• Title/Summary/Keyword: 공격 분류

Search Result 455, Processing Time 0.022 seconds

A Re-configuration Scheme for Social Network Based Large-scale SMS Spam (소셜 네트워크 기반 대량의 SMS 스팸 데이터 재구성 기법)

  • Jeong, Sihyun;Noh, Giseop;Oh, Hayoung;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.801-806
    • /
    • 2015
  • The Short Message Service (SMS) is one of the most popular communication tools in the world. As the cost of SMS decreases, SMS spam has been growing largely. Even though there are many existing studies on SMS spam detection, researchers commonly have limitation collecting users' private SMS contents. They need to gather the information related to social network as well as personal SMS due to the intelligent spammers being aware of the social networks. Therefore, this paper proposes the Social network Building Scheme for SMS spam detection (SBSS) algorithm that builds synthetic social network dataset realistically, without the collection of private information. Also, we analyze and categorize the attack types of SMS spam to build more complete and realistic social network dataset including SMS spam.

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

A CASE OF CONDUCT DISORDER CONFINED TO FAMILY CONTEXT (가정에 국한된 품행장애 1례)

  • Chung, Sun-Ju;Cho, Soo-Churl
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.2
    • /
    • pp.287-297
    • /
    • 1997
  • Conduct disorder has been subclassified by the symptom characteristics of socialization, aggression, or age of onset. In ICD-10, ‘Conduct disorder confined to family context’ has been developed as a distinct subtype. Which delineates the conduct problems which take place only in the family and related situation. These authors experienced a case which presents a child who shows aggressive and violent behavior to his parent and brother, severe tamper tantrum and destructiveness only in family. By through history taking, observation and treatment after admission, we could find that insecure and ambivalent attachment between parent and child due to chronic neglect and abuse, and inconsistent parental behavior contribute to many behavioral and emotional problems of this child. We reviewed the relationship between conduct disorder and family pathology and treatment strategy for conduct disorder with family problems.

  • PDF

Intranet Security Evaluation Using Hacking Techniques (해킹 기법을 이용한 내부망 보안 평가 방법)

  • Seo, Dong-Il;Choi, Byeong-Choel;Sohn, Sung-Won;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.337-342
    • /
    • 2002
  • In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels ISL1∼ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.

Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment (현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로)

  • Kim, Jin-Woo;Lee, Sang-Gil;Lee, Jeong-Guk;Lee, Sang-Han;Shin, Dong-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2020
  • Secure boot is security technology that verifies the integrity of the computer system in boot stage and controls the boot process accordingly. The computer system can establish a secure execution environment from the threat of various malwares by security boot and also supports the recovery when system in emergency case. Recently, Secure boot has been adopted by various modern computer manufacturers to protect users' information from hacker attacks and to prevent abuse of their products by malicious users. In this paper, we classify security boot developed by various companies and organizations by platform, and analyze the design and development purpose of each security boot and investigate the limitation of design. It can be used as a reference for system security designers in various information of security boot development method and security design of system.

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.

Digital Watermarking Technique using self-similarity (자기유사성을 이용한 디지털 워터마킹 기법)

  • Lee, Mun-Hee;Lee, Young-hee
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.37-47
    • /
    • 2003
  • In this paper. we propose a new digital watermarking technique which uses the self-similarity of OCT(Discrete Cosine Transform) coefficients for the ownership protection of an image, similar coefficients are classified by SOM(Self-Organizing Map) out of Neural Network. The watermark is inserted into the selected cluster among clusters which consist of coefficients. Generally, the inserted watermark in high frequency regions of an image is eliminated by the compression process such as JPEG compressions, and the inserted watermark in low frequency regions of an image causes the distortion of an image quality. Therefore, the watermark is inserted into the cluster that has many coefficients in the middle frequency regions. This algorithm reduces the distortion of an image quality because of inserting the watermark into an image according to the number of coefficients in selected cluster. To extract watermarks from the watermarked image, the selected cluster is used without an original image. In the experiment, the new proposed algorithm have a good quality and endure attacks(JPEG compressions, filtering. zoom in, zoom out, cropping, noises) very well.

  • PDF

Development of Korean Scale for Measuring Children's Online Game Addiction Tendency (아동의 온라인 게임 중독 성향 측정을 위한 한국형 검사 척도 개발)

  • Lee, Chul-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.6
    • /
    • pp.29-38
    • /
    • 2007
  • The purpose of this study is developing of Korean scale for measuring elementary school pupil's online game addiction tendency by scientific development process. The pilot test was conducted in three times, and the items analysis, reliability analysis, and factor analysis was conducted at every test, so the inquiries for main survey composed of 30 inquiry items was decided. Some referential variables was included in the inquiries for main survey such as inquiry items for testing the actual using conditions and attitude of online game, the aggressive behavior scale, the impulsive behavior scale, the solitude scale, and the self-control scale. 2,584 fifth and sixth grade students in elementary school participated in main survey. For main survey results, items analysis and reliability analysis was conducted and validity was verified by exploratory factor analysis and correlation analysis. Finally, the final inquiry items composed of 7 factors, 30 items and the grouping criterion were developed through the standardization process.

  • PDF

The relationship between security incidents and value of companies : Case of listed companies in Korea (정보보안 사고가 기업가치에 미치는 영향 분석: 한국 상장기업 중심으로)

  • Hwang, Haesu;Lee, Heesang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.649-664
    • /
    • 2015
  • Recently, the risk of security incidents has been increased due to change of IT environment and development of new hacking methods. Event study methodology that measures the effect of a specific security incident on the stock price is widely adopted to analyze the damage cost of security incidents on market value. However, analysis of company's temporary stock price change is limited to immediate practical implication, and reputation loss should be considered as a collateral damage caused by security incidents. We analyzed 52 security incidents of listed Korean companies in the last decade; by refining the criteria presented by Tobin's q, we quantitatively showed that the companies has significantly higher reputation loss due to security loss than the other companies. Our research findings can be used in order that the companies can efficiently allocate its resource and investment for information security.