• Title/Summary/Keyword: 악성 플레이어

Search Result 8, Processing Time 0.024 seconds

A Study on the Malicious Players and Troll in Team Fighting Games (팀 대전 게임에서의 악성 플레이어와 트롤에 관한 연구)

  • Jang, Hyun-Ik;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.173-176
    • /
    • 2022
  • 본 논문에서는 팀 대전 게임의 예시를 사용하며 팀 대전 게임에서 트롤을 사용하는 악성 플레이어에 대한 실태를 조사하고 이에 따른 여러 종류의 악성 플레이어에 따른 개선 방안을 제시한다. 악성 플레이어가 어떤 식으로 플레이하는지 설명하고, 사용자들이 악성 플레이어에 피해받는 트롤 사례를 조사하여 이에 따른 현재 문제들을 방지하기 위해 사용되고 있는 각 개발사의 조치 방안 및 사용자 커뮤니티의 의견을 통해 실태를 조사한다. 위의 조사한 자료를 바탕으로 어떻게 하면 현재 악성 플레이어를 예방 및 차단하는지에 대한 개선 방안을 제시하면서 운영 차원에서는 어떤 방법으로 지원해야 하는지 등의 내용을 제시한다.

  • PDF

A Study on the Network Traffic-based Realtime Detection of the Malicious Links (네트워크 트래픽 기반의 실시간 악성링크 탐지에 관한 연구)

  • Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.305-306
    • /
    • 2016
  • 최근에 게임 플레이어들을 노리는 악성코드가 발견돼 사용자들의 주의가 필요하다. 게임 플레이어를 노리는 악성코드는 이전부터 존재해왔지만 이번에 발견된 악성코드는 게임 콘텐츠로 위장한 사례로, 직.간접적으로 게임을 즐기는 불특정 다수를 대상으로 하고 있다. 본 논문에서는 게임 콘텐츠를 위장하여 악성코드를 이용한 사이버 공격에 대한 사전 차단을 위하여 악성코드 탐지엔진에서 수집된 트래픽 정보로부터 악성링크를 판단할 수 있는 실시간 악성링크 탐지 기능을 제안한다.

  • PDF

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

스마트폰 정보보호

  • Jeong, Hyeon-Cheol
    • TTA Journal
    • /
    • s.132
    • /
    • pp.28-33
    • /
    • 2010
  • 지난 10년 동안 인터넷은 우리 생활에 가히 혁명적인 영향을 끼쳐 왔습니다. 그러나 지난 10년이 인터넷 혁명의 시대였다고 한다면 향후 10년간은 모바일 혁명의 시대가 될 것이라고들 이야기합니다. 모바일 혁명 시대의 핵심에는 스마트폰이 자리하고 있습니다. 작년 이맘때쯤 국내에 아이폰이 도입되면서 국내에도 불붙기 시작한 스마트폰 광풍은 모든 비즈니스와 우리 생활에서 혁명을 예고하고 있습니다. 스마트폰 플랫폼 개발업체, 이동통신업체, 단말 기업체, 콘텐츠 개발자 등 다양한 플레이어들이 모바일 생태계 속에서 새로운 비즈니스 모델들을 탄생시키고 있고, 개인들의 생활속에서도 스마트폰은 깊숙이 자리매김하고 있습니다. 이처럼 우리 산업 전반과 삶에 새로운 변화를 일으키고 있는 스마트폰은 과연 안전한 것일까요? 스마트폰은 다양한 앱이 구동될 수 있는 개방형 플랫폼을 가지고 있고, 앱스토어를 통해 누구나 앱 사용자이자 제공자도 될 수 있습니다. 또한, 3G뿐만 아니라 Wi-Fi, Bluetooth, PC Sync 등 다양한 네트워킹 기능을 제공해 줍니다. 이러한 개방성을 바탕으로 스마트폰은 급격하게 성장하고 있지만 개방성은 악성코드 감염, 해킹, 프라이버시 침해 등 역기능이 발생할 수 있는 여건도 마련해 주고 있습니다. 실제로 스마트폰 해킹 사고는 국내외에서 빈번하게 발생되고 있고 그 피해가 증가하고 있는 추세입니다. 올 4월에 국내에서도 첫 스마트폰용 악성코드가 발견되었고, 전 세계적으로 524건의 모바일 악성코드가 발견되었습니다. 이처럼 스마트폰 해킹은 현실화되어 우리를 위협하고 있습니다. 본 특집에서는 스마트폰 보안과 관련한 정부의 정책방향, 보안위협과 사례, 프라이버시 이슈, 보안시장 전망, 국내외 표준화 동향, 전문인력 양성계획 등을 살펴보도록 하겠습니다.

  • PDF

Flash Malware Detection Method by Using Flash Tag Frequency (플래시 TAG Frequency를 이용한 악성 플래시 탐지 기술)

  • Jung, Wookhyun;Kim, Sangwon;Choi, Sangyong;Noh, Bongnam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.259-263
    • /
    • 2015
  • The vulnerabilities related to Flash player which is widely used in internet browsers and office programs are gradually increased. To detect Flash malwares, previous work focuses on predefined features of ActionScript. However above work cannot detect new/mutated Flash malwares, since predefined features could not cover the new patterns of new/mutated Flash mawares. To solve this problem, we propose a Flash malware detection method that uses machine learning to learn Flash Tag patterns and classify Flash by using machine learning.

  • PDF

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

Analyzing Vulnerable Software Code Using Dynamic Taint and SMT Solver (동적오염분석과 SMT 해석기를 이용한 소프트웨어 보안 취약점 분석 연구)

  • Kim, Sungho;Park, Yongsu
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.257-262
    • /
    • 2015
  • As software grows more complex, it contains more bugs that are not recognized by developers. Attackers can then use exploitable bugs to penetrate systems or spread malicious code. As a representative method, attackers manipulated documents or multimedia files in order to make the software engage in unanticipated behavior. Recently, this method has gained frequent use in A.P.T. In this paper, an automatic analysis method to find software security bugs was proposed. This approach aimed at finding security bugs in the software which can arise from input data such as documents or multimedia. Through dynamic taint analysis, how input data propagation to vulnerable code occurred was tracked, and relevant instructions in relation to input data were found. Next, the relevant instructions were translated to a formula and vulnerable input data were found via the formula using an SMT solver. Using this approach, 6 vulnerable codes were found, and data were input to crash applications such as HWP and Gomplayer.

A single case study using Contextual Support Model based music therapy intervention for a terminal pediatric patient (말기질환 아동을 위한 환경적 지지모델(The Contextual Support Model of Music Therapy)에 근거한 음악치료사례연구)

  • Jun, Mi Hye
    • Journal of Music and Human Behavior
    • /
    • v.2 no.2
    • /
    • pp.15-31
    • /
    • 2005
  • Terminal pediatric patient include congenital metabolic abnormalities, chromosome aberrations, congenital anomalies, neuromuscular diseases and other incurable conditions as well as malignant tumors. One third of these diseases are cancers, and two thirds of cancers are lymphadenoma and leukemia. Terminal pediatric patient may feel fear, anger and frustration against treatment process in hospitals, lose control of themselves and stay in helplessness due to restrictions within controlled hospital environment. This study examined the relationship between hospitalized childrens behavior and music using Contextual Support Model of Music Therapya theory stating therapeutic music environments possess three elements of Structure, Autonomy support and Involvement, and increase childrens active engagement. Focused on these three therapeutic elements, this study analyzed music therapy cases of terminally ill children to examine the relationship between childrens behavior and music as environmental supportive medium in the environment. This study is on a single case case subject, a 10-year-old girl with acute lymphocytic leukemia. Nine sessions of music therapy activities were conducted and analyzed using qualitative method. Focusing on three therapeutic elements of Contextual Support Model, analysis of sessions was made on the basis of activities specifically designed for this study. Main music therapy activities included singing while playing musical instruments, singing while listening to music through CD player, making up songs, and searching for song lines. The findings of this study are as follows: a) in terms of Structure, music therapy suggested a direction for effective musical activities for terminally ill children by providing environments where child can sing, play musical instruments and make up songs; b) in terms of Autonomy support, music therapy encouraged childs voluntary participation by giving her chances to make choice while singing or playing musical instruments; c) in terms of Involvement, child could gain positive approval of the therapist and conduct musical activities in cooperation with the therapist. Music therapy serves as supportive medium in the environment, develops spontaneity and self-reliance in emotionally depressed children, and promotes voluntary attitudes in the restricted hospital environment. Based on the positive effects of music therapy, more studies need to be conducted with an approach to more various terminal pediatric patients.

  • PDF