• Title/Summary/Keyword: 사이버거래

Search Result 161, Processing Time 0.029 seconds

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.

Fraud Detection System Model Using Generative Adversarial Networks and Deep Learning (생성적 적대 신경망과 딥러닝을 활용한 이상거래탐지 시스템 모형)

  • Ye Won Kim;Ye Lim Yu;Hong Yong Choi
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.59-72
    • /
    • 2020
  • Artificial Intelligence is establishing itself as a familiar tool from an intractable concept. In this trend, financial sector is also looking to improve the problem of existing system which includes Fraud Detection System (FDS). It is being difficult to detect sophisticated cyber financial fraud using original rule-based FDS. This is because diversification of payment environment and increasing number of electronic financial transactions has been emerged. In order to overcome present FDS, this paper suggests 3 types of artificial intelligence models, Generative Adversarial Network (GAN), Deep Neural Network (DNN), and Convolutional Neural Network (CNN). GAN proves how data imbalance problem can be developed while DNN and CNN show how abnormal financial trading patterns can be precisely detected. In conclusion, among the experiments on this paper, WGAN has the highest improvement effects on data imbalance problem. DNN model reflects more effects on fraud classification comparatively.

Agent-based Internet Auction Prediction Algorithm (에이전트 기반 인터넷 경매 예측 알고리즘)

  • Chung Jae-Hwan;Jang Hyun-Soo;Sun Seung-Sang;Kim Gu-Su;Eom Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.367-370
    • /
    • 2006
  • 인터넷 경매란 전자상거래 방식의 일종으로, 웹사이트를 통해 사이버거래 장소에서 구매자와 판매자간에 다양한 경매방식을 적용하여 물품의 경쟁매매가 이루어질 수 있도록 하는 서비스이다. 현재 국내외 인터넷 경매 사이트는 경매의 성격 보다 쇼핑몰에 경매를 부과한 형태의 복합적인 특징을 가지고 운용되고 있다. 이로 인해 가격을 기준으로 입찰 참여 및 경매 완료를 진행하기에는, 다소 현실성이 떨어진다는 문제를 내포하고 있다. 따라서, 본 논문은 구매하고자 하는 상품에 대하여 현재 진행 중인 경매의 상황을 예측 및 판단하여 구매자에게 경매 정보를 제공함으로써 합리적으로 물품의 구매를 도울 수 있는 알고리즘을 제시하고, 예측 알고리즘을 구현한 경매 예측 에이전트와 사용자의 패턴을 기록하고 상품구매, 입찰 등을 대리하는 에이전트들로 구성되는 에이전트 기반 경매 시스템을 소개한다.

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

A Study on the Seller's Errors in Internet Shopping Mall Transactions (인터넷쇼핑몰 거래에 있어서 매도인의 착오에 관한 고찰)

  • Yoon, Chang-Sul
    • Journal of Digital Convergence
    • /
    • v.8 no.2
    • /
    • pp.147-160
    • /
    • 2010
  • Internet shopping mall business has taken its place as a major form of e-commerce and is evolving constantly. At the same time, disputes of various kinds are also arising in proportion to the evolution. A typical example is when a consumer purchased a product from an internet shopping mall and the seller wants to cancel or withdraw the sales contract saying that he miswrote the price or other important information when posting the product on the internet. It's about the error on the seller's part. Civil Law Chapter 109, legal principles on errors, appears to assume the case of natural declaration of intention. It was observed that legal principles on errors defined by the Civil Law are also applied in internet shopping malls, where declaration of intention is made electronically. In transactions involving internet shopping malls, where the seller's indication and advertisement constitutes an inducement to offer, the seller may cancel a contract concluded by the consumer's offer and the seller's acceptance if the seller finds errors on his part, and adequacy of the cancellation should be judged depending on specific cases. That is, the judgment of the important ground that comprises prerequisites for cancellation and presence of negligence may depend on how much difference there is between the normal price and the posted price on a specific case. Also, considering the cases where negligence was not perceived on the seller's miswriting of the price, the seller may cancel the transaction in a similar situation.

  • PDF

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

Analysis of C2C Internet Fraud and Its Counter Measures (인터넷 직거래 사기의 실태 및 보안대책)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.141-153
    • /
    • 2015
  • In recent days, internet appears to be a daily necessity, which leads to the increase of internet fraud. This study particularly focuses upon C2C internet fraud, while other researches on internet fraud seldom touch such a topic. The aim of this study is to grasp the stark reality of the soaring C2C online fraud, to categorize the type of the frauds, to identify the root causes of the fraud, and to suggest security measures to prevent the C2C online fraud.

Designing a Distributed Access Control Processor Model for Collaborative Product Commerce Services (협업적 제품거래 서비스를 위한 분산 접근제어 프로세서모델)

  • 김형선;박진섭
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.119-124
    • /
    • 2004
  • The service oriented architecture (SOA) is gaining more momentum with the advent of Web services on internet. A programmable and machine accessible Web is the vision of many, and might represent a step towards the semantic Web. However, security is a crucial requirement for the serious usage and adoption of the Web services technology. This paper proposes design goals for an distributed access control model for CPC(Collaborative Product Commerce). It then design a processor model for CPC components, along with web services standard and concept that can be used as a basis to design an access control processor independent of a particular CPC service implementation.

  • PDF

Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses (중소기업 유해트래픽 분석을 통한 보안관제 개선 방안)

  • Hong, Jun Suk;Lim, Young Hwan;Park, Won Hyung;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.195-204
    • /
    • 2014
  • Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.