• Title/Summary/Keyword: 인터넷 유형

Search Result 1,012, Processing Time 0.028 seconds

Security Framework for Improving the Performance of the Malicious Process Control System (악성 프로세스 제어 시스템의 성능 향상을 위한 보안 프레임워크)

  • Kim, Iksu;Choi, Jongmyung
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.61-71
    • /
    • 2013
  • Until now, there have been various studies against Internet worms. Most of intrusion detection and prevention systems against Internet worms use detection rules, but these systems cannot respond to new Internet worms. For this reason, a malicious process control system which uses the fact that Internet worms multicast malicious packets was proposed. However, the greater the number of servers to be protected increases the cost of the malicious process control system, and the probability of detecting Internet worms attacking only some predetermined IP addresses is low. This paper presents a security framework that can reduce the cost of the malicious process control system and increase the probability of detecting Internet worms attacking only some predetermined IP addresses. In the proposed security framework, virtual machines are used to reduce the cost of control servers and unused IP addresses are used to increase the probability of detecting Internet worms attacking only some predetermined IP addresses. Therefore the proposed security framework can effectively respond to a variety of new Internet worms at lower cost.

Matching Fidelity Calculation System with Weighted MBTI Match Type (MBTI 일치유형에 가중치를 부여한 매칭 적합도 산출 시스템)

  • Kim, Sung-Ho;Kwun, Ou-Bong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.1-11
    • /
    • 2018
  • This paper consider the MBTI match type in order to meet the customer's dating in internet and online. The MBTI match type is confirmed through appropriate surveys and identifies the appropriate type of preference for each type. The preference type is different according to each MBTI type, and even though the same preference type is used, the preference type of each of men and women is different. In order to solve these problems, the preference type of each man and woman is weighted, and the weighted weights are used to calculate the fitness between the two. The system that weights the MBTI match type is highly likely to match in an online dating system because it uses the social human nature of people, and can be used in interpersonal relationship systems and teaching and learning systems and calibration systems.

인터넷광고에 대한 태도와 효과성에 있어 라이프스타일의 조절효과에 관한 연구

  • Kim, Gyeong-Hun;Park, Jin-Yong;Kim, Dong-Yul;Mun, Hak-Il
    • Journal of Global Scholars of Marketing Science
    • /
    • v.6
    • /
    • pp.233-260
    • /
    • 2000
  • 본 연구의 목적은 (1) 인터넷환경하에서 인터넷광고에 대한 태도와 인터넷광고의 효과성 간의 효과를 검증하고, (2) 인터넷광고에 대한 태도와 인터넷광고의 효과성간의 관계에 대 한 인터넷사용자의 라이프스타일의 조절효과를 검증하는 것이다. 이를 위해 광고에 대한 태도연구와 효과성에 관한 선행연구를 통해 두 번수간외 관계성올 알아보았으며, 이는 인터넷 환경하에서도 적용되는지를 알아보기 위한 가설을 설정하였다. 실증분석을 통한 결과는 인터넷광고에 대한 태도는 권유의도, 고려의도, 재방문의도, 구 매의도에 정(+)의 영향을 미치는 것으로 나타났으며 인터넷시장에서 인터넷광고에 대한 태 도와 인터넷광고의 효과성은 전통적인 시장에서와 같이 동일하게 작용되었다. 두 번째로 인터넷사용자들의 라이프스타일에 따라 차이가 있을 것이라는 연구가설을 여섯 개의 유형 으로 나누어 연구한 결과 인터넷광고에 대한 태도와 구매의도간에는 인터넷사용자들의 라 이프스타일 유형에 따라 차이가 있는 것으로 나타났다.

  • PDF

위기를 기회로 바꾸는 인터넷 비즈니스 총정리

  • Ju, Jeong-Han
    • Digital Contents
    • /
    • no.7 s.62
    • /
    • pp.100-105
    • /
    • 1998
  • 비즈니스의 '핵'으로 부상한 인터넷. 국내 기업중 약 7만개의 홈페이지가 이미 개설되는 등 인터넷 진출이 눈에 띄게 증가하고 있다. 이처럼 기업 및 상업주체들이 인터넷 비즈니스에 열을 올리는 이유는 무엇일까? 또 무한대에 가까운 인터넷 비즈니스의 유형은 과연 어떤 것들이 있을까?

