• Title/Summary/Keyword: 사이버 금융사기

Search Result 12, Processing Time 0.02 seconds

Cyber Genome Technology for Countering Malware (악성코드 대응을 위한 사이버게놈 기술동향)

  • Kim, J.H.;Kim, H.J.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.5
    • /
    • pp.118-128
    • /
    • 2015
  • 최근 인터넷을 기반으로 사이버상에서 개인정보 유출, 금융사기, Distributed Denial of Service(DDoS) 공격, Advanced Persistent Threat(APT) 공격 등 사이버 위협이 지속적으로 발생하고 있으며, 공격의 형태는 다양하지만 모든 공격에는 악성코드가 원인이 되고 있다. 또한 기하급수적으로 증가하는 강력한 사이버 공격에 대처하기 위해 사전에 이를 방어 할 수 있는 적극적인 방어 기술이 요구되고 있다. 본고에서는 사이버공격 대응을 위하여 새로운 악성코드 탐지기술로 최근 관심을 받고 있는 사이버게놈 기술에 대한 개념과 국내외 관련 기술 및 연구동향에 대하여 살펴본다.

  • PDF

An Experiential Case Study of Cyber Financial Fraud: Focusing on specific processes and measures (사이버 금융사기의 체험적 사례 연구: 구체적 과정과 대책을 중심으로)

  • Han, Dong-Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.193-200
    • /
    • 2018
  • This study is an experiential case study of cybercrime fraud that combines pharming and voice phishing in April 2017. Research on victims who have actually suffered in the study of crime or disaster is a very useful field in establishing crime prevention measures. This study is significant in that Korea is relatively poor in this kind of research. I got cyber fraud as a consequence of my loss of reasonable judgment due to mental confusion when a companion dog who was raised for 8 years was in a very dangerous situation with cystitis. Fortunately, I received all the damages in a quick report, but the period was eight months. It took too much time to get back all the damages, so I had to suffer another pain. Based on my experience, I suggest damage prevention measures. First, when a certain condition and a certain amount are transferred, the transaction is automatically stopped or a more strict confirmation procedure is added. Secondly, trafficking means to arrest the perpetrator without any harm to the victim is sought. Third, the victims of crime should be promptly reimbursed for damages or a system for lending their living funds to zero or lower interest rate.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

