• Title/Summary/Keyword: 사이버범죄

Search Result 238, Processing Time 0.022 seconds

Simulation Analysis of Network Load of Application Level Security Protocol for Smart grid (시뮬레이션을 이용한 스마트 그리드 통신망 상의 응용 계층 보안 프로토콜의 부하 분석)

  • Lee, Kwang-Sik;Han, Seung-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart grid is a modernized electrical grid that uses information and communication technologies to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. However, with the advent of cyber crime, there are also concerns on the security of the infrastructure, primarily that involving communications technologies. In this work, we make an in-depth investigation on the issue of security services and network loads on Smart grid. Through simulation, we analyze the relations between security services and network loads. The experimental results of this study will contribute toward designing an advanced Smart grid system that offers better quality of services. Also, the approach proposed in this study can be utilized to derive new and valuable insights in security aspects.

A Study on the Regulation of Real Money Trade in On-line Game (온라인게임 아이템거래 규제 타당성에 관한 연구 - 시장실패 이론을 중심으로 -)

  • Choi, Seong-Rak
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.41-52
    • /
    • 2007
  • Presently, the online game industry of Korea are growing up fastly. The growth of online game give rise to the new problem of regulation on Real Money Trade(RMT). This article analyzed the market failure of RMT, and showed whether or not the government regulate RMT. The results showed that the RMT has efficiency in monopoly and external economie, and inefficiency in external diseconomies and uncertainty. But, the inefficiency in external diseconomie and uncertainty is based on the regulation of RMT by the game company. So, it is necessary for government to deregulate the RMT for curing the inefficiency of RMT.

  • PDF

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

A Study of Detecting Malicious Files using Similarity between Machine Code in Deleted File Slices (삭제된 파일 조각에서 기계어 코드 유사도를 이용한 악의적인 파일 탐지에 대한 연구)

  • Lee, Dong-Ju;Lee, Suk-Bong;Kim, Min-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.81-93
    • /
    • 2006
  • A file system is an evidence resource of cyber crime in computer forensics. Therefore the methods of recovering the file system and searching important information have been offered. However, the methods for finding a malicious fie in free blocks or slack spaces have not been suggested. In this paper, we propose an investigation method to find a maliciously executable fragmented file. After estimating if a file is executable with a machine code rate, we conclude it could be malicious by comparing a similarity of instruction sequences. To examine instruction sequences, we also propose a method of profiling malicious files using file and a method of comparing the continued scores. As the results, we could exactly pick out the malicious execution files, such as buffer overflow attack program, at fitting threshold level.

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

A Study on Actual Conditions for Internet Addiction of Teenagers - For high school student in Younggwang area- (청소년의 인터넷 중독실태에 관한 연구 -영광지역 고등학생을 중심으로)

  • 박미자;이귀상
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.589-591
    • /
    • 2004
  • 인터넷 이용률이 급속하게 증가하면서 사회적 문제로 중독증이나 사이버 범죄와 같은 점보화의 역기능이 사회전반에 걸쳐 확산되었다. 특히 청소년들의 인터넷 중독이 심각한 사회적 문제로 대두됨에 따라 도시지역 청소년에 대한 인터넷 중독관련 연구는 다양하게 이루어지고 있으나, 농어촌 청소년에 대한 연구는 거의 없는 상태이다. 이에 본 연구에서는 영광지역의 고등학생 400명을 대상으로 인터넷 이용실태에 대한 설문조사와 김현수(2000)가 번안한 Young의 인터넷 중독 검사지를 이용하여 인터넷 중독 설문조사를 하였다. 연구결과 평균사용자는 44.2%, 초기 중독사용자 53.16%, 심각한 중독사용자 2.7%로 나타났으며, 학년별 초기 인터넷 중독 성향을 보면 1학년 52.9%, 2학년 66.3%, 3학년 50%의 비율을 보이고 있고, 인터넷을 이용한 모든 활동을 보면 온라인게임, 정보검색, mp3파일 다운로드, 동호회 활동등의 순으로 나타났다. 본 연구에서는 초기 중독자와 심각한 중독을 합하여 중독경향 군으로 통합하였다. 따라서 55.8%에 해당하는 학생이 인터넷 중독에 빠질 수 있는 가능성이 있다고 볼 수 있다. 이러한 상황임에도 학교현장에서는 전혀 인터넷 중독에 대한 교육이 이루어지지 않고 있어, 이들에 대한 지속적인 교육이 필요할 것으로 생각된다.

  • PDF

Copyright education program by using a Role-play Model (역할놀이를 활용한 저작권 교육 프로그램)

  • Rhee, Jumg-Mi;Chun, Seok-Ju
    • 한국정보교육학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.67-73
    • /
    • 2010
  • In information and communications society, the numbers of elementary students who violate copyright law have been growing due to lack of understanding so they are needed to be educated on copyright. However, current education only has focused on copyright infringement, few numbers of educations have instructed copyright oriented examples linked to regular curriculum. Therefore, the purpose of this study is to grow elementary students's understanding of copyright and find new ways of education through designed copyright education program oriented regular curriculum.

  • PDF