• Title/Summary/Keyword: 적대적 공격

Search Result 78, Processing Time 0.023 seconds

The territorial behavior of the naked goby, Gobiosonia bosci, (Pisces: Gobiidae) (망둥어의 일종(一種), Gobiosoma bosci의 세력권점유(勢力圈占有) 생태(生態))

  • Seok, Kyu-Jin
    • Korean Journal of Ichthyology
    • /
    • v.5 no.2
    • /
    • pp.208-216
    • /
    • 1993
  • The territorial behavior of the naked goby, Gobiosoma bosci, was observed in 80-liter aquaria. Social behavior was observed for an extended time in daily observation periods. Individuals of G. bosci, regardless of size and sex, exhibited agonistic behavior. The aggresive behaviors of approaching, threatening, attacking, and fighting were recorded as agonistic behavior. All individuals are capable of changing their color and camouflaging themselves by matching the color of bottom. Especially, the resident and the intruder are of the same size, the fighting duration was prolonged and the variability of coloration was at its peak.

  • PDF

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning (강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구)

  • Jeongyoon Kim; Jongyoul Park;Sang Ho Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • With the development of ICT and network, security management of IT infrastructure that has grown in size is becoming very difficult. Many companies and public institutions are having difficulty managing system and network security. In addition, as the complexity of hardware and software grows, it is becoming almost impossible for a person to manage all security. Therefore, AI is essential for network security management. However, since it is very dangerous to operate an attack model in a real network environment, cybersecurity emulation research was conducted through reinforcement learning by implementing a real-life network environment. To this end, this study applied reinforcement learning to the network environment, and as the learning progressed, the agent accurately identified the vulnerability of the network. When a network vulnerability is detected through AI, automated customized response becomes possible.

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.

A Study on Character Storytelling for Children's TV Animation Based on Viewing Rate (시청률에 기반한 유아용 TV 애니메이션 캐릭터 스토리텔링 분석)

  • Kim, Seol-Ri;Kim, Nam-Hoon
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.79-85
    • /
    • 2017
  • Since Korea started producing original animations targeting children, market of character for children has been led by TV animation with continuous broadcasting and OSMU. With a successful fondation in animation toy industry, its market is expanding to film industry, at the same time, brings positive effect for benefit of domestic animation. Therefore, this study researched viewing rate of children's TV animation and analyzed character storytelling to help foster and grow the direction of future animation characters. For the analysis, I selected 20 animations with high viewing rate and analyzed the storytelling of 95 characters based on their roles. The results of this study are as follows: in children's animation appeared various types of characters helping each other to make the viewer learn socializing. In addition, character's external setting varied depending on its role. Moreover, in the characters' internal setting, the most frequently appeared keyword was leadership, however, their personality keyword varied depending on the role.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.

A study on the changes of the Screen quota system as a Film policy in Korea (한국의 영화정책과 스크린 쿼터제의 변천에 대한 연구)

  • Cho, Hee-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.982-991
    • /
    • 2006
  • The screen quota system is one of the most controversial issues in the Korean film industry. There are two different points of view regarding the system. Some say it is highly effective to protect and nurture Korean movies. However, others argue that it hurts the duality of the Korean movies. The number of days, for which Korean movies have to play on local screens, has been reduced to 73, starting on July 1st, 2006. Actually, it is 50 percent fewer than the previous year. In facL Korea has implemented the screen quota. system two times. First, it was practiced from 1935 to 1945, during the Japanese colonial period. This was to regulate imported movies, especially American ones, as the Japanese government was to use movies for the political propaganda. In 1935, the number of foreign movies screened had to be less than three fourths of the total. And they gradually reduced the size by two thirds in 1936, and again by half in 1937. After the attack on Pearl Harbor when the Pacific War happened, Japan completely banned importing American movies in Korea. The reason why it regulated the imported foreign films is to increase the number of domestic movies, both Japanese and Korean. It was for making propaganda films fur carrying the war. The second practice of the screen quota is from 1967 to the present year. It was designed to boom the Korean film industry. However, the competitive power of Korean films has not been improved in spite of the practice of the system. Moreover, the film industry has gone through the depression. Korean film agencies have occupied the Korean film market thanks to the protection by government. The founding of the film agencies has been strongly regulated. So has importing foreign movies. Under the special protection like this, Korean film agencies have been enjoying the monopoly In the mean time, they have pursued income not by making quality movies but by importing foreign movies. As a result, cinema audiences turn away form Korean films and prefer foreign movies. Furthermore, the screen quota system hurts the relationship between film producers and distributors, imposing the duties only on theaters. In short, the screen quota system has satisfied neither film producers, theater runners, nor film goers. In other words. the excessive protection has weakened the competitive power of Korean film industry.

  • PDF

A Study on North Korea's Nuclear Posture Based on India and Pakistan Case Analysis (인도와 파키스탄 사례 분석에 따른 북한의 핵태세 연구)

  • Cho YongSung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.299-304
    • /
    • 2024
  • Beyond the first nuclear age, which pitted the United States and the Soviet Union against each other, we are now in the second nuclear age, in which the decision-makers of nuclear weapons are diversified among countries large and small. India and Pakistan, two such countries, are antagonistic toward each other and possess nuclear weapons, but their nuclear posture and nuclear strategies are different. The examples of these two countries can provide clues to the future nuclear posture of North Korea, which faces South Korea. In particular, Pakistan's chosen posture of pre-emptive deterrence is a highly offensive nuclear posture that threatens to use nuclear weapons against an adversary to deter aggression. This is an option that can be accomplished even with a small nuclear arsenal that can be used as a first strike, so it seems to be the optimal posture for a nuclear-powered Pakistan to choose in response to an Indian threat. North Korea, which is outgunned by the United States and South Korea, is likely to continue to threaten to use nuclear weapons preemptively like Pakistan. However, it is expected to be defensive and quite conservative, like India, until it actually uses them to maintain its regime.