• Title/Summary/Keyword: Antivirus Solution

Search Result 8, Processing Time 0.022 seconds

Effective Evaluation about the Antivirus Solution for Smart Phone

  • Shin, Suk-Jo;Kim, Seon-Joo;Jiang, Chun-Yan;Jo, In-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.695-700
    • /
    • 2011
  • Smartphone has formed a new market and introduced a new environment. They have an operating system like PCs, enabling free installation and removal of application programs. As the number of Smartphone users is increasing, more personal information is also exposed to malicious codes. There are problem of modification and deletion of files, battery consumption, and information leakage due to malicious codes. As the needs of Smartphone antivirus solutions are increasing, the antivirus solutions should be evaluated with quality characteristics. In this paper, we propose an effective evaluation method for functionality and performance of Smartphone antivirus solutions, and the best practices for evaluation.

A Study on Malicious Code Detection Using Blockchain and Deep Learning (블록체인과 딥러닝을 이용한 악성코드 탐지에 관한 연구)

  • Lee, Deok Gyu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.39-46
    • /
    • 2021
  • Damages by malware have recently been increasing. Conventional signature-based antivirus solutions are helplessly vulnerable to unprecedented new threats such as Zero-day attack and ransomware. Despite that, many enterprises have retained signature-based antivirus solutions as part of the multiple endpoints security strategy. They do recognize the problem. This paper proposes a solution using the blockchain and deep learning technologies as the next-generation antivirus solution. It uses the antivirus software that updates through an existing DB server to supplement the detection unit and organizes the blockchain instead of the DB for deep learning using various samples and forms to increase the detection rate of new malware and falsified malware.

MWMon: A Software Defined Network-based Malware Monitor

  • Jo, Min Jae;Shin, Ji Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.37-44
    • /
    • 2015
  • An antivirus is a widely used solution for detecting malicious softwares in client devices. The performance of antivirus solutions in the mobile client environment is critical due to its resource constrains. Many solutions light-weighting client's overhead in the mobile client environment have been developed. However, most solutions require platform modifications or software installations and it decreases their realizations in practice. In this paper, we propose a solution detecting malwares on networks using the Software Defined Network (SDN). Our main goal is designing a solution detecting malwares of mobile client without involving the client into the work. We contribute to provide a solution that does not require client-side installations or modifications and so is easily applicable in practice.

Solubilization of CPD, a Novel Antivirus Compound Containing Pirimidine Structure, in Aqueous Solution (신규 피리미딘 구조를 함유한 항바이러스성 화합물 CPD의 수용액중 가용화)

  • Song Sukgil;Kweon Ho-Seok;Chung Youn Bok
    • YAKHAK HOEJI
    • /
    • v.50 no.1
    • /
    • pp.1-7
    • /
    • 2006
  • The purpose of the present study was to formulate the aqueous solution of 1-cyclopent-3-enylmethyl-6(3,5-dimethyl-benzoyl)-5-ethyl-1H-pyrimidine-2,4-dione (CPD), a novel antivirus compound containing pirimidine structure. For this purpose, the effects of various solubilization agents such as cosolvents [ethanol, propylene glycol (PG), polyethylene glycol 300 (PEG 300), polyethylene glycol 400 (PEG 400), glycerin], surfactants (Tween 80, Cremophor$^{(R)}$ RH40, Cremophor$^{(R)}$ EL, Poloxamer 407, Poloxamer 188) and a complexation agent [hydroxypropyl-${\beta}$-cyclodextrin (HPBCD)] , on the solubility of CPD in aqueous solution were evaluated. The solubility of CPD in water was under $1\;{\mu}g/ml$ at $20^{\circ}C$. Cosolvents such as ethanol, PG, PEG 300, PEG 400 and glycerin did not enhance the solubility of CPD at the $0{\sim}40\%$ concentration range. The solubility of CPD was significantly elevated by the addition of cosolvents over the $80\%$ concentration range. On the other hand, tween 80, Cremophor$^{(R)}$ L, Cremophor$^{(R)}$ RH40, and HPBCD showed enhanced effects on the solubility of CPD. The enhanced effects of Poloxamer 407 or Poloxamer 188 on the CPD solubility were less pronounced compared with tween 80, Cremophor$^{(R)}$ L or Cremophor$^{(R)}$ RH40. As a results, tween 80 aqueous solution was selected as an optimum solvent system. The aqueous solutions containing $20\%$ tween 80 were formulated as a dosing solution containing CPD for its intraperitoneal and intrahypodermic administration, respectively, The formular showed physical stability after stored for 7 days at $4^{\circ}C$.

