• Title/Summary/Keyword: 사용자 유형

Search Result 1,154, Processing Time 0.03 seconds

A Study on the Pharming Attack Protection using DNS Spoofing (DNS 스푸핑을 이용한 파밍 공격 방어에 관한 연구)

  • Park, JeongHyuk;Ahn, Sung-Hwan;Park, Min-Woo;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.655-658
    • /
    • 2013
  • 최근 피싱의 한 유형으로 등장한 파밍은 웹 사이트를 위조하여 개인정보를 탈취하는 공격이다. 신뢰받는 기관(금융, 정부 등)의 사이트로 위장하여 개인정보를 탈취하는 방식은 같으나 차이점은 피싱의 경우 유사 도메인을 이용하는 경우가 많아 사용자가 주의를 기울이면 공격을 피할 수 있다. 하지만, 파밍의 경우 DNS 스푸핑을 이용하여 사용자가 정확한 도메인주소(URL)를 입력 하더라도 공격자가 미리 만들어둔 위장 웹 서버로 접속이 되기 때문에 사용자가 주의 깊게 살펴보아도 공격을 인지하기 어렵다. 본 논문에서는 파밍 공격에 사용되는 DNS 스푸핑에 대해 논의하고 파밍 탐지기법에 대해 소개한다. 궁극적으로는 파밍 탐지기법들을 비교 및 분석한 후 실제 구현을 위해서 극복해야 할 한계점을 알아본다.

A Study of Cloud Computing Security on User's View (사용자 관점의 클라우드 컴퓨팅 보안 연구)

  • Hwang, Sue-Yeon;Nam, Bo-won;Park, Min-Woo;Lee, Jun-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1233-1236
    • /
    • 2010
  • 클라우드 컴퓨팅 시스템은 방대한 정보와 자료를 가진 컴퓨팅 시스템으로 해커의 공격 대상이 되기쉽다. 또한 복잡한 구조를 가지기 때문에 취약점이 발생하기 쉬워 체계적인 보안 분석이 필요하다. 현재 클라우드 컴퓨팅 보안 요구사항 분석이나 권고 사항 연구를 위해 많은 국제 협의기구가 활발히 활동 중이다. 하지만 협의기구들의 연구 활동은 서비스 유형에 따라 사업자 기준에서 보안 분석이 이루어지고 있다. 클라우드 컴퓨팅 서비스가 보다 활발히 발달하기 위해서는 클라우드 컴퓨팅 서비스를 이용하는 사용자들을 세분화하고 그들에 맞는 보안 서비스가 제공되어야 한다. 본 논문에서는 기존의 보안 분석들과 다르게 사용자 기준에서 분석한 클라우드 컴퓨팅 서비스의 보안 분류를 제시한다.

Dynamic Web Design with AI-Driven Templates: Proposing Personalized Solutions for Enhanced User Engagement (AI 기반 템플릿을 사용한 동적 웹 설계: 사용자 참여도 향상을 위한 맞춤형 솔루션 제안)

  • Jong-In Choi;Do-Yoon Kim;Tae-Woong Shim;Kwang-Young Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.565-566
    • /
    • 2023
  • 본 논문은 AI 기술을 활용하여 웹 디자인 및 개발 과정에서 생산성과 비용 측면에서 발생하는 문제점을 해결하기 위한 솔루션을 제안하고 있다. ChatGPT와 같은 대규모 언어 모델을 기반으로 사용자가 원하는 웹사이트 유형과 데이터를 입력하면, AI가 적절한 웹 템플릿을 제시하고, 해당 템플릿을 기반으로 동적인 웹사이트를 자동으로 제작하는 방식으로 작동한다. 이를 통해 개발자는 웹사이트 디자인 및 레이아웃 개발에 소요되는 시간과 비용을 절감할 수 있다. 이러한 방식은 웹사이트를 더 사용자 친화적이고 참여도 높은 것으로 만들어, 고객 유치와 이타적 상호작용을 유도하며, 회사나 조직의 성공에 기여할 수 있다.

High Speed Web Log Preprocess System for Web Attack Detection (웹 공격 탐지를 위한 고속화된 웹 로그 전처리 시스템)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.969-972
    • /
    • 2007
  • 국내 웹 사이트의 증가 및 초고속 인터넷의 보급으로 웹 사용자는 꾸준히 증가 추세에 있다. 그러나 사용자에 대한 정보 보호 실태는 심각한 수준이다. 그 피해 사항으로는 사용자 개인 신상정보의 유출, 피싱 사이트로 인한 개인정보 유출 등 그 유형 및 목적이 다양하다. 이런 웹 공격에 대한 기존의 대응책으로 IDS/IPS를 통한 네트워크 기반의 공격 탐지 및 방지가 주류를 이뤘다. 그러나 이런 대응책은 누구에게나 공개되는 웹서버 보안에는 적합한 시스템이 아니다. 본 논문에서는 웹 공격의 특성에 맞는 문자열 처리 중심의 로그 분석을 통해 대용량의 로그로부터 공격을 탐지하는 웹 로그 전처리 시스템을 제안한다.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

A Study on the Critical Success Factors of Wireless Broadband Service (휴대인터넷(WiBro) 서비스의 주요성공요인에 관한 연구)

  • Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.233-245
    • /
    • 2009
  • The number of subscribers and the level of service usage are moderately low though WiBro service, as a new mobile Internet service, has been provided to mobile Internet users since June 2006. Considering this situation, the study was to identify, in exploratory point of view, which critical success factors are considered by mobile Internet users as the most important one to facilitate WiBro service, and to examine the perception of critical success factors of WiBro service varies according to their demographic characteristics. The study also was to suggest a few of research propositions on the relationships between critical success factors of WiBro service and characteristics of mobile Internet users, based on various statistical analyses. To accomplish these research purposes, the study defined research variables such as demographic characteristic of mobile Internet users, types of user, and critical success factors of WiBro service based on the review of mobile Internet service related studies. And then, the study performed various statistical analyses using survey questionnaires on mobile Internet users. The analyses show that there are little differences in perception on critical success factors of WiBro service among the mobile Internet users grouped by job and residential region, and that only the relationship between occupation of mobile Internet users and critical success factors of WiBro service is moderated by the types of user. Finally, the study proposed some research propositions, based on these analysis results, that could be used in the future studies.

