http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
교육대학원에 있어서 초등 과학교육 영역의 중요성과 그 운영방안
오진태,옥치율,한영욱,이형철,김용권,임채성 釜山敎育大學校 1994 부산교육대학 논문집 Vol.30 No.1
The future society is expected to be rapidly change in all areas, that is, the length of change time is becoming much smaller than that of generation time. It is very important to prepare the citizens who possess scientific literacy which actively cope with the rapid changes and specialization of society. The sources of rapid changes may be due to the developments in science and technology. Therefore, the importance of science education will be increasingly high. Scientific literacy should be improved basically and systematically from the early stages of formal education. Teachers who are responsible to educate children should be able to research in the areas of science education as well as science itself, and to have capacity to transmit them to the classroom. To do this, the graduate course and the science education within the system beyond the level of college education are essential parts of teacher education. In the graduate course, it is important that science itself and pedagogy of science should be balanced.
오진태,김대원,김익균,장종수,전용희,Oh, Jin-Tae,Kim, Dae-Won,Kim, Ik-Kyun,Jang, Jong-Soo,Jeon, Yong-Hee 한국정보보호학회 2009 정보보호학회논문지 Vol.19 No.4
통신망을 통하여 자동적으로 확산되는 악성 프로그램인 웜에 대응하기 위하여, 웜 관련 패킷들을 분석하여 시그니처를 생성하여 웹을 탐지하는 방법들이 많이 사용되고 있다. 그러나 이런 시그니처-기반 탐지 기법을 회피하기 위하여, 변형된 폴리모픽 형태의 공격 코드 사용이 점차 증가하고 있다. 본 논문에서는 폴리모픽 공격 코드의 복호화 루틴을 탐지하기 위한 새로운 정적 분석 방법을 제안한다. 제안된 방법은 통신망 플로에서 폴리모픽 공격 코드에 함께 포함되어 암호화된 원본 코드를 복호화하는 역할을 수행하는 코드 루틴을 탐지한다. 실험 결과를 통하여 제안된 방법이 정적 분석 방지 기법들이 사용된 폴리모팍 코드들도 탐지할 수 있는 것을 보여준다. 또한 처리 성능에서 에뮬레이션 기반 분석 방법보다 효율적인 것으로 나타났다. In order to respond against worms which are malicious programs automatically spreading across communication networks, worm detection approach by generating signatures resulting from analyzing worm-related packets is being mostly used. However, to avoid such signature-based detection techniques, usage of exploits employing mutated polymorphic types are becoming more prevalent. In this paper, we propose a novel static analysis approach for detecting the decryption routine of polymorphic exploit code, Our approach detects a code routine for performing the decryption of the encrypted original code which are contained with the polymorphic exploit code within the network flows. The experiment results show that our approach can detect polymorphic exploit codes in which the static analysis resistant techniques are used. It is also revealed that our approach is more efficient than the emulation-based approach in the processing performance.
오진태 부산교육대학교 과학교육연구소 1993 科學敎育硏究 Vol.18 No.-
A group of Protophyta occurring at times in enormous numbers in the sea are the flagellates and the diatoms. A few species are toxic and may multiply rapidly into such dense populations as to cause the deaths of fish and organisms, and then are popularly known as "red-tide", these dense populations occasionally occurring, for example, off the coast of Chinhae Bay, Masan Bay, Kosung Bay and Onsans Bay of Korean southern seashore. These "red-tide" which was caused by the population explotion of phytoplankton are the important problems of seashore culture in Korean seashore areas. These population increases in the phytoplankton tend to occur when high tempreatures(>16℃) coincide with heavy rainfall, which is thought to cause run-off of industrial pollutions and everylife waste substances into the bays from urban district heavily enriched with nitrates. Red-tides have therefore become a major issue for the seashore culture. This study has investgated the organisms and environment factors of red-tide, physico-chemical parameters and eutrophication. These must be taken as an environmental problem of water pollutions.
A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention
오진태,박동규,장종수,류재철,Oh, Jin-Tae,Park, Dong-Gue,Jang, Jong-Soo,Ryou, Jea-Cheol Korea Institute of Information Security and Crypto 2011 정보보호학회논문지 Vol.21 No.1
서버의 응용계층에 대한 DDoS 공격은 매우 적은 량의 패킷으로 효과적인 공격이 가능하며, 공격 트래픽이 정상 트래픽과 유사하여 탐지가 매우 어렵다. 하지만 HTTP 응용계층 공격 트래픽에는 사용자 의도에 의한 특성이 있음을 찾았다. 정상 사용자와 DDoS 공격자는 동일하게 TCP 계층에서 세션을 맺는다. 이후 최소 한번의 HTTP Get 요구 패킷을 발생한다. 정상적인 HTTP 요구는 서버의 응답을 기다리지만 공격자는 Get 요청 직후 세션을 종료한다. 이러한 행위는 사용자 의도에 의한 차이로 해석할 수 있다. 본 논문에서는 이러한 차이를 기반으로 응용계층 분산서비스 거부 공격 탐지 알고리즘을 제안하였다. 제안된 알고리즘은 정상 네트워크와 봇 기반 분산서비스거부 공격 툴에서 발생한 트래픽으로 실험되었으며, 거의 오탐 없이 HTTP-Get 공격을 탐지함을 보여 주였다. An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.