BRONZE
BRONZE ๋“ฑ๊ธ‰์˜ ํŒ๋งค์ž ์ž๋ฃŒ

์ธ๊ณต์งฟ’๋Šฅ ๊ธฐ๋ฒ•์„ ์ด์šฉํ•œ ๋ฌด์„ ์„ผ์„œ ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ์นจ์ž…ํƒ์่ง์‹œ์Šคํ…œ

'์ธ๊ณต์งฟ’๋Šฅ ๊ธฐ๋ฒ•์„ ์ด์šฉํ•œ ๋ฌด์„ ์„ผ์„œ ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ์นจ์ž…ํƒ์่ง์‹œ์Šคํ…œ'์˜ ์š”์•ฝ ๋ฐ ๋ฒˆ์—ญ ๊ณผ์ œ์ž„.
5 ํŽ˜์ด์งฟ’
ํ•œ์้œ์˜คํ”ผ์Šค
์ตœ์ดˆ๋“ฑ๋ก์ผ 2020.08.29 ์ตœ์ข…์ ฟ’์ž‘์ผ 2017.10
5P ๋ฏธ๋้ฉ๋ณด๊ธฐ
์ธ๊ณต์งฟ’๋Šฅ ๊ธฐ๋ฒ•์„ ์ด์šฉํ•œ ๋ฌด์„ ์„ผ์„œ ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ์นจ์ž…ํƒ์่ง์‹œ์Šคํ…œ
  • ๋ฏธ๋้ฉ๋ณด๊ธฐ

    ์†Œ๊ฐœ

    '์ธ๊ณต์งฟ’๋Šฅ ๊ธฐ๋ฒ•์„ ์ด์šฉํ•œ ๋ฌด์„ ์„ผ์„œ ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ์นจ์ž…ํƒ์่ง์‹œ์Šคํ…œ'์˜ ์š”์•ฝ ๋ฐ ๋ฒˆ์—ญ ๊ณผ์ œ์ž„.

    ๋ชฉ์ฐจ

    1. ์„œ๋ก 
    2. ์ธ๊ณต ๋ฉด์—ญ ๊ธฐ๋ฐ˜ ์‹œ์Šคํ…œ
    3. ์ธ๊ณต ์‹ ๊ฒฝ๋ง
    4. ์œ ์ „์ž ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๊ธฐ๋ฐ˜ IDS

    ๋ณธ๋ๅฉ๋‚ด์šฉ

    ๋ฌด์„ ์„ผ์„œ ๋„คํŠธ์›Œํฌ (WSN)๋Š” ๋ณธ์งˆ์ ์œผ๋กœ ๋ถ„์‚ฐ๋˜์–ด ์žˆ์œผ๋ฉฐ ์„ผ์„œ ๋…ธ๋“œ๋Š” ์ค‘์•™ ์ง‘์ค‘์‹ ๊ถŒํ•œ์—†์ด ๋…๋ฆฝ์ ์œผ๋กœ ์ž‘๋™ํ•œ๋‹ค. ๋˜ํ•œ, ์„ผ์„œ ๋…ธ๋“œ๋Š” ์ €์žฅ, ์ฒ˜๋ฆฌ ๋ฐ ํ†ต์‹  ์ธก๋ฉด์—์„œ ๋งŽ์€ ์„ค๊ณ„ ๋ฐ ๊ธฐ๋Šฅ์ƒ์˜ ์ œ์•ฝ์ด ์žˆ๋‹ค. WSN ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์€ ๋งค์šฐ ๋น ๋ฅธ ์†๋„๋กœ ์ง„ํ™” ํ•ด ์™”์œผ๋ฉฐ ์ผ์ƒ ์ƒํ™œ์˜ ๋งŽ์€ ๋ถ„์•ผ์—์„œ ์ง€์†์ ์œผ๋กœ ์„ฑ์žฅํ•˜๊ณ  ์žˆ๋‹ค [1]. WSN ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋น ๋ฅธ ์„ฑ์žฅ์€ ์œ ๋น„์ฟผํ„ฐ์Šค์™ฟ’ ์„œ๋น„์Šค ์ค‘์‹ฌ์˜ ์ปดํ“จํŒ…์„ ํ•„์š”๋กœ ํ•œ๋‹ค.WSN์˜ ๊ธ‰์†ํ•˜๊ฒŒ ์„ฑ์žฅํ•˜๋Š” ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ, ๋ถ„์‚ฐ ๋œ ํŠน์„ฑ ๋ฐ ๋””์ž์ธ ์ œํ•œ์œผ๋กœ ์ธํ•ด ๋„คํŠธ์›Œํฌ ๊ด€๋ จ ์ทจ์•ฝ์„ฑ๊ณผ ์œ„ํ˜‘์ด ์ฆ๊ฐ€ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ž ์žฌ์  ์ธ ๋ณด์•ˆ ์œ„ํ˜‘ ๋ฐ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์„ผ์„œ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ์ ์ ˆํ•œ ๋ณด์•ˆ ๋ฉ”์ปค๋‹ˆ์ฆ˜์ด ํ•„์š”ํ•˜๋‹ค [2, 3].WSN์„ ์œ„ํ•ด ์ง€๊ธˆ๊นŒ์ง€ ์„ค๊ณ„๋œ ๋Œ€๋ถ€๋ถ„์˜ ๋ณด์•ˆ ๋ฉ”์ปค๋‹ˆ์ฆ˜์€ ํŒจํ‚ท ์•”ํ˜ธํ™”๊ฐ€ ๊ฐ€๋Šฅํ•˜๊ฑฐ๋‚˜ ์•…์˜์  ์ธ ์‚ฌ์šฉ์ž์˜ ์•ก์„ธ์Šค๋ฅผ ์ œํ•œํ•˜๊ธฐ ์œ„ํ•ด ์ธ์ฆ์ด ํ•„์š”ํ•˜๋‹ค. ๋˜ํ•œ ํŠน์ • ๊ณต๊ฒฉ์„ ๋ฐฉ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์ธ์ฆ, ํ‚ค ๊ตํ™˜ ๋ฐ ๋ณด์•ˆ ๋ผ์šฐํŒ…๊ณผ ๊ฐ™์€ WSN์„ ์œ„ํ•œ ๊ธฐํƒ€ ๋ณด์•ˆ ๊ด€๋ จ ์†”๋ฃจ์…˜์ด ๋งŽ์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค.

