• Title/Summary/Keyword: 적대적 공격

Search Result 86, Processing Time 0.024 seconds

A Study on Flaming Phenomena in Social Network: Content Analysis of Major Issues in Seoul Mayor Reelection in 2011 (소셜 네트워크 상에서의 플레밍(Flaming) 현상과 공론장의 가능성 - 2011년 서울시장 선거 이슈 분석 -)

  • Jho, Whasun;Kim, Jeongyeon
    • Informatization Policy
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2013
  • Rational debate and public conversation in the public sphere of social network are crucial conditions for realizing deliberative democracy. However, negative communication can occur online more frequently than in the real space, and mutually hostile messages are appearing. In the electoral process, citizens combining for particular candidates have made personal attacks against, abused and slandered the opposing candidates. Then, how and to what degree has the flaming behavior been appearing in the elections? Are there influencers to propagate the flaming behavior? And how flaming are these influencers, compared to internet users? This research focuses on the flaming behavior which occurred during the reelection for Seoul Mayor, in order to diagnose the role of social network as an online public sphere. This study analyzes the spreading degree of flaming messages depending on each issue, and the differences of messages between influencers and normal users. There was frequent flaming behaviors to distribute biased information which criticized, laughed at and maliciously attacked individual candidates. Moreover, influencers who advanced leading opinions, displayed a higher flaming degree than normal users.

  • PDF

Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker (스마트 스피커 대상 가청 주파수 대역을 활용한 적대적 명령어 공격 방법 제안)

  • Park, Tae-jun;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, the functions of smart speakers have diversified, and the penetration rate of smart speakers is increasing. As it becomes more widespread, various techniques have been proposed to cause anomalous behavior against smart speakers. Dolphin Attack, which causes anomalous behavior against the Voice Controllable System (VCS) during various attacks, is a representative method. With this method, a third party controls VCS using ultrasonic band (f>20kHz) without the user's recognition. However, since the method uses the ultrasonic band, it is necessary to install an ultrasonic speaker or an ultrasonic dedicated device which is capable of outputting an ultrasonic signal. In this paper, a smart speaker is controlled by generating an audio signal modulated at a frequency (18 to 20) which is difficult for a person to hear although it is in the human audible frequency band without installing an additional device, that is, an ultrasonic device. As a result with the method proposed in this paper, while humans could not recognize voice commands even in the audible band, it was possible to control the smart speaker with a probability of 82 to 96%.

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

Legal Status of Space Weaponization (우주공간에서의 무기배치와 사용의 법적 지위)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.247-276
    • /
    • 2017
  • The protection of space asset has been new major cause of space militarization. For such purpose, it has been officially announced that a policy of deterring and denying any adversaries from accessing the outer space. Space militarization is to be conversed into a new concept of space weaponization. The USA has announced its policy of space weaponization, while China and Russia have not revealed their plan or policy. Latter States, however, have proposed a draft treaty limiting the deployment of warfare in the outer space. The terms of the Outer Space Treaty, reflecting three significant United Nations General Assembly resolutions from the 1960s, support the position that ground rules must be observed in the exploration and the use of outer space, particularly in the absence of specific space law rules. Yet the combination (and culmination) of these two approaches to the legal regulation of outer space-specific rules as and when agreed by the international community and the translation of principles developed for terrestrial regulation to outer space-still leaves much room for uncertainty and exploitation for military and strategic purposes. As space weaponization may contribute to deterring the use of weapon, it may be not against the UN Charter Article 2(4). If space weaponization might generate the space debris such that the outer space is no more available for exploration and use, it is against the proportionality principle and discrimination principle enshrined in the laws of the war. But, if the limitation upon the kind and use of space weaponization is agreed among the States, then the space weaponization may not be against the laws of the war, and be considered permissible within the rationale of limited war.

