• Title/Summary/Keyword: 연구의 출처

Search Result 280, Processing Time 0.024 seconds

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

Multi-Source/Multi-Use Model of Storytelling Related to Patent (특허 연계 스토리텔링의 멀티소스/멀티유즈 모델)

  • Lee, Ga-Hee;Lee, Sang-Zee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.447-456
    • /
    • 2015
  • In this paper a new model of storytelling related to patent in the field of business as a sort of Intellectual Property(IP) was proposed. The patent related storytelling is investigated in the view points of variety of customers, purposes and applications which is different from the conventional OSMU, transmedia or crossmedia storytelling. In business there are several stages related to patent such as the initial conceptualization and development of technology, apply for and registration of patent, legal conflict like patent invalidation trial and action for infringement of patent and damages, and the commercialization stage like development of product based on patent, advertisement and marketing. Multiple sources optimized to the purpose in each stage of patent related business as well as to multiple convergence application of a patent. Similarly, multi-use refers to the fact that storytelling can be applied in each stage of patent oriented business. The effectiveness and usefulness of proposed MSMU model is also investigated.

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

Analysis of massive data in astronomy (천문학에서의 대용량 자료 분석)

  • Shin, Min-Su
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.6
    • /
    • pp.1107-1116
    • /
    • 2016
  • Recent astronomical survey observations have produced substantial amounts of data as well as completely changed conventional methods of analyzing astronomical data. Both classical statistical inference and modern machine learning methods have been used in every step of data analysis that range from data calibration to inferences of physical models. We are seeing the growing popularity of using machine learning methods in classical problems of astronomical data analysis due to low-cost data acquisition using cheap large-scale detectors and fast computer networks that enable us to share large volumes of data. It is common to consider the effects of inhomogeneous spatial and temporal coverage in the analysis of big astronomical data. The growing size of the data requires us to use parallel distributed computing environments as well as machine learning algorithms. Distributed data analysis systems have not been adopted widely for the general analysis of massive astronomical data. Gathering adequate training data is expensive in observation and learning data are generally collected from multiple data sources in astronomy; therefore, semi-supervised and ensemble machine learning methods will become important for the analysis of big astronomical data.

A Study on Graph-based Topic Extraction from Microblogs (마이크로블로그를 통한 그래프 기반의 토픽 추출에 관한 연구)

  • Choi, Don-Jung;Lee, Sung-Woo;Kim, Jae-Kwang;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.5
    • /
    • pp.564-568
    • /
    • 2011
  • Microblogs became popular information delivery ways due to the spread of smart phones. They have the characteristic of reflecting the interests of users more quickly than other medium. Particularly, in case of the subject which attracts many users, microblogs can supply rich information originated from various information sources. Nevertheless, it has been considered as a hard problem to obtain useful information from microblogs because too much noises are in them. So far, various methods are proposed to extract and track some subjects from particular documents, yet these methods do not work effectively in case of microblogs which consist of short phrases. In this paper, we propose a graph-based topic extraction and partitioning method to understand interests of users about a certain keyword. The proposed method contains the process of generating a keyword graph using the co-occurrences of terms in the microblogs, and the process of splitting the graph by using a network partitioning method. When we applied the proposed method on some keywords. our method shows good performance for finding a topic about the keyword and partitioning the topic into sub-topics.

A Study on Big Data Anti-Money Laundering Systems Design through A Bank's Case Analysis (A 은행 사례 분석을 통한 빅데이터 기반 자금세탁방지 시스템 설계)

  • Kim, Sang-Wan;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.85-94
    • /
    • 2016
  • Traditional Anti-Money Laundering (AML) software applications monitor bank customer transactions on a daily basis using customer historical information and account profile data to provide a "whole picture" to bank management. With the advent of Big Data, these applications could be benefited from size, variety, and speed of unstructured data, which have not been used in AML applications before. This study analyses the weaknesses of a bank's current AML systems and proposes an AML systems taking advantage of Big Data. For example, early warning of AML risk can be improved by exposing identities and uncovering hidden relationships through predictive and entity analytics on real-time and outside data such as SNS data.

  • PDF

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

QSPR model for the boiling point of diverse organic compounds with applicability domain (다양한 유기화합물의 비등점 예측을 위한 QSPR 모델 및 이의 적용구역)

  • Shin, Seong Eun;Cha, Ji Young;Kim, Kwang-Yon;No, Kyoung Tai
    • Analytical Science and Technology
    • /
    • v.28 no.4
    • /
    • pp.270-277
    • /
    • 2015
  • Boiling point (BP) is one of the most fundamental physicochemical properties of organic compounds to characterize and identify the thermal characteristics of target compounds. Previously developed QSPR equations, however, still had some limitation for the specific compounds, like high-energy molecules, mainly because of the lack of experimental data and less coverage. A large BP dataset of 5,923 solid organic compounds was finally secured in this study, after dedicated pre-filtration of experimental data from different sources, mostly consisting of compounds not only from common organic molecules but also from some specially used molecules, and those dataset was used to build the new BP prediction model. Various machine learning methods were performed for newly collected data based on meaningful 2D descriptor set. Results of combined check showed acceptable validity and robustness of our models, and consensus approaches of each model were also performed. Applicability domain of BP prediction model was shown based on descriptor of training set.

A Study of Characteristics and Types of Congressional Records (의회기록의 특질과 종류)

  • Lee, Won-young
    • The Korean Journal of Archival Studies
    • /
    • no.9
    • /
    • pp.110-142
    • /
    • 2004
  • This paper treated what are congressional records which are one of core fields of national records and what kind of significant records they have. The characteristics of "substantive records" of the institution among public records are as follows: firstly, their contents depend on the inherent function of the institution; secondly, their types differ by the character of basic unit(member); thirdly, their sources are determined by the character of institution. Starting from the above points of view, the contents, characteristics, main sources, and types by sources of congressional records were presented. They are summarized as follows. In Chapter 2, the substantial records, which document the intrinsic function of congress on the basis of analyses of inherent function and structural uniqueness of congress have natures of which the contents are "legislative records", "oversight records", and "political activity records" starting from the inherency of congress as the people's representation. The typical natures of congress records are related with the specialty that the basic unit of congress structure is an individual congressman as an indepent national institution and congress is a council of these congressmen. Firstly, the records of congressmen as basic member of congress are the national records with the type of personal records. Secondly, "council records" produced by the council (commettee and main conference), which have evidencial and informative value for decision making through the process of investigating, discussing and voting bill and policy (item) of the basis for national management, are very special kind of records, such as item records, decision records, journal records, and congress assistant records. Because congressmen and councils composing congress have an equal inter-relationship in the structure of congress, the main sources of congress records are an individual congressman and all the councils. In chapter 3, the contents and sorts of main records are discribed, centering around congressmen and councils as the main sources of congress records. In chapter 4, the management of records of congressmen is issued as an urgent subject for the management of congress records, instead of conclusions.