• Title/Summary/Keyword: 컴퓨터 바이러스

Search Result 242, Processing Time 0.021 seconds

Classification of Malicious Web Pages by Using SVM (SVM을 활용한 악성 웹 페이지 분류)

  • Hwang, Young-Sup;Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.77-83
    • /
    • 2012
  • As web pages provide various services, the distribution of malware via the web pages is being also increased. Malware can make personal information leak, system mal-function and system be zombie. To protect this damages, we should block the malicious web pages. Because the malicious codes embedded in web pages are obfuscated or transformed, it is difficult to detect them using signature-based approaches which are used by current anti-virus software. To overcome this problem, we extracted features to classify malicious web pages and benign ones by analyzing web pages. And we propose a classification method using SVM which is widely used in machine learning. Experimental results show that the proposed method is better than other methods. The proposed method could classify malicious web pages correctly and be helpful to block the distribution of malicious codes.

A Study on the Countermeasures of Cyber Crimes Among Nations - Focusing on the Global Governance - (국가간 사이버범죄 대응체제 구축에 관한 연구 - 글로벌 거버넌스적 측면에서 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.307-318
    • /
    • 2005
  • Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. It was not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.

  • PDF

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

A intelligent network weather map framework using mobile agent (이동 에이전트 기반 지능형 네트워크 weather map 프레임워크)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.203-211
    • /
    • 2006
  • Today, Internet covers a world wide range and most appliances of our life are linked to network from enterprise server to household electric appliance. Therefore, the importances of administrable framework that can grasp network state by real-time is increasing day by day. Our objective in this paper is to describe a network weather report framework that monitors network traffic and performance state to report a network situation including traffic status in real-time. We also describe a mobile agent architecture that collects state information in each network segment. The framework could inform a network manager of the network situation. Through the framework. network manager accumulates network data and increases network operating efficiency.

  • PDF

COVID-19 Lung CT Image Recognition (COVID-19 폐 CT 이미지 인식)

  • Su, Jingjie;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.529-536
    • /
    • 2022
  • In the past two years, Severe Acute Respiratory Syndrome Coronavirus-2(SARS-CoV-2) has been hitting more and more to people. This paper proposes a novel U-Net Convolutional Neural Network to classify and segment COVID-19 lung CT images, which contains Sub Coding Block (SCB), Atrous Spatial Pyramid Pooling(ASPP) and Attention Gate(AG). Three different models such as FCN, U-Net and U-Net-SCB are designed to compare the proposed model and the best optimizer and atrous rate are chosen for the proposed model. The simulation results show that the proposed U-Net-MMFE has the best Dice segmentation coefficient of 94.79% for the COVID-19 CT scan digital image dataset compared with other segmentation models when atrous rate is 12 and the optimizer is Adam.

Related Factors to Korean Hospital Nurses in Burnout during the COVID-19 outbreak: A Systematic Review

  • Park, SoonYoung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.123-130
    • /
    • 2022
  • In this paper, we propose a crucial issue to require further management plan for Korean hospital nurses in burnout during COVID-19 pandemic. The purpose of this study was to conduct a systematic review of factors related to hospital nurses in burnout for the COVID-19 outbreak. Appropriate studies in the recent three years were selected from database. To perform a systematic review, the databases of RISS, KISS, DBPIA, and Kyobo scholar were searched using the key words, 'nurse in burnout' or 'burnout for nurse'. Fifty-five references were checked, but only seven studies were decided inclusion criteria to review. It was founded that Korean hospital nurses felt moderate or higher burnout level for COVID-19 pandemic. We were confirmed that related factors of hospital nurses in burnout were personal characteristics, physical symptom, depression, compassion satisfaction, compassion fatigue, and resilience, and occupational characteristics, shift work and job stress. It may be necessary to provide regulating programs for hospital nurses in burnout and to set up a policy and guidelines so as to reduce burnout of nurses working.

A Study on the Status of Non-face-to-face software education (비대면 원격 소프트웨어교육의 실태 연구)

  • Moon, Juyoung;Shin, Seungki
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.187-192
    • /
    • 2021
  • The purpose of this study is a method to discover problems and improve them by analyzing the status of software education of A primary school conducted by online class. The coronavirus infection-19(COVID-19) pandemic, which began in early 2020, has continued to delay the start of the new semester. Finally, on April 9, 2020, the first semester began with online class. While progressing non-face to face online class, most students said they had difficulties. Students solved difficulties in class with Internet searches or program hints, not teachers. In the post-class self-evaluation, most students answered that there was no increase in coding skills. To solve this problem, the school rents additional smart devices to student. schools should have real-time interactive classes. After covid 19, online class became a paradigm for classes. Therefore, software education will also require research and development of curriculum and teaching learning methods suitable for online classes.

  • PDF

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

A Study on Unified Security Management System for remote data acquisition of New and Renewable Energy Facilities (신.재생에너지 발전설비의 원격 데이터 수집을 위한 통합 보안 관리시스템에 관한 연구)

  • Kim, Hyoung-Ju;Lim, Jung-Yol
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.186-193
    • /
    • 2009
  • Development and diffusion of a new and renewable energy are acutely required at domestic energy actualities to be inferior as industrialization is accelerated, and use of information electric appliance is increased rapidly. For the diessemination and practical use of new and renewable energy, this paper presents an unified security management system that is efficiently able to acquire operational status date and control distributed generation facilities. Also, the unified security management system is suggested to protect gathered operational status date from unpredictable problems such as computer virus, spy ware, and any other network problems.

  • PDF

An Analysis Technique for Encrypted Unknown Malicious Scripts (알려지지 않은 악성 암호화 스크립트에 대한 분석 기법)

  • Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.473-481
    • /
    • 2002
  • Decryption of encrypted malicious scripts is essential in order to analyze the scripts and to determine whether they are malicious. An effective decryption technique is one that is designed to consider the characteristics of the script languages rather than the specific encryption patterns. However, currently X-raying and emulation are not the proper techniques for the script because they were designed to decrypt binary malicious codes. In addition to that, heuristic techniques are unable to decrypt unknown script codes that use unknown encryption techniques. In this paper, we propose a new technique that will be able to decrypt malicious scripts based on analytical approach. we describe its implementation.