  • PDF

A Case Study of Object detection via Generated image Using deep learning model based on image generation (딥 러닝 기반 이미지 생성 모델을 활용한 객체 인식 사례 연구)

  • Dabin Kang;Jisoo Hong;Jaehong Kim;Minji Song;Dong-hwi Kim;Sang-hyo Park
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.11a
    • /
    • pp.203-206
    • /
    • 2022
  • 본 논문에서는 생성된 이미지에 대한 YOLO 모델의 객체 인식의 성능을 확인하고 사례를 연구하는 것을 목적으로 한다. 최근 영상 처리 기술이 발전함에 따라 적대적 공격의 위험성이 증가하고, 이로 인해 객체 인식의 성능이 현저히 떨어질 수 있는 문제가 발생하고 있다. 본 연구에서는 앞서 언급한 문제를 해결하기 위해 text-to-image 모델을 활용하여 기존에 존재하지 않는 새로운 이미지를 생성하고, 생성된 이미지에 대한 객체 인식을 사례 별로 연구한다. 총 8가지의 동물 카테고리로 분류한 후 객체 인식 성능을 확인한 결과 86.46%의 정확도로 바운딩 박스를 생성하였고, 동물에 대한 116개의 60.41%의 정확도를 보여주었다.

  • PDF

Effects of IR Reduction Design on RCS of UCAV (IR 저감 설계가 무인전투기의 RCS에 미치는 영향)

  • Song, Dong-Geon;Yang, Byeong-Ju;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.4
    • /
    • pp.297-305
    • /
    • 2018
  • The role of UCAV is to carry out various missions in hostile situations such as penetration and attack on the enemy territory. To this end, application of RF stealth technology is indispensable so as not to be caught by enemy radar. The X-47B UCAV with blended wing body configuration is a representative aircraft in which modern RCS reduction schemes are heavily applied. In this study, a model UCAV was first designed based on the X-47B platform and then an extensive RCS analysis was conducted to the model UCAV in the high-frequency regime using the Ray Launching Geometrical Optics (RL-GO) method. In particular, the effects of configuration of UCAV considering IR reduction on RCS were investigated. Finally, the effects of RAM optimized for the air intake of the model UCAV were analyzed.

Abnormal Data Augmentation Method Using Perturbation Based on Hypersphere for Semi-Supervised Anomaly Detection (준 지도 이상 탐지 기법의 성능 향상을 위한 섭동을 활용한 초구 기반 비정상 데이터 증강 기법)

  • Jung, Byeonggil;Kwon, Junhyung;Min, Dongjun;Lee, Sangkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.647-660
    • /
    • 2022
  • Recent works demonstrate that the semi-supervised anomaly detection method functions quite well in the environment with normal data and some anomalous data. However, abnormal data shortages can occur in an environment where it is difficult to reserve anomalous data, such as an unknown attack in the cyber security fields. In this paper, we propose ADA-PH(Abnormal Data Augmentation Method using Perturbation based on Hypersphere), a novel anomalous data augmentation method that is applicable in an environment where abnormal data is insufficient to secure the performance of the semi-supervised anomaly detection method. ADA-PH generates abnormal data by perturbing samples located relatively far from the center of the hypersphere. With the network intrusion detection datasets where abnormal data is rare, ADA-PH shows 23.63% higher AUC performance than anomaly detection without data augmentation and even performs better than the other augmentation methods. Also, we further conduct quantitative and qualitative analysis on whether generated abnormal data is anomalous.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

The territorial behavior of the naked goby, Gobiosonia bosci, (Pisces: Gobiidae) (망둥어의 일종(一種), Gobiosoma bosci의 세력권점유(勢力圈占有) 생태(生態))

  • Seok, Kyu-Jin
    • Korean Journal of Ichthyology
    • /
    • v.5 no.2
    • /
    • pp.208-216
    • /
    • 1993
  • The territorial behavior of the naked goby, Gobiosoma bosci, was observed in 80-liter aquaria. Social behavior was observed for an extended time in daily observation periods. Individuals of G. bosci, regardless of size and sex, exhibited agonistic behavior. The aggresive behaviors of approaching, threatening, attacking, and fighting were recorded as agonistic behavior. All individuals are capable of changing their color and camouflaging themselves by matching the color of bottom. Especially, the resident and the intruder are of the same size, the fighting duration was prolonged and the variability of coloration was at its peak.

  • PDF

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF