Search : [ author: Jiwon Yoon ] (5)

Ship Detection using CNN based on Contrast Fusion Technique in Satellite Images : Accuracy Enhancement

Sunggyun Im, Youngbae Jeon, Junghwan Hwang, Jiwon Yoon

http://doi.org/10.5626/JOK.2019.46.8.823

The satellite has various missions such as ground/marine observation, communication, broadcasting, etc. Satellite photographs provide information for the maintenance of marine security and traffic control for ship detection. Since satellite photos are taken all over the earth, the memory storage is not sufficient to hold such data with each data being of a high resolution and requiring automatic ship detection using the computer. The existing literature on ship detection employed several deep learning models. However, the problem of processing speed due to the characteristics of satellite photographs leads to the necessity of using a CNN(Convolution Neural Network) model that has a comparably high processing speed. On the contrary, it is difficult to improve the accuracy and performance mostly due to factors such as marina, lighthouses and waves. Therefore, in this paper, we propose a model that improves the accuracy and performance by combining image contrast enhancement with the existing CNN. In addition, we have employed the overlap and rotation functions to increase the amount of data required for ship classification in the learning stage and implement automation detection technology considering window sliding to reduce detection speed in real satellite photographs. Also, the identified ship data has been used as learning data to improve accuracy for the model that can be used in the real industry.

Collecting Network Field Information using Machine Learning

Kyu Seok Han, Taekyu Kim, Shinwoo Shim, Sung Goo Jun, Jiwon Yoon

http://doi.org/10.5626/JOK.2018.45.10.1096

Recently, various systems based on Internet of Things (IOT) and Information and Communications Technologies(ICT) have been developed. Today, assorted devices are connected to a network, and various operating systems according to devices having different resources and functions have appeared. With the increased need for in hacking security, researches on the vulnerability analysis of the operating system installed on each device and the actual attack technique have been carried out. Accordingly, the type and detailed version of the operating system of the device, Function (API) is emerging as important information in security. Since the control of this information gathering in the cyber warfare is the first stage of the cyber threat, many studies have been conducted on mehods for controlling the network traffic while scanning. In order to bypass this control of the network, information collectors prepare countermeasures to secretly collect port information. In this paper, we deal with a scanning method that can acquire information about opponents through network basic commands which are not important in the network control system.

Efficient Ways of Attack for Network Isolation

Kyu Seok Han, Jiwon Yoon, Taekyu Kim, Young Woo Park, Jungkyu Han

http://doi.org/10.5626/JOK.2018.45.5.489

Many devices and objects have recently been connected to the network using the Internet of Thing technology. In a local area network (LAN) network for small scale, many devices are connected and the complexity of the network topology is greatly increased. Large-scale networks of such small-scale networks are also expanding nationwide. he flow of gathering and spreading data in a concentrated or distributed manner within a large network is being made. This is useful for various industries, financial, telecommunications, military, and power generation facilities in statebased industries use the nationwide Internet network to control and maintain a stream of data that can cope with emergency situations. In a network environment that has such a circumstance, if a critical device (node) or a small range of network (LAN) that is involved in the control, data collection, storage, or data processing is isolated and isolated from the entire network. This paper discusses techniques for isolating critical LANs or Nodes in large networks.

Network Topology Discovery with Load Balancing for IoT Environment

Hyunsu Park, Jinsoo Kim, Moosung Park, Youngbae Jeon, Jiwon Yoon

http://doi.org/10.5626/JOK.2017.44.10.1071

With today"s complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor"s resource usage.

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption

Changhwan Ji, Jiwon Yoon

http://doi.org/10.5626/JOK.2017.44.6.637

Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small entropy secret key. However, application of a cipher that requires encryption padding to the HE present a bigger problem than the conventional PBE method. In this paper, we apply a typical block cipher (AES-128) and a stream cipher (A5 / 1) to verify the problem of padding through the analysis of the sentence frequency and we propose a safe operation method of the HE.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr