• Title/Summary/Keyword: Abusing

Search Result 69, Processing Time 0.025 seconds

A Response Mechanism for Denying DoS Attacks abusing IPv6 Address Auto-configuration (IPv6 주소자동설정 기능을 악용한 서비스거부공격 대응 기법)

  • 강성구;김재광;고광선;엄영익
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.493-495
    • /
    • 2004
  • IPv6 프로토콜은 현재 인터넷 프로토콜로 사용되고 있는 IPv4 프로토콜이 가지고 있는 주소 고갈 문제, 미흡한 QoS지원, 그리고 다양한 보안 문제를 해결하도록 설계되었다. 이 중에서 이동기기의 원활한 IPv6 네트워크와의 접속을 위하여 IPv6 프로토콜에서는 주소자동설정 기능이 추가되었으나, 이 기능을 악용한 서비스거부 공격 발생 가능성이 존재한다 이에 본 논문에서는 IPv6 프로토콜의 주소자동설정 기능을 악용한 서비스거부공격에 대응할 수 있는 메커니즘으로써 RA 메시지에 일회용 키를 사용하는 방법을 제안한다.

  • PDF

Pseudo-Journals and Pseudo-Conferences: the Characteristics and Preventive Measures (가짜 학술지와 가짜 학술대회의 특성과 피해 방지 방안)

  • Choi, In-Hong
    • Journal of the Korean neurological association
    • /
    • v.36 no.4
    • /
    • pp.289-293
    • /
    • 2018
  • This article explains the relationship between open-access publications and pseudo-journals, and explores their characteristics including predatory journals and journal hijackers. Pseudo-journals and pseudo-conferences cause the disruption of academic development by spreading low quality information as well as the violation of research ethics by abusing research funds. Finally, preventive measures are described from the perspective of journal authors/researchers, institutions/funding organizations, and journal editors.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

Co-occurrence of Domestic Violence and Drinking Problem - What is Experiences of Female Victims? - (가정폭력과 음주문제의 동시발생 - 피해여성의 경험은 무엇인가? -)

  • Kim, Ju-Hyun;Jang, Soo-Mi
    • Korean Journal of Social Welfare
    • /
    • v.63 no.2
    • /
    • pp.291-317
    • /
    • 2011
  • This study was designed to explore the experiences of female victims who had abused by alcohol-abusing spouse. The results were deducted from in-depth interview with 10 female victims by utilizing Giorgi's phenomenological method. The results of research showed that experiences of women could be classified in three stages. From the lack of understanding stage, "ignorance of drunken violence" had appeared. "Confinement of vicious circle of drunken violence" and "dealing with drunken violence in the community" had been found from the coping stage. Finally, from the resting stage "re-defining of the relationship" had been drawn. Based on these results, the practical and political implications were suggested.

  • PDF

The Effect of Franchisors' Gapjil on Economic Satisfaction, Social Satisfaction, and Recontract Intention

  • HUR, Soon-Beom;LEE, Yong-Ki
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.2
    • /
    • pp.35-49
    • /
    • 2021
  • Purpose: The major objective of this study is to develop a model for the impact of franchisors' Gapjil (verbal·nonverbal Gapjil, abusing bargaining position, refusing transaction, false or exaggerated information, restrictive practices, unfair damage compensation) on franchisee's recontract intention. We also examine the mediating role of economic satisfaction and social satisfaction in the relationship between franchisors' Gapjil and franchisee's contract intention. Research design, data, and methodology: Data were collected from franchisee owners located nationwide in Korea. Out of 256 questionaires distributed, a total of 256 questionnaires were returned. After excluding 10 invalid respondent questionnaires, we coded and analyzed 246 valid questionnaires (effective response rate of 96.09%) using frequency, confirmatory factor analysis, correlations analysis, and structural equation modeling with SPSS 22.O and SmartPLS 3.0. Results: The findings of this study are summarized as follows: First, among the Gapjil of the franchisors, restrictive practices and unfair damage compensation had negative effects on economic and social satisfaction, but verbal and nonverbal Gapjil for economic and social satisfaction was not significant. Second, abusing bargaining positions and false or exaggerated information had negative effects on social satisfaction, but for economic satisfaction, found to be insignificant. Third, economic and social satisfaction had positive effects on the franchisee's recontract intention to the franchisor. Conclusion: The following implications of this study are as follows. First, the construct of Gapjil that occurs between the franchisors and the franchisees was first presented, and the franchisors' Gapjil is divided into interpersonal Gapjil and structural Gapjil. Second, the Gapjil of the franchisors can be an important predictor variable in maintaining and developing a long-term relationship between the franchisors and the franchisees. Third, solving conflict due to the Gapjil problem between franchisors and franchisees can be an important factor for franchisors and franchisees to co-survive and thrive in Korean franchise system. Fourth, this study suggest that managing the Gapjil of the franchisors was a important antecedent factor in maintaining long-term relationship between the franchisors and the franchisees. Therefore, this study will help franchisors formulate effective symbiotic marketing strategies to satisfy relationships with franchisees and consequently enhance long-term orientation.