    ์ฐธ๊ณ ์ž๋ฃŒ

    ยท D. Bri, M. Garcia, J. Lloret, and P. Dini, โ€œReal deployments of wireless sensor networks,โ€ in Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM
    ยท โ€™09), pp. 415โ€“423, Athens, Greece, June 2009.
    ยท A. Radhika, D. Kavitha, and D. Haritha, โ€œMobile agent based routing in MANETSโ€”attacks & defences,โ€ Network Protocols and Algorithms, vol. 3, no. 4, pp. 108โ€“121, 2011.
    ยท K. SahadevaiahandP. V.G.D. PrasadReddy, โ€œImpactof security attacks on a new security protocol for mobile ad hoc networks,โ€Network Protocols andAlgorithms, vol. 3, no.4,pp. 122โ€“140, 2011.
    ยท N. Alrajeh, S. Khan, andB. Shams, โ€œIntrusion detection systems in wireless sensor networks: a review,โ€ International Journal of Distributed Sensor Networks, vol. 2013, Article ID 167575, 7 pages, 2013.
    ยท M. S. Sisodia and V. Raghuwanshi, โ€œAnomaly base network intrusion detection by using random decision tree and random projection a fast network intrusion detection technique,โ€ Network Protocols and Algorithms, vol. 3, no. 4, pp. 93โ€“107, 2011.
    ยท N. A. Alrajeh, S. Khan, J. Lloret, and J. Loo, โ€œArtificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting,โ€ Ad Hoc & SensorWireless Networks, vol. 2013, pp. 1โ€“25, 2013.
    ยท T. H. Lim, Detecting anomalies in wireless sensor networks [Qualifying dissertation], Department of Computer Science, University of York, 2010.
    ยท J. Kim, P. Bentley, C. Wallenta, M. Ahmed, and S. Hailes, โ€œDanger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm,โ€ in Artificial Immune Systems, vol. 4163 of Lecture Notes in Computer Science, pp. 390โ€“403, Springer, Berlin, Germany, 2006.
    ยท C. Wallenta, J. Kim, P. J. Bentley, and S. Hailes, โ€œDetecting interest cache poisoning in sensor networks using an artificial immune algorithm,โ€ Applied Intelligence, vol. 32, no. 1, pp. 1โ€“26, 2010.
    ยท M. R. Ahmadi, โ€œAn intrusion prediction technique based on co-evolutionary im-mune system for network security (CoCo-IDP),โ€ International Journal ofNetwork Security, vol. 9, no. 3, pp.290โ€“300, 2009.
  • ์ž๋ฃŒํ›„๊ธฐ

      Ai ๋ฆฌ๋ทฐ
      ์งฟ’์‹ํŒ๋งค์ž๊ฐ€ ๋“ฑ๋กํ•œ ์ž๋ฃŒ๋Š” ๊ณผ์ œ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์œ ์šฉํ•œ ๋‚ด์šฉ์ด ๋งŽ์•„, ํฐ ๋„์›€์ด ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์•ž์œผ๋กœ๋„ ๋งŽ์€ ๋„์›€์„ ๋ฐ›์„ ์ˆ˜ ์žˆ๊ธฐ๋ฅผ ๊ธฐ๋Œ€ํ•ฉ๋‹ˆ๋‹ค!
    • ์ž์ฃผ๋ฌป๋Š”์งˆ๋ๅฉ์˜ ๋‹ต๋ณ€์„ ํ™•์ธํ•ด ์ฃผ์„ธ์š”

