• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.025 seconds

An analysis study on the quality of article to improve the performance of hate comments discrimination (악성댓글 판별의 성능 향상을 위한 품사 자질에 대한 분석 연구)

  • Kim, Hyoung Ju;Min, Moon Jong;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.71-79
    • /
    • 2021
  • One of the social aspects that changes as the use of the Internet becomes widespread is communication in online space. In the past, only one-on-one conversations were possible remotely, except when they were physically in the same space, but nowadays, technology has been developed to enable communication with a large number of people remotely through bulletin boards, communities, and social network services. Due to the development of such information and communication networks, life becomes more convenient, and at the same time, the damage caused by rapid information exchange is also constantly increasing. Recently, cyber crimes such as sending sexual messages or personal attacks to certain people with recognition on the Internet, such as not only entertainers but also influencers, have occurred, and some of those exposed to these cybercrime have committed suicide. In this paper, in order to reduce the damage caused by malicious comments, research a method for improving the performance of discriminate malicious comments through feature extraction based on parts-of-speech.

Implementation of Exclusive OR-Based Video Streaming System (배타적 논리합 기반 비디오 스트리밍 시스템의 구현)

  • Lee, Jeong-Min;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1091-1097
    • /
    • 2022
  • In this paper, we implement the eXclusive OR-based Cast (XC) system that is a video streaming system using exclusive OR operations, and measure various performance metrics in wireless local area network (WLAN) environments. In addition, we investigate the performance improvement of the XC system considering various practical video streaming environments, while conventional studies analyzed the performance of XC through computer simulations in limited environments. To this end, we propose new control messages such as STR_REQ_MSG (SRM) that clients transmit to a video streaming server and STR_CON_MSG (SCM) that is used for the video streaming server to control the clients, and develop a new protocol by using the new control messages. According to the various measurement results using the implemented XC system, XC video streaming system can reduce the consumption of network bandwidth by 8.6% on average and up to 25% compared to the conventional video streaming system. In addition, the outage probability can be also reduced up to 76%.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

Exploiting Spatial Reuse Opportunity with Power Control in loco parentis Tree Topology of Low-power and Wide-area Networks (대부모 트리 구조의 저 전력 광역 네트워크를 위한 전력 제어 기반의 공간 재사용 기회 향상 기법)

  • Byeon, Seunggyu;Kim, Jong Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.239-250
    • /
    • 2022
  • LoRa is a physical layer technology designed to secure highly reliable long-range communication with introducing loco parentis tree network and chirp spreading spectrum. Since since a leaf can send message to more than one parents simultaneously with a single transmission in a region, packet delivery ratio increases logarithmically as the number of gateways increases. The delivery ratio, however, dramatically collapses even under loco parentis tree topology due to the limitations of ALOHA-like primitive MAC, . The proposed method is intended to exploit SDMA approach to reuse frequency in an area. With the view, TxPower of each sender for each message in a concurrent transmission is elaborately controlled to survive the collision at different gateway. Thus, the gain from the capture effect improves the capacity of resource-hungry Low Power and Wide Area Networks.

Evaluation and Comparative Analysis of Scalability and Fault Tolerance for Practical Byzantine Fault Tolerant based Blockchain (프랙티컬 비잔틴 장애 허용 기반 블록체인의 확장성과 내결함성 평가 및 비교분석)

  • Lee, Eun-Young;Kim, Nam-Ryeong;Han, Chae-Rim;Lee, Il-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.271-277
    • /
    • 2022
  • PBFT (Practical Byzantine Fault Tolerant) is a consensus algorithm that can achieve consensus by resolving unintentional and intentional faults in a distributed network environment and can guarantee high performance and absolute finality. However, as the size of the network increases, the network load also increases due to message broadcasting that repeatedly occurs during the consensus process. Due to the characteristics of the PBFT algorithm, it is suitable for small/private blockchain, but there is a limit to its application to large/public blockchain. Because PBFT affects the performance of blockchain networks, the industry should test whether PBFT is suitable for products and services, and academia needs a unified evaluation metric and technology for PBFT performance improvement research. In this paper, quantitative evaluation metrics and evaluation frameworks that can evaluate PBFT family consensus algorithms are studied. In addition, the throughput, latency, and fault tolerance of PBFT are evaluated using the proposed PBFT evaluation framework.

A Design of DDoS Attack Detection Scheme Using Traffic Analysis and IP Extraction in SIP Network (SIP망에서 트래픽 측정 및 IP 추출을 통한 DDoS공격 탐지 기법 설계)

  • Yun, Sung-Yeol;Sim, Yong-Hoon;Park, Seok-Cheon
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.729-732
    • /
    • 2010
  • 통신망의 발달로 다양한 인터넷 기반 기술들이 등장함에 따라 현재는 데이터뿐만 아닌 음성에 대한 부분도 IP 네트워크를 통해 전송하려는 움직임이 발판이 되어 VoIP(Voice Over Internet Protocol)라는 기술이 등장하였다. SIP(Session Initiation Protocol) 프로토콜 기반 VoIP 서비스는 통신 절감 효과가 큰 장점과 동시에 다양한 부가서비스를 제공하여 사용자 수가 급증하고 있다. VoIP 서비스는 호(Call)를 제어하기 위해 SIP 기반으로 구성이 되며, SIP 프로토콜은 IP 망을 이용하여 다양한 음성과 멀티미디어 서비스를 제공하게 되는데 IP 프로토콜에서 발생하는 인터넷 보안 취약점을 그대로 동반하기 때문에 DoS(Denial of Service) 및 DDoS(Distribute Denial of Service)에 취약한 성향을 가지고 있다. DDoS 공격은 단시간 내에 대량의 패킷을 타깃 호스트 또는 네트워크에 전송하여 네트워크 접속 및 서비스 기능을 정상적으로 작동하지 못하게 하거나 시스템의 고장을 유도하게 된다. 인터넷 기반 생활이 일상화 되어 있는 현 시점에서 안전한 네트워크 환경을 만들기 위해 DDoS 공격에 대한 대응 방안이 시급한 시점이다. DDoS 공격에 대한 탐지는 매우 어렵기 때문에 근본적인 대책 마련에 대한 연구가 필요하며, 정상적인 트래픽 및 악의적인 트래픽에 대한 탐지 시스템 개발이 절실히 요구되는 사항이다. 본 논문에서는 SIP 프로토콜 및 공격기법에 대해 조사하고, DoS와 DDoS 공격에 대한 특성 및 종류에 대해 조사하였으며, SIP를 이용한 VoIP 서비스에서 IP 분류와 메시지 중복 검열을 통한 DDoS 공격 탐지기법을 제안한다.

A Study on the Analysis of Policy PR Content Using Digital Platform - Focusing on YouTube Analysis by Five Government Departments (디지털 플랫폼을 이용한 정책 홍보 내용분석 연구 정부 5개 부처의 유튜브 분석을 중심으로)

  • Yu, Hyun-Joong;Jeong, Hyeon Ju;Kim, Won-Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.595-603
    • /
    • 2023
  • Recently, many public institutions have been conducting promotional activities using digital platforms. Communication methods using digital platforms have a very important meaning in that they can create new values that did not exist before by connecting and sharing information with various users. To this end, we tried to analyze YouTube videos of five government ministries and examine them. As a result of YouTube analysis by government ministries, most of them were mainly used as channels for policy promotion, and many were used as channels for new information. Although the message is delivered through the production of various contents, it was possible to look at cases where the target as a channel for communication was not clear and the purpose was unclear. In order to communicate with the people, it should be used as a channel for communication through content suitable for clear target setting and purpose.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

Development of Learning Program using Chinese Whispers Game(Broken Telephone Game) for Systematic Assessment and Reporting of Patients and Exploration on Learners' Experiences (속삭임게임을 활용한 체계적 환자사정 및 보고 교육프로그램의 개발 및 학습자 경험탐색)

  • Jung, Hyun-Jung
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.143-153
    • /
    • 2019
  • In order to save lives by recognizing the deteriorating changes of the patients, patient's assessment and reporting should be foundation, but this task is mainly delegated to nursing students or inexperienced nurses. A whisper game is a game in which the first person whisper selects a word, phrase or sentence and delivers it to the team member and finally confirms how many original message have changed during the transmit process. The purpose of this study was to develop a whisper game program to transmit the information of the children included in the DVD using in the pediatric advanced life support process. After four times of games, the experiences of 31 nursing students in the fourth grade were explored by analyzing the reflective journal. The results of the study showed three themes: learning motivation, metacognitive ability, and situated contextual learning. Repeated practice through a whisper game is expected to be widely used because it has been identified as a fresh and interesting learning method that enables nursing students to metacognize the process of assessing patients and conveying information in the contextual situation.

Pattern recognition and AI education system design for improving achievement of non-face-to-face (e-learning) education (비대면(이러닝) 교육 성취도 향상을 위한 패턴인식 및 AI교육 시스템 설계)

  • Lee, Hae-in;Kim, Eui-Jeong;Chung, Jong-In;Kim, Chang Suk;Kang, Shin-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.329-332
    • /
    • 2022
  • This study aims to identify problems with existing e-learning content and non-face-to-face class methods, improve students' concentration, improve class achievement and educational effectiveness, and propose an artificial intelligence class system design using a web server. By using the function of face and eye tracking using OpenCV to identify attendance and concentration, and by inducing feedback through voice or message to questions asked by the instructor in the middle of class, learners relieve boredom caused by online classes and test by runner If the score is not reached, we propose an artificial intelligence education program system design that can bridge the academic gap and improve academic achievement by providing educational materials and videos for the wrong problem.

  • PDF