Structural Model for Users's Accepting Smart Health Care Services by Moderating the User Types (사용자유형을 조절변수로 한 스마트헬스케어서비스 수용의도의 구조모형)

  • Choi, Yuung-Nam;Kim, Keun-Hyung;Oh, Sung-Ryoel
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.541-554
    • /
    • 2015
  • In this paper, first, we examined the factors which would affect users's intention for accepting Smart Healthcare Service. Second, we analyzed weather the types(health care provider vs. health care recipient) of the users would modulate the factors's influences. The independent variables of the research model are novelty-seeking, self-efficacy, facilitating conditions and security. The mediating variables are the perceived ease of use and the perceived usefulness. The dependent variable is the acceptance intention and the moderating variable is the user type which contains health care provider and health care recipient. As the results of the analysis, we recognized that the self-efficacy of the users would affect the perceived ease of use and the perceived usefulness in the smart healthcare services, but the user types(health care provider vs. health care recipient) did not modulate the factors's influences. We also recognized that the facilitating conditions would affect the perceived ease of use and the perceived usefulness in the smart healthcare services, in particular, the user types modulated the influences in the ease of use. We also recognized that the security would affect the perceived ease of use and the influence was more sensitive in the case of the health care provider. At last, we recognized that the ease of use and usefulness would affect the acceptance intentions. The influence of the ease was more sensitive in the case of the health care recipient. The influence of the usefulness was more sensitive in the case of the health care provider.

Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance (서비스의 유용성과 프라이버시 염려도가 개인화 된 서비스 수용성에 미치는 영향에 관한 연구)

  • Lee, Zoon-Ky;Choi, Hee-Jai;Choi, Seon-Ah
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.37-51
    • /
    • 2007
  • As the highly improved Internet and information technology has led to the diversification of users' demands, personalization service attract lots of attention as a means to meet highly diversified demand of users. However, personalization service costs a lot. Also concerns over a possible violation of privacy have been raised since the service uses technology to find out the users' profiles. This research studies the advantages individuals acquire from personalization service and how privacy concern influences service acceptance. Research on related documents and information gathering from e-commerce sites derived six representative types of service. Questionnaires were utilized to research privacy concern according to services, service usefulness, and service acceptance. As expected, privacy concern has a negative relation to acceptance while service usefulness has a positive relation to it, thereby resulting in an offset between two variables. Moreover, they play a different role depending on what kinds of service or in formation should be provided. The results derived from this paper will help the e-commerce sites provide personalization service by collecting personal information while protecting users' privacy.

  • PDF

A Study of the Relationship between Perception and Activities in the News Replies -Focused on News Perception and Credibilities- (온라인 댓글 인식과 댓글 활동의 관계에 관한 연구 -댓글의 신뢰도와 인터넷뉴스 수용자의 수용경향 중심으로-)

  • Kweon, Sang-Hee;Kim, Ik-Hyun
    • Korean journal of communication and information
    • /
    • v.42
    • /
    • pp.44-78
    • /
    • 2008
  • The present study explored the agenda setting effects of replies called "Daet-Gul", and perception of the news replies. This study has established three research questions: 1) the recognition of the online communication 2) the degree of the reading and writing on online spare 3) the amount of the effects on the online communication. This study is performed using survey method. The survey results indicated in that the participants are very passive readers and writers on the online spare. In addition, the survey repliers evaluated that replies' mechanical device and antigravitational speed have high score, whereas they marked low store in the content and credibility of 'the replies. Therefore, they did not estimate the effects of the replies highly. All the results indicate that 'the replies' is not the fundamental factors of the deliberative democracy. It's because online communication with 'the replies' are thought to be fated the abuse and slander. Therefore, it's essential to improve the online communication with 'the replies', through the introduction of the 'trackback', which is a sort of the 'remote replies'

  • PDF

A Study on the Improvement of Defect Management through Judicial Precedents of Landscape Construction Defect (조경공사 하자판례 분석을 통한 하자처리 개선방안 연구)

  • Jung, Myeung-Muk;Lee, Sang-Suk
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.1
    • /
    • pp.81-91
    • /
    • 2012
  • The purpose of this study was to analyze judicial precedents related on landscape construction defects(JPLCD) and suggested the improvement plan for dealing with it. The results are as the following: 1. Landscape construction defects litigations have been increased so far since 2000 and the duration of original trial was approximately 603 days, while appeal trials took up to 550 days. Therefore, the analysis revealed that settlement of disputes were lengthy and wasteful to consumers and constructors. 2. Judgement's cost accepted by the judge was only 53.6% of appraisal's cost appraised by appraiser, therefore it revealed appraiser overestimated the repair cost of landscape construction defects. 3. According to work classification categorized by Landscape Construction Standard Specification(2008) of the Korean Institute of Landscape Architecture, landscape planting amounted to 75% of JPLCD and plaintiff(consumers)'s prevailing rate of it reached 77% to be a serious burden to constructors. 4. According to JPLCD categorized by the type of dispute, defects caused by consumer's negligence for maintenance amounted to 29% and defendant(constructors)'s prevailing rate of it reached 64% to be the main responsibility of consumers. Further study will be required to make the judge standard of landscape construction defects through legal and technical research.