• Title/Summary/Keyword: 컴퓨터 바이러스

Search Result 242, Processing Time 0.024 seconds

Realization of VR-linked "Wearing a Mask" SW training to recognize the effect of wearing a mask due to the spread of new infectious diseases (신종 감염병 확산에 따른 마스크 착용효과 인지를 위한 VR연동 "Wearing a Mask" SW교육 제안)

  • Seo, Hee-Cheol;Park, Yu-Min;Cho, Young-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.625-628
    • /
    • 2020
  • 현재 지구촌은 신종 감염병인 '코로나바이러스 감염증-19(COVID-19)로 인해 혼란을 겪고 있다. 우리나라의 경우 1만 명 이상 감염자가 발생하였으며, 사망자 역시 200여 명이 넘었다. 하지만 위와 같은 감염병을 치료하기 위한 백신은 계속 개발중에 있으며, 현재는 감염 예방 수칙으로 감염의 위험성에서 벗어나고 있는 실정이다. 또, 지구촌에 큰 혼란을 주었던 사스, 신종플루, 메르스와 같이 주로 호흡기를 통해 타인에게 전파되는 신종 감염병 출현 빈도 역시 계속 증가하고 있다. 이외에는 황사, 미세먼지에 관한 문제들로 인해 일상속에서 이뤄지는 생활 방역의 중요성이 대두되고 있는 상황이다. 본 논문에서는 생활 방역의 대표적 수칙인 마스크 착용에서 상황별 올바른 마스크 선택의 중요성을 알려주어 시민의식을 높일 수 있는 VR 연동 'Wearing a Mask' 구현에 대해 제안하고자 한다.

  • PDF

Harmful Traffic Control Using Sink Hole Routing (싱크홀 라우팅을 이용한 유해 트래픽 제어)

  • Chang, Moon-Soo;Lee, Jeong-Il;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.69-76
    • /
    • 2009
  • The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it's hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

A Safe Qperati ng Strategy for Information System of Small and Medium Enterprises (중소기업 정보시스템의 안정적 운영 전략)

  • Yeo, Sang-Soo;Hwang, Su-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.105-112
    • /
    • 2009
  • Small and medium enterprises have more dependency on their information technology than large enterprises have. but they can't pay much for information technology and information security due to financial restrictions, limited resources, and lack of know-how. So there are many vulnerabilities in small and medium enterprises and these would make many security incidents. Security managers of small and medium enterprises think that information security in their company is simply equivalent to updating the antivirus solutions. managing firewall, and patching systems regularly. However, security policies, prevention of information theft. business continuity, access controls, and many other information security issues should be considered for mitigating security incidents. In this context, we redefined security countermeasures and strategies which are only appropriate to large enterprises. for making them appropriate on a secure operating for information system of small and medium enterprises, and we investigate information security issues in the four views of information system and company, and finally we present information security strategies for each view, in this paper.

Implementation of Web-based Service Observation System(SOS) (웹기반 서비스 감시 시스템의 구현)

  • Cho, Seung-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.149-154
    • /
    • 2005
  • Computer center of university or company manages many non fault-tolerant servers and network devices to spare expenses. Because a service fault occurs sometimes by worm virus, system bug etc, we need a technique to detect it for continuing service. This paper introduces design and implementation of the system to observe many heterogeneous services, and web-based interface improving convenience of system manager. A system fault is reported to system managers via email or SMS by introduced service observation system, not service user. Then system managers can recover the system fault by this notification and minimize a fault period.

  • PDF

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Estimation and Classification of COVID-19 through Climate Change: Focusing on Weather Data since 2018 (기후변화를 통한 코로나바이러스감염증-19 추정 및 분류: 2018년도 이후 기상데이터를 중심으로)

  • Kim, Youn-Su;Chang, In-Hong;Song, Kwang-Yoon
    • Journal of Integrative Natural Science
    • /
    • v.14 no.2
    • /
    • pp.41-49
    • /
    • 2021
  • The causes of climate change are natural and artificial. Natural causes include changes in temperature and sunspot activities caused by changes in solar radiation due to large-scale volcanic activities, while artificial causes include increased greenhouse gas concentrations and land use changes. Studies have shown that excessive carbon use among artificial causes has accelerated global warming. Climate change is rapidly under way because of this. Due to climate change, the frequency and cycle of infectious disease viruses are greater and faster than before. Currently, the world is suffering greatly from coronavirus infection-19 (COVID-19). Korea is no exception. The first confirmed case occurred on January 20, 2020, and the number of infected people has steadily increased due to several waves since then, and many confirmed cases are occurring in 2021. In this study, we conduct a study on climate change before and after COVID-19 using weather data from Korea to determine whether climate change affects infectious disease viruses through logistic regression analysis. Based on this, we want to classify before and after COVID-19 through a logistic regression model to see how much classification rate we have. In addition, we compare monthly classification rates to see if there are seasonal classification differences.

Robust Head Pose Estimation for Masked Face Image via Data Augmentation (데이터 증강을 통한 마스크 착용 얼굴 이미지에 강인한 얼굴 자세추정)

  • Kyeongtak, Han;Sungeun, Hong
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.944-947
    • /
    • 2022
  • Due to the coronavirus pandemic, the wearing of a mask has been increasing worldwide; thus, the importance of image analysis on masked face images has become essential. Although head pose estimation can be applied to various face-related applications including driver attention, face frontalization, and gaze detection, few studies have been conducted to address the performance degradation caused by masked faces. This study proposes a new data augmentation that synthesizes the masked face, depending on the face image size and poses, which shows robust performance on BIWI benchmark dataset regardless of mask-wearing. Since the proposed scheme is not limited to the specific model, it can be utilized in various head pose estimation models.

Development of physical activity monitoring system using multiple motion sensors (다중모드 센서를 이용한 신체활동 모니터링 시스템 개발)

  • Lee, SeoYong;Park, ChaeEun;Jeong, DaSol;Choi, JaeHong;Kim, HwanSeog
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.147-149
    • /
    • 2020
  • 코로나바이러스의 세계 확산, 발병 이후 사람들의 실내활동 증가와 건강, 면역에 대한 관심은 많이 증가했다. 이에 맞춰 더욱 정교하고 바른 정보에 의한 스마트헬스케어 역시 관심이 증대되고 있다. 여기서 이야기하는 스마트헬스케어의 범위는 영상 장치를 비롯해 다양한 센서를 활용해 신체활동을 모니터링하고 분석하며 기존의 방식보다 더 객관적인 정보를 제공해 주는 것을 말한다. 위 기술과 대중의 관심을 바탕으로 하여 본 연구에서는 다중 모드 센서를 신체에 부착하여 신체활동을 모니터링 하는 시스템 개발을 목적으로 한다. 하드웨어 설계 부분에서 설계가 완성된 Arduino nano 33 Sense를 이용하여 스마트 헬스 실험 시간을 대폭 줄였다. 또한 운동과 같은 시계열 데이터를 분석하기 좋은 LSTM 기법을 채택하였으며, 개발된 모델을 추후 활용할 방안에 대해 논하였다.

  • PDF