• Title/Summary/Keyword: Attack behavior analysis

Search Result 93, Processing Time 0.024 seconds

Origin of Aggression in Modern Society: Based on Film 'American Psycho' (현대사회 공격성의 근원: 영화 '아메리칸 사이코'를 중심으로)

  • Hong, Sumin;Ha, Jee Hyun
    • Psychoanalysis
    • /
    • v.29 no.4
    • /
    • pp.63-71
    • /
    • 2018
  • One of the most striking features of modern society in the 21st century, is increased levels of aggression. Aggression refers to aggressive or hostile behavior, and is manifested in suicide or an attack against others. Aggression in modern society is more accidental, reckless, and aimless than before. As more patients visit hospitals due to the serious problem of aggression control, we need to address the nature of this growing aggression. The authors analyzed sources and the nature of aggression, based on the movie 'American Psycho.' The main character of the movie, Patrick, is similar to many people today, with traits such as egotistical thinking, lack of empathy, demand for attention and admiration, and exploited and superficial relationships. Patrick's aggression is in reaction to narcissistic injury. