승범(Seungbum Nam),조성일(Sungil Cho),조용수(Yongsu Jo),고민석(Minseok Go),이승조(Seungjo Lee),오동교(Dong Kyo Oh),김정대(Jeong Dae Kim),이재혁(Jae Hyuk Lee),옥종걸(Jong G. Ok) 한국기계가공학회 2017 한국기계가공학회지 Vol.16 No.1
We have developed a compact desktop-sized nanopatterning system driven by the Roll-to-Roll (R2R) nanoimprinting (NIL) principle. The system realizes the continuous and high-speed stamping of various nanoscale patterns on a large-area flexible substrate without resorting to ponderous and complicated instruments. We first lay out the process principle based on continuous NIL on a UV-curable resin layer using a flexible nanopatterned mold. We then create conceptual and specific designs for the system by focusing on two key processes, imprinting and UV curing, which are performed in a continuous R2R fashion. We build a system with essential components and optimized modules for imprinting, UV curing, and R2R conveying to enable simple but effective nanopatterning within the desktop volume. Finally, we demonstrate several nanopatterning results such as nanolines and nanodots, which are obtained by operating the built desktop R2R NIL system on transparent and flexible substrates. Our system may be further utilized in the scalable fabrication of diverse flexible nanopatterns for many functional applications in optics, photonics, sensors, and energy harvesters.
Piosk : A Practical Kiosk To Prevent Information Leakage
Lee, Suchul,Lee, Sungil,Oh, Hayoung,Han, Seokmin The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.2
One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.
Teaching L2 Vocabulary Knowledge
( Sungil Lee ) 한국중등영어교육학회 2010 중등영어교육 Vol.3 No.2
L2 learners of English need to learn a large amount of vocabulary to read authentic texts and to communicate in the target language. Schmitt (2008) suggests that L2 learners are required to know 2000-3000 word families to understand spoken English, and 6000-7000 word families to cover 98%of texts. Because of the limited time for which L2 learners are exposed to the target language, to gain the enough amount of vocabulary is not a piece of cake. Along with broadening vocabulary size, L2 learners are required to deepen their vocabulary knowledge. Vocabulary knowledge includes the different aspects of word knowledge such as grammatical features, word associations, register constraints, syntactic features, and so on. In this regard, how effectively should vocabulary be taught and tested has been the center of the research of vocabulary acquisition. In the present paper, several issues in learning L2 vocabulary knowledge and pedagogy are mentioned.
Hybrid Cluster Mesh organization scheme for Energy Efficient Wireless Sensor Networks
SungIl Lee,JaeSung Lim,SungHyun Yang,Yoon Myung Hyun 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
Wireless Sensor Networks(WSNs) have become a main technology for ubiquitous computing environments. In WSNs, battery recharge or replacement is impossible because sensors are left unattended after deployment. Therefore, WSNs need a networking protocol scheme to increase the life time of sensor nodes. In this paper, we propose a Hybrid Cluster Mesh(HCM) scheme which recognizes the density of neighbor nodes and each node decides its topology itself.
Kim, Sungil,Eom, Yong-Sung,Lee, Chul-Wook,Baek, Yongsoon,Moon, Jong-Tae,Kang, Kwang-Yong,Lee, Hai-Young IEEE 2009 Journal of Lightwave Technology Vol.27 No.6
<P> 1.25 Gb/s optoelectronic full-triplex transceiver module with planar-lightwave-circuits was designed and fabricated for the fiber-to-the-home services according to G/E-PONs standards. A low electrical crosstalk of the critical characteristics for the reliable operation of the 1.25 Gb/s full-triplex transceiver module is intensively investigated because the electrical crosstalk on a resistive silicon substrate is more serious than that on a dielectric substrate. It is observed that the performances of the transmitter and receiver satisfy the transmitter and receiver specifications defined in the standards. From this proposed module layout, a design convenience as well as a great reduction of the silicon substrate size by about 50 % was completely achieved. Consequently, the 1.25 Gb/s full-triplex transceiver module was fabricated with electrical and mechanical packaging technologies such of a low crosstalk design and a passive alignment method. </P>
토지이용-교통 통합모델의 수도권 적용을 위한 모델 적합성 연구
이승일(Lee, Sungil),이창효(Yi, Changhyo) 대한국토·도시계획학회 2015 國土計劃 Vol.50 No.3
In this research the integration of DELTA and Omnitrans as a land use-transport model, which has wide experience in application for many cities, was selected to apply for the Seoul Metropolitan Area (SMA). Before applying it for simulating sustainable urban policies, the parameters of the location sub-model of DELTA were calibrated using a logit model to assume the parameters of the function of change in utility of location. The independent variables of the model were selected in consideration of Korean housing market: accessibility, cost of location, floorspace per household, and moving distance (whether or not less than 10 km). The results of the model estimation represented that all of the variable are significant and the parameters have high explanatory power. In oder to confirm the reliability of the results, the parameters of SMA model were compared with those of Leicester and Leicestershire Integrated Transport Model (LLITM). While the variable of accessibility affects stronger in the case of SMA model, that of cost of location does reversed. The comparison results acceptably indicate that the City of Seoul has a stronger centrality than Leicester City.