• Title/Summary/Keyword: 인지된 범죄

Search Result 84, Processing Time 0.033 seconds

A Study of Detecting Malicious Files using Similarity between Machine Code in Deleted File Slices (삭제된 파일 조각에서 기계어 코드 유사도를 이용한 악의적인 파일 탐지에 대한 연구)

  • Lee, Dong-Ju;Lee, Suk-Bong;Kim, Min-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.81-93
    • /
    • 2006
  • A file system is an evidence resource of cyber crime in computer forensics. Therefore the methods of recovering the file system and searching important information have been offered. However, the methods for finding a malicious fie in free blocks or slack spaces have not been suggested. In this paper, we propose an investigation method to find a maliciously executable fragmented file. After estimating if a file is executable with a machine code rate, we conclude it could be malicious by comparing a similarity of instruction sequences. To examine instruction sequences, we also propose a method of profiling malicious files using file and a method of comparing the continued scores. As the results, we could exactly pick out the malicious execution files, such as buffer overflow attack program, at fitting threshold level.

Explaining Variance in Children's Recall of a Stressful Experience: Influence of Cognitive and Emotional Individual Differences (스트레스적 경험에 대한 아동 기억의 신뢰성과 인지 및 정서적 개인차 특성들과의 관계)

  • Seungjin Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.3
    • /
    • pp.343-365
    • /
    • 2013
  • This study examined the effects of various individual differences on children's memory of a stressful experience. The participants for the current study were children (N=85) aged 4-9 years those who experienced a naturally occurring stressful experience from a dental procedure. There was overall negative relation between the level of stress and children's memory performance. However, more interestingly, the results of this study provided some further evidence that several cognitive (i.e., receptive language ability and working memory capacity) and emotional (i.e., children's general anxiety condition, children's self-report of pain and anxiety about the event) individual difference factors were associated with variations in children's remembering across ages. The results suggest that the relation between stress and children's memory might be impacted in part by children's various individual characteristics. Furthermore, the findings are discussed in the applied context that based on the results clinical and legal professionals can tailor interviews to best meet children's needs and capabilities, and create developmentally and individually sensitive guidelines for interviewing children in the legal system.

  • PDF

A Study on the Early Response System Subway Cabin Arson Fire (지하철 차량 방화사고 초기대응에 관한 연구)

  • Roh, Sam-Kew;Ham, Eun-Gu;Kim, Si-Gon
    • Fire Science and Engineering
    • /
    • v.20 no.2 s.62
    • /
    • pp.21-30
    • /
    • 2006
  • Since Daegu subway arson fire disaster in 2003, there have been several copycat crimes such as at Seoul Metro line number seven and Hongkong Chuiwan line cases. Oil and gas were used for fire propagation in most cases as in Daegu case and such fire could be expanded to a whole subway cabin within several minutes. The fire may eventually cause the whole subway system stop. Fire damage can be minimized when fire occurrence and diffusion are blocked by stages or isolated rapidly. This study suggests an effective early response system that separates passengers from fire and a real-time fire extinguishment program by stages. Based on the subway arson case studies, the early response scenario has been structured by three stages, i.e., confirmation of fire and damage, early fire extinguishment, and information dissemination and passengers evacuation.

A Study of Realtime Malware URL Detection & Prevention in Mobile Environment (모바일 환경에서 실시간 악성코드 URL 탐지 및 차단 연구)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • In this paper, we propose malware database in mobile memory for realtime malware URL detection and we support realtime malware URL detection engine, that is control the web service for more secure mobile service. Recently, mobile malware is on the rise and to be new threat on mobile environment. In particular the mobile characteristics, the damage of malware is more important, because it leads to monetary damages for the user. There are many researches in cybercriminals prevention and malware detection, but it is still insufficient. Additionally we propose the method for prevention Smishing within SMS, MMS. In the near future, mobile venders must build the secure mobile environment with fundamental measures based on our research.

Study on the Combustion Characteristics of Flammable materials and Combustion Accelerants in an Arson (방화 범죄에서 가연성 물질과 연소촉진제의 연소 특성에 관한 연구)

  • Park, Hye-Jeong;Nam, Ki-Hun;Kim, Kwang-Il
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.7-11
    • /
    • 2017
  • The purpose of this study is to recognize the necessity for the management of the available materials in cases of arsons and to prevent arson gaining an understanding of the combustion characteristics of the flammable materials and combustion accelerants in arson cases. We investigated and analyzed the statistical data on arsons and selected flammable materials (wood, paper, synthetic textiles, synthetic resins), and combustion accelerants (gasoline, diesel, solvent) that are frequently used in cases of arson. We conducted a thermogravimetric analysis to assess the thermal properties of the flammable materials. Also, we conducted burning and flame spread rate tests for the purpose of comparing and analyzing the combustion characteristics of the flammable materials and combustion accelerants.