      ํ•ดํ”ผ์บ ํผ์Šค FAQ ๋”๋ต–๊ธฐ

      ๊ผญ ์•Œ์•„์ฃผ์„ธ์š”

      • ์ž๋ฃŒ์˜ ์ •๋ณด ๋ฐ ๋‚ด์šฉ์˜ ์ง„์‹ค์„ฑ์— ๋Œ€ํ•˜์—ฌ ํ•ดํ”ผ์บ ํผ์Šค๋Š” ๋ณด์ฆํ•˜์ง€ ์•Š์œผ๋ฉฐ, ํ•ด๋‹น ์ •๋ณด ๋ฐ ๊ฒŒ์‹œ๋ฌผ ์ €์ž‘๊ถŒ๊ณผ ๊ธฐํƒ€ ๋ฒ•์  ์ฑ…์ž„์€ ์ž๋ฃŒ ๋“ฑ๋ก์ž์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค.
        ์ž๋ฃŒ ๋ฐ ๊ฒŒ์‹œ๋ฌผ ๋‚ด์šฉ์˜ ๋ถˆ๋ฒ•์  ์ด์šฉ, ๋ฌด๋‹จ ์ „์žฌโˆ™๋ฐฐํฌ๋Š” ๊ธˆ์ง€๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.
        ์ €์ž‘๊ถŒ์นจํ•ด, ๋ช…์˜ˆํ›ผ์† ๋“ฑ ๋ถ„์Ÿ ์š”์†Œ ๋ฐœ๊ฒฌ ์‹œ ๊ณ ๊ฐ๋น„๋ฐ”์นด์ง€๋…ธ Viva์˜ ์ €์ž‘๊ถŒ์นจํ•ด ์‹ ๊ณ ๋น„๋ฐ”์นด์ง€๋…ธ Viva๋ฅผ ์ด์šฉํ•ด ์ฃผ์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.
      • ํ•ดํ”ผ์บ ํผ์Šค๋Š” ๊ตฌ๋งค์ž์™ฟ’ ํŒ๋งค์ž ๋ชจ๋‘๊ฐ€ ๋งŒ์กฑํ•˜๋Š” ์„œ๋น„์Šค๊ฐ€ ๋˜๋„๋ก ๋…ธ๋ ฅํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์•„๋ž˜์˜ 4๊ฐ€์ง€ ์ž๋ฃŒํ™˜๋ถˆ ์กฐ๊ฑด์„ ๊ผญ ํ™•์ธํ•ด์ฃผ์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.
        ํŒŒ์ผ์˜ค๋ฅ˜ ์ค‘๋ณต์ž๋ฃŒ ์ €์ž‘๊ถŒ ์—†์Œ ์„ค๋ช…๊ณผ ์‹ค์ œ ๋‚ด์šฉ ๋ถˆ์ผ์น˜
        ํŒŒ์ผ์˜ ๋‹ค์šด๋กœ๋“œ๊ฐ€ ์ œ๋Œ€๋กœ ๋˜์ง€ ์•Š๊ฑฐ๋‚˜ ํŒŒ์ผํ˜•์‹์— ๋งž๋Š” ํ”„๋กœ๊ทธ๋žจ์œผ๋กœ ์ •์ƒ ์ž‘๋™ํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ ๋‹ค๋ฅธ ์ž๋ฃŒ์™ฟ’ 70% ์ด์ƒ ๋‚ด์šฉ์ด ์ผ์น˜ํ•˜๋Š” ๊ฒฝ์šฐ (์ค‘๋ณต์ž„์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋Š” ๊ทผ๊ฑฐ ํ•„์š”ํ•จ) ์ธํ„ฐ๋„ท์˜ ๋‹ค๋ฅธ ์‚ฌ์ดํŠธ, ์—ฐ๊ตฌ๊ธฐ๊ด€, ํ•™๊ป“, ์„œ์  ๋“ฑ์˜ ์ž๋ฃŒ๋ฅผ ๋„์šฉํ•œ ๊ฒฝ์šฐ ์ž๋ฃŒ์˜ ์„ค๋ช…๊ณผ ์‹ค์ œ ์ž๋ฃŒ์˜ ๋‚ด์šฉ์ด ์ผ์น˜ํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ

    ์ฐพ์œผ์‹œ๋˜ ์ž๋ฃŒ๊ฐ€ ์•„๋‹Œ๊ฐ€์š”?

