http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
북한 사이버 공격그룹 해킹사례 분석을 통한 BGP Archive Data 기반 사이버 정보감시정찰(Cyber ISR) 시각화 방안 연구
윤재필,신동규 국방보안연구소 2021 국방과 보안 Vol.3 No.2
With the worldwide epidemic of COVID-19, related threats persist in cyberspace as well. The North Korean cyber-attack group is attempting a spear-phishing APT attack that exploits social issues including COVID-19. In January 2021, a hacking attack, presumed to be Kimsuky, a North Korean cyber- attack group, occurred intending to steal research data related to COVID-19. In this paper, we estimated the origin of the attack by analyzing hacking cases through cyber intelligence-based profiling techniques and correlation analysis using BGP archive data. Through this, we propose an implementation of the cyber intelligence surveillance and reconnaissance (Cyber ISR) visualization method based on BGP archive data. In the future, in connection with research on the cyber command and control system, a study on the cyber battlefield area, cyber ISR, and a traceback visualization model for the origin of the attack will be conducted.
약한 층리면이 발달된 셰일층의 방향성 시추공의 안정성 분석
윤재필,김현태,박희원 한국자원공학회 2013 한국자원공학회지 Vol.50 No.3
본 연구에서는 약한 층리면이 발달된 셰일층에서 방향성 시추시 발생할 수 있는 안정성 문제를 분석하였다. 분석을 위해 대체로 지질학적 특성과 암석역학적 자료가 잘 알려진 캐나다 북동 브리티시 콜롬비아 지역의 셰일층을 선택하였다. 연구 결과 약한 층리면이 발달되어 있는 셰일층의 경우에는 붕괴 시 비대칭적 붕괴가 일어나는 것을 알 수 있었다. 또한, 약한 층리면이 발달한 경우에는 시추공이 층리면에 대해 수직에 가까울수록 더욱 안정적인 것을 알 수 있었다. 이러한 경우 최적의 방향성 시추궤도의 선정은 시추이수의 비중을 높이지 않고서도 안정적 시추를 가능케 함을 알 수 있었다. 이 연구 방법 및 결과는 향후 지질학적으로 이 연구지역과 유사한 퇴적특성을 지닌 셰일층에서의 방향성 시추 안정성 평가에 활용할 수 있을 것이다. In this paper, directional wellbore stability analysis is carried out for the shales in which weak bedding planes are developed. Shale layers in Northeastern British Columbia area has been selected for the wellbore stability analysis due to well-known geological and geomechanical properties. In the case of shale layer with weak bedding planes, it was found that breakouts around the wellbore developed asymmetrically. It was also found that wellbore is more stable with the trajectory almost perpendicular to the weak bedding planes. In this case, less mud weight can be applied to achieve more stable directional wellbore with this trajectory. It is expected that the methodologies and results in this paper can be beneficial to wellbore stability analyses for shale layers with similar geological and geomechanical setting to this research area.
우연히 발견된 무증상성 기종성 방광염 국내 증례 종합 고찰
윤재필 ( Yun Jae Pil ),서장원 ( Seo Jang Won ),김상현 ( Kim Sang Hyeon ),박수길 ( Park Su Gil ) 대한신장학회 2004 Kidney Research and Clinical Practice Vol.23 No.1
Emphysematous cystitis is a rare disease that is associated with diabetes mellitus, neurogenic bladder, chronic genitourinary infection, and malignancy. Fever, chill, abdominal pain, and urinary difficulties were the most frequent presenting symptoms associated with emphysematous cystitis. We report a case of incidentally detected asymptomatic emphysematous cystitis in a 67 years old female patient with diabetic nephropathy. We review characteristic features of all 19 cases that has been reported in korean medical journals till now. Risk factors for this condition appear to be female sex, old age, and diabetes mellitus. (Korean J Nephrol 2004;23(1):174-179)
사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구
김국진,윤재필,윤석준,강지원,김경신,신동규,Kim, Kook-jin,Youn, Jae-pil,Yoon, Suk-joon,Kang, Ji-won,Kim, Kyung-shin,Shin, Dong-kyoo 한국인터넷정보학회 2022 인터넷정보학회논문지 Vol.23 No.5
Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.
균열저류층에서 이수손실방지를 위한 시추기술 및 현장사례 연구
김현태,홍시찬,윤재필,박용찬,Kim, Hyun Tae,Hong, Si Chan,Yoon, Jae Pil,Park, Yong Chan 대한자원환경지질학회 2016 자원환경지질 Vol.49 No.1
전 세계적 유 가스전에서 균열저류층의 비율은 매우 높다. 따라서 경제적인 유가가 뒷받침 될 경우 균열저류층에 대한 시추기술 수요는 계속 증가될 전망이다. 이 해설논문의 목적은 균열저류층에서 이수손실을 방지하는데 적합한 시추기술 선정에 도움을 주기 위한 것이다. 이러한 목적을 달성하기 위해 균열저류층을 이수손실의 규모에 따라 부분 이수손실지층과 전체이수손실지층으로 재분류하였다. 부분이수손실지층의 시추 시에는 이수 첨가물인 이수손실방지제와 시멘트 스퀴징 방법이 유용하며, 전체이수손실지층에서는 천부의 경우 케이싱시추방법이, 심부의 경우 이수캡시추 기법이 이수손실을 방지하는데 유용한 시추방법인 것을 알 수 있었다. 이러한 결과는 이탈리아 Medusa-1과 카타르의 North field 현장사례를 통해서도 확인할 수 있었다. The ratio of fractured reservoir is very high in oil & gas fields around the world. The demand of drilling technology for fractured reservoir is expected to increase continuously if oil and gas prices are economical. The purpose of the review study is to help operator or driller in selecting of proper drilling technology for preventing a lost circulation in the fractured formation. In order to achieve this goal, fractured reservoir(formation) they are classified into partial lost circulation formation and total lost circulation formation. In case of partial lost circulation formation, the drilling problem can be solved by using LCM(lost circulation material) mud additive and squeezing cement. For shallow depth, total lost circulation formation can be drilled safely and economically with casing drilling method. Also, for deeper depth, problems of total lost circulation in formation can be solved by applying mud cap, which is one of the drilling methods. This was confirmed through field application such as Italy's Medusa-1 field and Qatar's North field.
최세호,김명수,윤재필,박무성,이성기,신동규 국방보안연구소 2022 국방과 보안 Vol.4 No.2
In order to respond to unknown cyber threats, it is defended with a multi-level deep information protection system, but cyber attacks concentrate all resources on the weakest point of the information protection system. In this situation, it is not possible to respond 100% to a cyber attack within a limited time, so when a cyber attack is recognized, it is a cyber resilience that can quickly respond to prevent the spread of damage in the system operation state and return to the state before the cyber attack as soon as possible. In this paper, we propose a procedure for optimizing cyber defense activities so that we can act according to the response and recovery phase of cyber resilience, and compare the results of a training case that have actually been put into action to verify the infringement response time for each type of cyber attack. In the future, it is expected that the response time for each cyber defense activity will be subdivided and used for cyber combat power index research.