• Title/Summary/Keyword: 대처행위

Search Result 190, Processing Time 0.029 seconds

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Comparative Study on Major Nations's Related Legislation for Counter-terrorism (테러대응 관련 법제의 국가별 비교 연구)

  • Kwon, Jeong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.343-352
    • /
    • 2010
  • As a result of comparing and analyzing the related legislation of each nation, more superior legislative systems should be made to cope with a number of terrors effectively. And also it is required to devise some concrete regulations such as the following in superior legislative systems. First, because it is hard to collect information on terrorism and watch over suspects according to Communication Privacy Protection Law. More in-depth discussion into the issue of surveillance is needed for the protection of lives and property, although public concerns of privacy are a valid point of contention. Second, it is necessary to take complementary measures on immigration as surveillance, since the current Immigration Control Law has restrictions in many ways to hinder efforts to root out terrorists. Third, under the current law on financial activities, it is impossible to block influx of terror financing. Therefore it is necessary to come up with ways of making the punishment procedures. Fourth, considering that convicted terrorists get punished under the standard procedures and precedents, it is required to clearly differentiate between what the terror acts are and what terrorist groups are. Fifth, it is necessary to make use of the private security system to enhance the security system of national facilities.

A Practical Use of UCC for Improving Information Protection Education (정보 보호 교육 향상을 위한 UCC 활용방안)

  • Seo, Min-Sung;Cho, Seong-Je;Kim, Seong-Baeg
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.1-13
    • /
    • 2009
  • Systematic information protection education is necessary to evoke the importance of information protection to the students and to provide them with alternatives to cope with malicious attacks. However, there have been too little development of the methods of systematic education and teaching materials to allow an effective education of information protection in the classrooms today. In this paper, we developed principle-oriented visual learning materials using UCC (User Created Content) for an effective education of information protection and evaluated the effectiveness of our approach with independent sample t-test method after being used in two classes, a test group and a control group. In particular, using UCCs, which have become the most frequently used contents in the Internet, as visual material for the education of information protection, proved to be effective in promoting the interest of students in classes and highly useful in education.

  • PDF

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF

Analysis on Elder Abuse of the Korea Elderly Long-term Care Hospital (노인요양병원의 노인학대 실태 분석)

  • Kwon, Kumju;Lee, Seoyoung;Park, Taejeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.553-560
    • /
    • 2016
  • This study examined the specific phenomenon of elder abuse at elderly care hospitals. The relationship between the attitudes of the hospital and elder abuse was also examined. Methods: The participants were from 86 elderly care hospitals. Questionnaires contained structured questions on attitudes, practices and elder abuse-related items. The data were analyzed using descriptive statistics, and a t-test with SPSS program. Results: The following cases of specific abuse were noted: verbal aggression (39.5%), ignoring requests (24.4%), and threatening communication (22.1%). Furthermore, there were also cases of physical and sexual abuse. With these findings, this study suggested a few implications. Among them, it was stressed that a systematic investigation of elder abuse cases at hospitals be undertaken and the legal response should be regulated by law.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A Study on the Risk Perception and Acceptance of Location-based SNS Service of Smartphone Users (스마트폰 사용자의 위치기반 SNS 서비스에 대한 위험인식과 수용에 관한 연구)

  • Yun, Sung-Uk
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.453-462
    • /
    • 2019
  • This study investigates the relationship between controllability, severity, unrealistic optimism and risk perception of risk factors related to location - based SNS services for smartphone users. For this purpose, I surveyed university students who had experience using location - based SNS service. The main results are as follows. First, controllability has a statistically significant effect on unrealistic optimism. Second, Severity had a statistically significant negative impact on unrealistic optimism. Third, Controllability did not have a statistically significant effect on risk perception, Fourth, Severity did not have a statistically significant effect on perceived risk. Fifth, Unrealistic optimism had a statistically significant negative impact on perception of risk. The results of this study will contribute to the prevention of privacy incidents and the protection of smartphone users by using location - based SNS service. On the one hand, future research will need to look at the relationship between unrealistic optimism and risk prevention or coping behavior.

Malware Detection Via Hybrid Analysis for API Calls (API call의 단계별 복합분석을 통한 악성코드 탐지)

  • Kang, Tae-Woo;Cho, Jae-Ik;Chung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.89-98
    • /
    • 2007
  • We have come a long way in the information age. Thanks to the advancement of such technologies as the internet, we have discovered new ways to convey information on a broader scope. However, negative aspects exist as is with anything else. These may include invasion of privacy over the web, or identity theft over the internet. What is more alarming is that malwares so called 'maliciouscodes' are rapidly spreading. Its intent is very destructive which can result in hacking, phishing and as aforementioned, one of the most disturbing problems on the net, invasion of privacy. This thesis describes the technology of how you can effectively analyze and detect these kind of malicious codes. We propose sequencial hybrid analysis for API calls that are hooked inside user-mode and kernel-level of Windows. This research explains how we can cope with malicious code more efficiently by abstracting malicious function signature and hiding attribute.

Influence of Health Promoting Lifestyle on Academic Procrastination in College Students: Mediating Effect of Grit Moderated by Gender (대학생의 건강증진 생활양식이 학업지연행동에 미치는 영향: 성별에 의해 조절된 투지의 매개효과)

  • Jeong, Goo-Churl
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.611-622
    • /
    • 2020
  • This study aimed to analyze the mediating effect of grit moderated by gender in the relationship between health promoting lifestyle and academic procrastination among 250 college students in the metropolitan area. As a result of the study, first, there was a significant positive correlation with grit for health promoting lifestyle, and significant negative correlation with academic procrastination. Grit had a significant negative correlation with academic procrastination. Second, grit had a significant mediating effect in the relationship between health promoting lifestyle and academic procrastination. Third, the mediating effect of grit in the relationship between health promoting lifestyle and academic procrastination was moderated by gender. In other words, it was found that men had a stronger mediating effect of grit than women. Based on these results, the role and importance of grit in the practice and maintenance of a health promoting lifestyle were discussed, and a way to practice health promoting behavior and coping with academic procrastination according to gender were suggested.

Investigation on a Way to Maximize the Productivity in Poultry Industry (양계산업에 있어서 생산성 향상방안에 대한 조사 연구)

  • 오세정
    • Korean Journal of Poultry Science
    • /
    • v.16 no.2
    • /
    • pp.105-127
    • /
    • 1989
  • Although poultry industry in Japan has been much developed in recent years, it still needs to be developed , compared with developed countries. Since the poultry market in Korea is expected to be opened in the near future it is necessary to maximize the Productivity to reduce the production costs and to develop the scientific, technologies and management organization systems for the improvement of the quality in poultry production. Followings ale the summary of poultry industry in Japan. 1. Poultry industry in Japan is almost specized and commercialized and its management system is : integrated, cooperative and developed to industrialized intensive style. Therefore, they have competitive power in the international poultry markets. 2. Average egg weight is 48-50g per day (Max. 54g) and feed requirement is 2. 1-2. 3. 3. The management organization system is specialized and farmers in small scale form complex and farmers in large scale are integrated.

  • PDF