  • PDF

A Study on the Streaming-Friendly Game Design and Suggestion of Game Planning Guidelines through the Analysis of Game Streaming (인터넷 게임 방송 분석을 통한 방송 친화적 게임 디자인 연구와 게임 기획 가이드라인 제시)

  • Kim, Young-Bum;Sohn, Kee-Hoon;Lee, Taek-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.538-547
    • /
    • 2021
  • This study seeks to derive game design elements that turn out game streaming-friendly through the analysis of Internet game streaming. To this end, this study surveyed previous studies on the motivation of watching internet game broadcasting and simplified the motivations to 'Expertise' and 'Amusement', the goal that game streaming should aim for, and divided streamer's streaming types into 'Reviewer', 'Master', 'Entertainer' and 'Acrobat' by those two options. Based on the categories, this study analyzed game streaming videos of various genres and confirmed that both the number of videos and the number of views by the streaming type were the highest in the 'Acrobat' group. In addition, the analysis shows that and revealed different figures by the type although they belong to the similar genre. By comparing and analyzing the systems and content elements of the two games, this study identified 's advantages in three points-Fortune, Setup Time, Control View- and finally suggested some guidelines for streaming-friendly game planning.

A Study on Internet Advertisement Injection (인터넷 광고 인젝션 유형에 대한 연구)

  • Cho, Sanghyun;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • Online advertisement has many benefits comparing to offline advertisement but it also has many challenging problems by online ad abuses. Advertisement injection (Ad injection) is one of the threats that surreptitiously inserts advertisements without a permission of site owners. Users are exposed to additional ads and redundant web traffic by injected ads can cause a service quality problem. Moreover, advertisers can have economic loss when injected ads are different from original ones. Although ad injection leads to these problems it has not been fully studied yet. A few ad injection researches are done by online advertising providers such as Google. In this paper, we analyze ad injection activities to Korean major portal, Naver. We classify 6 types of ad injections and describe their characteristics by analyzing 27 downloaders and 199 installed programs.

A Study on the Preferred Content Types using Mobile Internet Service in Korea and China (모바일 인터넷 서비스 사용자의 특성과 콘텐츠 선호 유형에 관한 연구 : 한국과 중국의 휴대폰 사용자를 중심으로)

  • Woo, Ji-E.;Kim, Yoo-Jung;Yoon, Jong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.203-214
    • /
    • 2007
  • The global mobile Internet service market is growing very rapidly, shooing drastic increases in its sales volume. Despite this growth of the market, it has not yet reached its full-grown stage, and this calls for a study on the service preference based on the characteristics of the users. As most of the existing studies in this area have centered on its technical features, they fall short of providing to the related companies any useful data to which they can practically refer in developing the future mobile services that suit for various user needs, and making plans to increase the sales volume. Based on these circumstances, this study is to investigate how the mobile contents preference is differed in accordance with the user characteristics of the Korean and Chinese mobile Internet service users. This study is also to analyze how the relationship between the user characteristics and the preferred mobile contents types is moderated by nations, Korea and Chinese. To accomplish these research purposes, this study developed a set of research model and hypotheses based on a comprehensive review of the related studies. To prove the research hypotheses, this study conducted a survey among the Korean and Chinese nubile Internet service users and performed a variety of analyses of the data collected including the questionnaires, using the SAS version 9.

  • PDF

HTTP Traffic Based Anomaly Detection System (HTTP 트래픽 기반의 비정상행위 탐지 시스템)

  • Kim Hyo-Nam;Jang Sung-Min;Won Yu-Hun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.313-315
    • /
    • 2006
  • 최근 인터넷 공격은 웹 서비스 환경에서 다양한 공격 유형들이 인터넷상에서 나타나고 있는 실정이다. 특히 인터넷 웜이나 기타 알려지지 않은 공격이 대중을 이루고 있어 기존의 정보 보호 기술로는 한계에 다다르고 있으며 이미 알려진 공격을 탐지하는 오용탐지 기술로는 적절하게 대응하기 어려워진 상태이다. 또한, 웹 서비스 이용이 확대되고 사용자 요구에 맞게 변화하면서 인터넷상의 노출된 웹 서비스는 공격자들에게 있어 주공격 대상이 되고 있다. 본 논문에서는 웹 기반의 트래픽 유형을 분석하고 각 유형에 따른 이상 징후를 파악할 수 있는 비정상 탐지 모델을 정의하여 정상 트래픽 모델과 비교함으로써 현재 트래픽의 이상 정도를 평가하고 탐지 및 규칙생성, 추가하는 HTTP 트래픽 기반의 비정상행위 탐지 시스템을 설계하고 구현하였다.

  • PDF

Cyber Attack Type and CERT (인터넷 침해유형과 대응조직)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.911-914
    • /
    • 2014
  • The internet is established as the basic infrastructure of our life and we live in cyberspace on internet, and additionally many problems on cyberspace arise. One among them is the most serious cyber attack of the information society. The cyber attacks increase each year, attack type and the intelligence is evolving, and then the cyber ecosystem is getting more complicated. In this study, we analyze the Internet last incident status and type of Internet invasion and hacking methods, and analyze the corresponding national and international organizations and associations active status.

  • PDF