Comparison of Performance Measures for Credit-Card Delinquents Classification Models : Measured by Hit Ratio vs. by Utility (신용카드 연체자 분류모형의 성능평가 척도 비교 : 예측률과 유틸리티 중심으로)

  • Chung, Suk-Hoon;Suh, Yong-Moo
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.21-36
    • /
    • 2008
  • As the great disturbance from abusing credit cards in Korea becomes stabilized, credit card companies need to interpret credit-card delinquents classification models from the viewpoint of profit. However, hit ratio which has been used as a measure of goodness of classification models just tells us how much correctly they classified rather than how much profits can be obtained as a result of using classification models. In this research, we tried to develop a new utility-based measure from the viewpoint of profit and then used this new measure to analyze two classification models(Neural Networks and Decision Tree models). We found that the hit ratio of neural model is higher than that of decision tree model, but the utility value of decision tree model is higher than that of neural model. This experiment shows the importance of utility based measure for credit-card delinquents classification models. We expect this new measure will contribute to increasing profits of credit card companies.

  • PDF

A Study on Electronic Commerce Transaction Modeling based on SET (SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구)

  • 고영철;송병열;조현규;함호상
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

Updated SSDP Scheme for DDoS Attack Defense

  • Huang, Haiou;Hu, Liang;Chu, Jianfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4599-4617
    • /
    • 2018
  • Abusing the Simple Server Discovery Protocol (SSDP) can induce an SSDP attack (including SSDP DoS, DDoS, DRDoS) posing a significant threat to UPnP devices. Rapid and extensive developments in computer technology, especially in regards to IoT, have made Upnp devices an indispensable part of our daily lives - but also render them susceptible to a variety of SSDP attacks without suitable countermeasures. This paper proposes the Two-dimensional table scheme, which provides high security at a reasonable computational cost. The feasibility and effectiveness of the proposed scheme are also validated by comparison against four other schemes (Stateless connections, Failing-together, Cookie, and Client puzzle).

A Study on Business Ethics of Competitive Superiority Strategy (경쟁우위 전략에서의 기업윤리에 관한 연구)

  • Yim, Woong-Seok;Kim, Hyung-Joon;Lee, Nae-Hyung
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.1
    • /
    • pp.157-174
    • /
    • 2007
  • Corporation had been made by important action rule of business ethics that observes legal standard that is prescribed in each class of administration activity. But it does not keep ethicality of corporation action that conforms law. Law can not include all parts of business ethics because it is forcing essential class for public order preservation and public welfare in right. Moreover, partial corporations are doing to justify unethical action of other evasion of taxes, consultation, manufacturing etc. with legal basis meaning abusing legal standard. For these reason, Insistence that is in point of legal standard and ethical standard is not different each other that is in equal viewpoint is brought.

The possibility of abusing Game the preventing way of abuse through AI (인공지능을 통한 게임의 악용과 개선방안 및 제안)

  • Jang, Hyunseo;Kim, Jinsu;Park, Namje
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.901-903
    • /
    • 2019
  • 인공지능 기술의 발전에 따라 산업, 교육, 게임, 의료, 국방, 교통 등에서 여러 가지 방면으로 활용되어가고 있다. 하지만 인공지능을 게임에 접목해 게임 내에서 사람보다 월등한 성적을 낼 수 있다는 것이다. 과거에는 메모리 변조, 패킷 변조 등의 공정한 플레이 규정을 파괴하는 프로그램을 사용하였다면 현재에는 딥러닝을 통해 학습된 게임 알고리즘은 이제까지의 프로그램과는 다르므로 게임 인공지능 산업의 개선방안을 제안하고자 한다.