• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.023 seconds

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.

Development of AI Image Analysis Emergency Door Opening and Closing System linked Wired/Wireless Counting (유무선 카운팅 연동형 AI 영상분석 비상문 개폐 시스템 개발)

  • Cheol-soo, Kang;Ji-yun, Hong;Bong-hyun, Kim
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.1-8
    • /
    • 2022
  • In case of a dangerous situation, the roof, which serves as an emergency exit, must be open in case of fire according to the Fire Act. However, when the roof door is opened, it has become a place of various incidents and accidents such as illegal entry, crime, and suicide. As a result, it is a reality to close the roof door in terms of facility management to prevent crime, various incidents, and accidents. Accordingly, the government is pushing to legislate regulations on housing construction standards, etc. that mandate the installation of electronic automatic opening and closing devices on rooftop doors. Therefore, in this paper, an intelligent emergency door opening/closing device system is proposed. To this end, an intelligent emergency door opening and closing system was developed by linking wired and wireless access counting and AI image analysis. Finally, it is possible to build a wireless communication-based integrated management platform that provides remote control and history management in a centralized method of device status real-time monitoring and event alarm.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Development of IR Thermal Camera Detector based on Smartphone Interlocking for Hidden Camera Crime Prevention (몰래카메라 범죄방지를 위한 스마트폰 연동 기반의 IR 열카메라 탐지기 개발)

  • Kang, Young-Gil;Cho, Pil-Gu;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • The performance of hidden camera cameras is improving day by day due to miniaturization and advanced technology integration according to the speed of technological development of smartphones. As this external networking computing environment is advanced and diversified, exposure to hidden cameras in addition to general safety cameras is also increasing. On the other hand, the technology for detecting and preventing hidden cameras is not keeping up with the development and speed of these hidden cameras. Therefore, in this study, the heat of the hidden camera was detected using infrared thermal detection technology based on general image and thermal image synthesis technology, and the reflectance of each wavelength according to the difference in ambient temperature was analyzed to reduce the false positive rate.

Cinematic Representation of Child Abuse and the Maternal Myth: A Narrative Analysis of and (아동학대의 재현과 모성 신화: <미쓰백>과 <어린 의뢰인>의 서사 분석을 중심으로)

  • Lee, Sohyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.194-207
    • /
    • 2022
  • Amid growing social interest in child abuse, and announced the seriousness of child abuse crimes and aroused public interest in related issues. Based on true stories and characters, both films created unique narratives about child abuse cases, but drew on the traditional representation and discursive construction of child abuse news articles. By setting the stepmother as the perpetrator and the father as the neglecter, the gender role of women as primary caregiver was reconfirmed and the stereotypical image of the 'evil stepmother' in popular narratives was exploited. The cinematic reenactment of the evil stepmother not only highlighted the normative family discourse, but also reinforced the maternal myth by emphasizing the binary opposition between the evil stepmother and the lost birth mother.

Rapport Building in Investigative Interviewing by Using Four Rapport Building Techniques (수사면담 시 라포의 구성 - 네 가지 라포형성 기법을 사용해서 -)

  • Kim Si Up
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.3
    • /
    • pp.487-506
    • /
    • 2013
  • The present study investigated whether do the efforts of interviewer really impact on the building a rapport by using four rapport building techniques-personalization, empathy, listening, and credibility. One woman probation officer interviewed 139 criminals(male, 122; female, 17). And she tried to building a rapport by using 4 rapport building techniques for about 11 minutes in every interview. In result, the degree of rapport perceived by interviewees was different significantly between high rapport group and low rapport group of 4 each rapport technique. Result suggests that personalization and listening techniques would be efficient way of building a rapport in investigative interviewing.

  • PDF

A Study on Urban Regeneration Considering the CPTED - Focusing on the Case Study of the Busan Ansim Village Project - (셉테드(CPTED)를 이용한 도시재생방안에 관한 연구 - 부산시 안심마을 조성사업 대상지를 중심으로 -)

  • KIM, Shin-Hey;KIM, Kwang-Yeol;BAEK, Tae-Kyung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.1
    • /
    • pp.54-67
    • /
    • 2021
  • At present, CPTED projects are showing an effect such as reducing the anxiety of residents from crimes and improving the criminal environment about crimes through crime prevention. However, most of the CPTED programs have been implemented mainly to improve the physical environment without verifying systematically and empirically on the relationship between the program and improving the quality of life of residents and satisfaction level of residents etc. Accordingly, the objective of this study is to grope for a plan to apply CPTED to urban regeneration for improvement in the safety and life quality of residents using AHP and Visualizing The Mental Map. For this, We selected four case areas in Busan and then analyzed the dead zones of CPTED programs by visualizing the mental maps and heat maps of residents for case districts. As a result of evaluating the priority of CPTED program, installation of CCTVs and streetlights for prevention of crimes was found to be the most important elements. Result of analyzing mental map, the existing crime prevention facilities and CPTED programs were found to have resolved most of physical disorder. However, it showed that, for psychological factors which the residents feel such as social disorder, a number of dead zones exist.

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

Advanced Resolution on Escort Security Area by Reviewing the System in Private Security Business (민간경비업의 제도적 고찰을 통한 호송경비업의 개선방안)

  • Kim, Sung-Su
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.63-87
    • /
    • 2010
  • Our society nowadays sees the increase in damage from crime on lives and properties by leaps and bounds in line with the economic take-off, and as a result, the raise of individual income. When considering such a hike in crime, it is desirable that the police framework be enhanced. However, thanks to the failure to correspond to this, it could be safely said that a good portion of accountability was shifted to the private security industry in regard to security for the people. Accordingly, the request for escort security business is on the increase regarding expansion and improvement about this industrial sector. As such, it is necessary to get the related system rearranged for authority on the part of escort guards, who are directly exposed to numerous crimes. On top of this, dispersion is required for the escort security businesses centralized in the metropolitan area. It is also necessary for the security guard system to be strengthened and disintegrated into details so that the escort security services are available to people in more safe and easily manners than ever before. When the qualification regime is operated based on this refreshed system, the efficient escort security work would be realized. The dichotomy into act on Special Security Guard and act on Security Business should be dealt with once again for integration as an issue on the front burner in the academic area, and through which the escort security market could be fit for the globalization as well. This paper would provide the solution that leads to more professional and efficient results from comprehension of progress situations in reality by starting from the concept on private security to the analysis of the conditions in this industrial sector.

  • PDF