• Title/Summary/Keyword: 네트워크 익명성

Search Result 127, Processing Time 0.027 seconds

A Study on the Payment Systems for Electronic Money in Japan (일본(日本)의 전자화폐(電子貨幣) 결제(決濟)시스템에 관한 고찰(考察))

  • Lee, Cheon-Soo
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.113-129
    • /
    • 2001
  • 인터넷은 컴퓨터와 네트워크의 가상공간을 통하여 그 개방성과 뛰어난 확장성으로 전자상거래의 기본수단이 되고 있으며 경이로운 발전을 거듭하고 있다. 이에 따라 현재 전세계는 전자상거래가 폭발적으로 성장하는 시기를 맞이하고 있다. 일본에서도 최근 일본정부가 2005년까지 초고속인터넷을 3000만 가구에 보급할 계획을 세우고 있는 등 인터넷의 고속화가 빠르게 진전되고 있고, 이용자의 인터넷 접속요금도 저가격화로 변화함에 따라 전자상거래 이용지도 급속도로 증가할 것으로 예상된다. 그리고 TV를 이용한 게임기나 인터넷 전용머신이라는 컴퓨터 이외의 디지털기기로 인터넷을 이용하는 등 전자상거래 이용수단도 다양화될 것이며, 또한 디지털 텔레비전과의 제휴를 통하여 디지털데이터방송을 활용한 전자상거래도 활발히 이루어질 전망이다. 이에 따라 일본의 전자상거래시장의 급속한 성장과 함께 결제수단도 다양화되고 있다. 전자상거래의 결제수단으로서는 현금, 우편환, 은행입금, 수표 외 전자상거래의 특유의 결제수단이라고 할 수 있는 전자화폐, 인터넷뱅킹, E-Debit 등이 있다. 이 가운데 전자화폐는 일반적으로 유통성, 양도가능성, 범용성, 익명성 등 현금이 가지고 있는 기능을 갖추고 있을 뿐만 아니라 원격지송금성, 수송상의 비용절감, 금액의 분할 및 통합의 유연성, 전자성 등의 특징을 갖고 있으며 현금의 단점을 보완하는 기능도 있기 때문에, 앞으로 신용카드를 대체하는 차세대 전자결제수단으로 등장할 것이 확실시된다. 따라서 본고에서는 현재 일본 내의 다양한 주체들에 의하여 개발 실험되고 있는 전자화폐에 의한 결제시스템을 개관함으로써 우리나라에서도 일본과 같은 다양한 전자화폐에 의한 결제시스템의 개발 실험 도입이 절실함을 제안하였다.

  • PDF

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

A Study on Authorship Identification in Strip Binary (스트립 바이너리에서 저자 식별에 관한 연구)

  • Ahn, Seonggwan;Ahn, Sunwoo;Kim, Hyunjun;Ha, Whoi Ree;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.270-272
    • /
    • 2021
  • 최근 익명성이 보장되는 네트워크와 인터넷이 생기며 이를 이용한 악성코드가 증가하고 있다. 이를 막기 위한 방안 중 하나로 코드의 저자를 밝혀내는 연구인 코드 저자 식별이 있다. 이에 관해 최근 연구들은 소스 코드와 바이너리에서 높은 정확도로 저자를 식별해낼 수 있다는 것을 밝혀냈다. 하지만 스트립 바이너리와 관련해서는 연구가 많이 이루어지지 않았다. 이에 본 연구에서는 최근 연구에 사용되는 방법을 스트립 바이너리에 적용하여 실험을 진행하여 그 결과가 좋지 않음을 보였다. 그리고 이를 바탕으로 스트립 바이너리에서 저자 식별이 어려운 이유를 분석하였다.