    ์ง€๊ธˆ ๋ณด๋Š” ์ž๋ฃŒ์™ฟ’ ์—ฐ๊ด€๋˜์–ด ์žˆ์–ด์š”!
    ์™ผ์ชฝ ํ™”์‚ดํ‘œ
    ์˜ค๋ฅธ์ชฝ ํ™”์‚ดํ‘œ
    ๋ฌธ์„œ ์ดˆ์•ˆ์„ ์ƒ์„ฑํ•ด์ฃผ๋Š” EasyAI
    ์•ˆ๋…•ํ•˜์„ธ์š”. ํ•ดํ”ผ์บ ํผ์Šค์˜ ๋ฐฉ๋Œ€ํ•œ ์ž๋ฃŒ ์ค‘์—์„œ ์„ ๋ณ„ํ•˜์—ฌ ๋‹น์‹ ๋งŒ์˜ ์ดˆ์•ˆ์„ ๋งŒ๋“ค์–ด์ฃผ๋Š” EasyAI ์ž…๋‹ˆ๋‹ค.
    ์ €๋Š” ์•„๋ž˜์™ฟ’ ๊ฐ™์ด ์ž‘์—…์„ ๋„์™ฟ’๋“œ๋ฆฝ๋‹ˆ๋‹ค.
    - ์ฃผ์ œ๋งŒ ์ž…๋ ฅํ•˜๋ฉด ๋ชฉ์ฐจ๋ถ€ํ„ฐ ๋ณธ๋ๅฉ๋‚ด์šฉ๊นŒ์ง€ ์ž๋™ ์ƒ์„ฑํ•ด ๋“œ๋ฆฝ๋‹ˆ๋‹ค.
    - ์žฅ๋ฌธ์˜ ์ฝ˜ํ…์ธ ๋ฅผ ์‰ฝ๊ณ  ๋น ๋ฅด๊ฒŒ ์ž‘์„ฑํ•ด ๋“œ๋ฆฝ๋‹ˆ๋‹ค.
    - ์Šคํ† ์–ด์—์„œ ๋ฌด๋ฃŒ ์บ์‹œ๋ฅผ ๊ณ„์ •๋ณ„๋กœ 1ํšŒ ๋ฐœ๊ธ‰ ๋ฐ›์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ง€๊ธˆ ๋ฐ”๋กœ ์ฒดํ—˜ํ•ด ๋ณด์„ธ์š”!
    ์ด๋Ÿฐ ์ฃผ์ œ๋“ค์„ ์ž…๋ ฅํ•ด ๋ณด์„ธ์š”.
    - ์œ ์•„์—๊ฒŒ ์ ํ•ฉํ•œ ๋ฌธํ•™์ž‘ํ’ˆ์˜ ๊ธฐ์ค€๊ณผ ํŠน์„ฑ
    - ํ•œ๊ตญ์ธ์˜ ๊ฐ€์น˜๊ด€ ์ค‘์—์„œ ์ •์‹ ์  ๊ฐ€์น˜๊ด€์„ ์ด๋ฃจ๋Š” ๊ฒƒ๋“ค์„ ๋ฌธํ™”์  ๋ฌธ๋ฒ•์œผ๋กœ ์ •๋ฆฌํ•˜๊ณ , ํ˜„๋Œ€ํ•œ๊ตญ์‚ฌํšŒ์—์„œ ์ผ์–ด๋‚˜๋Š” ์‚ฌ๊ฑด๊ณผ ์‚ฌ๊ณ ๋ฅผ ๋น„๊ตํ•˜์—ฌ ์ž์‹ ์˜ ์˜๊ฒฌ์œผ๋กœ ๊ธฐ์ˆ ํ•˜์„ธ์š”
    - ์ž‘๋ณ„์ธ์‚ฌ ๋…ํ›„๊ฐ
    ํ•ด์บ  AI ์ฑ—๋ด‡๊ณผ ๋Œ€ํ™”ํ•˜๊ธฐ
    ์ฑ—๋ด‡์œผ๋กœ ๊ฐ„ํŽธํ•˜๊ฒŒ ์ƒ๋‹ดํ•ด๋ณด์„ธ์š”.
    2025๋…„ 06์›” 13์ผ ๊ธˆ์š”์ผ
    AI ์ฑ—๋ด‡
    ์•ˆ๋…•ํ•˜์„ธ์š”. ํ•ดํ”ผ์บ ํผ์Šค AI ์ฑ—๋ด‡์ž…๋‹ˆ๋‹ค. ๋ฌด์—‡์ด ๊ถ๊ธˆํ•˜์‹ ๊ฐ€์š”?
    9:33 ์˜ค์ „