Pattern Generation Technique for Network-based Intrusion Detection using Association Rules (연관 규칙을 이용한 네트워크 기반 침입 탐지 패턴생성 기술)

  • Soh, Jin;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.619-621
    • /
    • 2002
  • 네트워크 기반 컴퓨터 시스템은 현대사회에 있어서 매우 중요한 역할을 담당하고 있기 때문에 이들은 정보 범죄들로부터 안정적이면서 효율적인 환경을 제공하는 것은 매우 중요한 일이다. 현재의 침입탐지 시스템은 네트워크 상에서 지속적으로 처리되는 대량의 패킷에 대하여 탐지속도가 떨어지고, 새로운 침입유형에 대한 대응방법이나 인지능력에도 한계가 있기 때문이다. 따라서 다양한 트래픽 속에서 탐지율을 높이고 탐지속도를 개선하기 위한 방안이 필요하다. 본 논문에서는 침입탐지 능력을 개선하기 위해 먼저, 광범위한 침입항목들에 대한 탐지 적용기술을 학습하고, 데이터 마이닝 기법을 이용하여 침입패턴 인식능력 및 새로운 패턴을 생성하는 적용기술을 제안하고자 한다. 침입 패턴생성을 위해 각 네트워크에 돌아다니는 관련된 패킷 정보와 호스트 세션에 기록되어진 자료를 필터링하고, 각종 로그 화일을 추출하는 프로그램들을 활용하여 침입과 일반적인 행동들을 분류하여 규칙들을 생성하였다. 마이닝 기법으로는 학습된 항목들에 대한 연관 규칙을 찾기 위한 연역적 알고리즘을 이용하였다. 또한, 추출 분석된 자료는 리눅스기반의 환경 하에서 다양하게 모아진 네트워크 로그파일들을 본 논문에서 제안한 방법에 따라 적용한 결과이다.

  • PDF

A Study on the Development of a Technology to Improve Anger Coping Strategies Using Location-based Service (위치기반 서비스를 활용한 분노대처 능력 향상 서비스 기술개발에 관한연구)

  • Lee, Pung-Sam;Lee, Yun-Gil
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.9
    • /
    • pp.289-296
    • /
    • 2017
  • Anger cause heart disease and domestic violence and recently there have been an increasing number of media reports of crimes committed because of their inability to control their anger. Anger has been reported to cause massive financial losses due to heart disease and domestic violence. Therefore, since anger raises serious social problems and social costs, it is necessary to take active intervention methods to alleviate inappropriate anger coping. A variety of methods such as cognitive and emotional approach, psycho-mechanical approach, psycho-educational approach, relaxation therapy, cognitive behavior-art therapy, and stress immunization are being explored and utilized for presenting effective anger-coping intervention alternatives. In this manner, information and communication technology is likely to be used as an effective means for this, and various researches are being conducted. The purpose of this study is to develop an anger coping service technology using ICT (Information & Communication Technology) technology as an effort to improve anger coping ability. In other words, the goal is to develop a technology that delays anger and evokes the surroundings by providing location-based services to recognize anger situations and facilitate anger. This research is about the technology which intervene directly the anger situation to resolve it using location information and introduce the base technology to realize it.

Current Status of Response to Digital Child Sexual Slavery and Comparative Analysis of Overseas Crime Prediction System Using Artificial Intelligence (디지털 아동 성착취 대응현황과 해외 인공지능 범죄 예측 시스템 비교분석)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.357-368
    • /
    • 2020
  • This study identifies the aspects and characteristics of 'Digital Sexual Crimes' that changed rapidly in recent years. It has identified the so-called "Telegram sexual harassment and exploitation" incident on the front page. We also want to analyze this and draw up policy suggestions that can help prepare social measures. In the wake of the Telegram sexual exploitation scandal, The National Assembly is quickly proposing related bills. However, the reality is that even a clear concept and definition of "Digital sexual Crimes" have not been made yet. The effective support system for victims is also insufficient. Therefore, this paper examines the definition and concept of child sexual exploitation and harassment. We will look at the features, causes, and conditions. In addition, it will examine the current status of Digital Sexual Crimes distribution and deletion of domestic, foreign platforms. Major foreign countries, including the U. S. A. refer to cases in which big data and artificial intelligence technologies are actively used to protect victims and track perpetrators.

Implementation of Video-Forensic System for Extraction of Violent Scene in Elevator (엘리베이터 내의 폭행 추출을 위한 영상포렌식 시스템 구현)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2427-2432
    • /
    • 2014
  • Color-$X^2$ is used as a method for scene change detection. It extracts a violent scene in an elevator and then could be used for real-time surveillance of criminal acts. The scene could be also used to secure after-discovered evidences and to prove analysis processes. Video Forensic is defined as a research on various methods to efficiently analyze evidences upon crime-related visual images in the field of digital forensic. The method to use differences of color-histogram detects the difference values of histogram for RGB color from two frames respectively. Our paper uses Color-$X^2$ histogram that is composed of merits of color histogram and ones of $X^2$ histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing Color-$X^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.