A Reputation Management Scheme Improving the Trustworthiness of Multi-peers and Shared Resources in P2P Networks (다중 피어 및 공유 자원의 신뢰성 향상을 위한 P2P 네트워크의 평판 관리)

  • Shin, Jung-Hwa;Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1409-1419
    • /
    • 2008
  • Inauthentic resources can be easily spread by P2P (Peer-to-Peer) participants due to the openness and anonymity of P2P networks. A possible way to restrict the distribution of inauthentic resources and prevent malicious peers from joining P2P networks is to exploit peers' reputation which reflect their past behaviors and are also helpful to predict peers' future behaviors. There is a possibility that some peers intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRRep (Trustable Resource sharing service using Reputation) scheme, which improves the trustworthiness and efficiency of P2P networks by identifying peers who give false feedback. The TrustRRep scheme is also capable of providing peers with the trustworthiness of shared resources by discriminating resources distributed by malicious peers. We implement the proposed TrustRRep scheme on the NS-2 simulator for evaluating its performance compared to the recent reputation management work available in literature. A case study on simulations shows that the proposed reputation management scheme yields efficient performance in terms of the minimal download ratio and dissemination of inauthentic resources, the efficient identification of peers who give false feedback, and the provisioning of the trustworthiness of peers' reputation. It also shows that the proposed TrustRRep scheme imposes the restrictions of participating P2P networks on a malicious peers by diminishing its trust value.

  • PDF

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Design and Implementation of the Electronic Payment Protocol for Digital Merchandise (디지털 상품 거래를 위한 전자지불 프로토콜 설계 및 구현)

  • Park Sei-Seung;Han Jae-Kyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.988-999
    • /
    • 2005
  • As the Internet continues to have the commercial trade changed, the method of payment is one of critical components to conduct successful businesses through the internet. An electronic cash has all of the characteristics of a traditional commodity cash and ensures the security for all transactions. Accordingly an internet billing system based on the electronic cash is expected as the secure and efficient payment method for the future electronic commerces. The digital contents such as digital merchandise and services have the characteristic that both the delivery of merchandise and the payment of money can be accomplished on the same network and are helpful to idealize the design of the electronic commerce system. In this paper, Anonymity got to be possible by using a virtual ID in the process of payment, the payment steps were decreased by being processed on the same network, and the efficiency and the security were guaranteed by decreasing the frequency of the coding and communication.

  • PDF

Investigating Major Topics Through the Analysis of Depression-related Facebook Group Posts (페이스북 그룹 게시물 분석을 통한 우울증 관련 주제에 대한 고찰)

  • Zhu, Yongjun;Kim, Donghun;Lee, Changho;Lee, Yongjeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.171-187
    • /
    • 2019
  • The study aims to analyze the posts of depression-related Facebook groups to understand major topics discussed by group users. Specifically, the purpose of the study is to identify the topics and keywords of the posts to understand what users discuss about depression. Depression is a mental disorder that is somewhat sensitive in the online community, which is characterized by accessibility, openness and anonymity. The researchers have implemented a natural language-based data analysis framework that includes components ranging from Facebook data collection to the automated extraction of topics. Using the framework, we collected and analyzed 885 posts created in the past one year from the largest Facebook depression group. To derive more complete and accurate topics, we combined both automated and manual (e.g., stop words removal, topic size determination) methods. Results indicate that users discuss a variety of topics including depression in general, human relations, mood and feeling, depression symptoms, suicide, medical references, family and etc.

Fake SNS Account Identification Technique Using Statistical and Image Data (통계 및 이미지 데이터를 활용한 가짜 SNS 계정 식별 기술)

  • Yoo, Seungyeon;Shin, Yeongseo;Bang, Chaewoon;Chun, Chanjun
    • Smart Media Journal
    • /
    • v.11 no.1
    • /
    • pp.58-66
    • /
    • 2022
  • As Internet technology develops, SNS users are increasing. As SNS becomes popular, SNS-type crimes using the influence and anonymity of social networks are increasing day by day. In this paper, we propose a fake account classification method that applies machine learning and deep learning to statistical and image data for fake accounts classification. SNS account data used for training was collected by itself, and the collected data is based on statistical data and image data. In the case of statistical data, machine learning and multi-layer perceptron were employed to train. Furthermore in the case of image data, a convolutional neural network (CNN) was utilized. Accordingly, it was confirmed that the overall performance of account classification was significantly meaningful.