Synthesis of Phosphoric Polymer Coating Solution with Antimicrobial Activity and Flame Retardant Efficiency (항균성과 난연성을 함유하고 있는 인계고분자 코팅용액의 합성)

  • Kim, Sang-Kyum;Lee, In-Soo;Seo, Sang-Hee;Choi, Seong-Ho
    • Polymer(Korea)
    • /
    • v.35 no.5
    • /
    • pp.431-437
    • /
    • 2011
  • A polymeric coating solution based on poly(acryloyl diphosphoric acid)(poly(ADP)) was prepared via a radical polymerization of acryloyl diphosphoric acid using ammonium persulfate (APS) as an initiator in water at 70 $^{\circ}C$. The prepared polymeric coating solution exhibited significant antibacterial activity against salmonella typhimurium, pseudomonas aeruginosa, escherichia coli, and staphylococcus aureus. It also exhibited good antifungal activity against Asperigillus niger and good antiviral activity against the influenza (H1N1) virus. Additionally, it exhibited good flame retardant efficiency after applying it as a coating to a cotton fabric.

Development of PCM Color Coated Steel Sheets with Excellent Antiviral and Antimicrobial Properties

  • Du-Hwan Jo;Seongil Kim;Jinkyun Roh;Doojin Paik;Myungsoo Kim
    • Corrosion Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.139-144
    • /
    • 2024
  • Recently, due to the rapid spread and continuation of COVID-19, customer demand for health and hygiene has increased, requiring the development of new products that express antiviral and antibacterial properties. In particular, viruses are much smaller in size than bacteria and have a fast propagation speed, making it difficult to kill. POSCO has developed eco-friendly PCM color coated steel sheets with excellent antiviral properties by introducing inorganic composite materials to the color coating layer on the surface of Zn-Al-Mg alloy plated steels. The virus is not only destroyed by adsorption of metal ions released from the surface of the coating film, but is also further promoted by the generation of reactive oxygen species by the reaction of metal ions and moisture. As a result of evaluating the developed products under the International Standard Evaluation Act, the microbicidal activity was 99.9% for viruses, and 99.99% for bacteria and 0% fungi. In particular, excellent results were also shown in the durability evaluation for life cycle of the product. The developed product was applied as a wall of school classrooms and toilets and ducts for building air conditioning, resulting in excellent results. Developed products are being applied for construction and home appliances to practice POSCO's corporate citizenship.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

The Analysis for Malicious Code Solution Based on an Open Source (오픈소스기반 악성코드 솔루션 분석)

  • Han, Dong-Jin;Jeong, So-Jeong;Kim, Dong-Gun;Choi, Il-Young;Choi, Sang-Yong;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.85-88
    • /
    • 2020
  • 최근 악성코드의 발전은 사이버 위협의 전방면에 걸쳐 영향을 주고 있다. DDoS, APT를 포함한 스팸 발송 등과 같은 사이버 공격은 악성코드를 기반으로 한다. 또한 이에 대응하기 위해 다양한 형태의 악성코드 솔루션이 존재하고 있다. 악성코드 솔루션은 오픈소스와 상업용 프로그램으로 나눌 수 있는데 상업용 프로그램은 악성코드뿐만 아니라 PC관리의 전반적인 부분을 담당하고 있다. 악성코드를 탐지하는 방법은 시그니처 방식과 해시DB를 이용한 방식 등 다양한 방식이 있다. 본 논문에서는 오픈소스기반 악성코드 솔루션을 비교하여 어떠한 방식이 더 효과적인가를 분석하였다. 이를 통해 악성코드 방지 프로그램을 개발하려는 개발자가 비용효과적인 악성코드 탐지 방법을 잘 선택할 수 있는 가이드라인을 제공한다.

  • PDF