자판기 불법자금모집업체 식별 및 근절대책

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.3 no.1 s.9
    • /
    • pp.64-69
    • /
    • 2004
  • 고수익을 미끼로 한 자판기 분양사기가 최근 급증하고 있어 큰 문제가 되고 있다. 무조건 자판기 수익성만을 과대포장하여 투자자들의 `묻지마` 투자를 유도한 후 돈만 챙기고 사업에서 손을 떼어버리는 사기행각은 그 피해대상이 대부분 서민이라는 점에서 문제의 심각성을 더한다. 자판기가 불법 자금 모집을 통해 사기의 대상으로 외부 인식이 악화되어 버린다면 자판기 산업의 입지 역시 크게 좁혀 질 수 밖에 없다. 자판기 품목에 있어서는 불법자금모집의 대표적인 사례가 되는 경우는 확정수익을 보장한다며 투자자를 모집하는 경우이다. 그 후 일정기간동안 수익을 보장하며 투자자를 안심시킨 다음 일순간 돌변하여 자금을 챙겨 잠적을 하는 수순을 밝는다. 선의의 투자자들은 이럴 경우 엄청난 피해를 입게 되는 게 보통이다. 대개의 경우 기계 1~2대의 소량물량이 아닌 5대~l0대 단위의 투자를 유도하기 때문이다. 이제는 자판기 산업에 있어 이러한 악성 불법자금 모집업체들이 근절되어야 한다. 이 불법 사기행각의 대상이 더 이상 자판기 분야에 발을 붙이지 못하도록 하는 제도적 비책이 시급히 강구 되어야 한다. 이러한 가운데 금융감독원 비은행감독국 비제도금융조사팀에서는 올들어 지난 9월말까지 고수익을 미끼로 투자자금을 모집하다가 금감원에 적발된 유사 금융업체 85개사 명단을 사법당국에 통보했다. 불법자금모집 업체들이 투자자들을 유혹하기위해 미끼로 내세운 사업을 종류별로 보면 자판기, 게임기, 컴퓨터단말기 등 특정상품 운영권 제공이 29개사로 가장 많고, 사이버 쇼핑몰 및 인터넷사업(18개사), 납골당 등 부동산 투자(12개사), 영화등 문화 및 레저사업(10개사), 영화문화 및 레저산업(10개사), 벤처투자사(9개사) 등이었다. 자판기 분야에 있어서는 주로 성인용품자판기, 복권자판기 등의 품목이 불법자금 모집의 집중 타킷이 되었다. 금감원은 최근들어 유사 금융업체의 자금모집이 전문가도 속을 정도로 지능화하고 있다며 개인투자자들이 피해를 예방할 수 있는 불법업체 식별법을 금감원 인터넷 사이트(www.fss.or.kr)에 게시했다. 금감원은 특히 사업현황에 대해 지나치게 보안을 유지하는 업체, 1백$\%$이상의 터무니없는 고수익을 보장한다고 광고하는 업체, 제도권 금융회사의 지급보증을 강조하는 업체에 대해서는 투자에 앞서 금감원이나 업종 관련 정부당국에 사실여부를 확인해 보고 투자여부를 결정하라고 통보했다. 아울러 금감원은 금융소비자들이나 자판기 업계에서 불법자금 모집업체를 발견하여 전화(02-3786-8155~9)나 인터넷소비자 보호센터와 경찰에 신고해줄 것을 요청했다. 이제는 산업계도 더 이상 자판기 분야의 불법자금업체를 방치하지 말고 적극적인 금감원 신고를 통해 시장을 정화할 수 있게 해야 한다. 미꾸라지 한두마리가 온 개천 물 다 흐려놓는 이치처럼 자판기불법자금업체들로 인해 전체 산업에 미치는 영향이 실로 심각함을 인식해야 할 때이다. 금호 산업정보에서는 산업계에서 불법자금업체 근절에 많은 관심을 가질 수 있게 하기 위해 금융감독원 비은행감독국 비제도금융조사팀에서 배포한 $\ulcorner$불법자금 모집업체 고수익 보장 유혹에 주의$\lrcorner$ 에 대한 보도자료의 세부내용을 게재한다.

  • PDF

A Study on Measures for Strengthening Cybersecurity through Analysis of Cyberattack Response (사이버공격 대응 분석을 통한 사이버안보 강화 방안 연구)

  • Yoon, Oh Jun;Bae, Kwang Yong;Kim, Jae Hong;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.65-72
    • /
    • 2015
  • Recent cyberthreats are emerging as big issues that need to be addressed to both developed countries and South Korea. Our government has implemented and established comprehensive measures whenever major incidents were happened. It is still insufficient, even though the national and social level of cybersecurity are improved with continuous investments and efforts to strengthen the country than in the past. Comprehensive measures have been exposed to limit the effectiveness because they are focused on short-term measures. In this paper, we try to analyze the problems of incidents and assess the implementation process of establishing comprehensive measures in order to suggest ways ultimately to improve the country's overall level of cybersecurity.

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

A Study on the Fraud Detection for Electronic Prepayment using Machine Learning (머신러닝을 이용한 선불전자지급수단의 이상금융거래 탐지 연구)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.65-77
    • /
    • 2022
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly growing, leading to growing fraud attempts. This paper proposes a methodology that can effectively detect fraud transactions in electronic prepayment by machine learning algorithms, including support vector machines, decision trees, and artificial neural networks. Actual transaction data of electronic prepayment services were collected and preprocessed to extract the most relevant variables from raw data. Two different approaches were explored in the paper. One is a transaction-based approach, and the other is a user ID-based approach. For the transaction-based approach, the first model is primarily based on raw data features, while the second model uses extra features in addition to the first model. The user ID-based approach also used feature engineering to extract and transform the most relevant features. Overall, the user ID-based approach showed a better performance than the transaction-based approach, where the artificial neural networks showed the best performance. The proposed method could be used to reduce the damage caused by financial accidents by detecting and blocking fraud attempts.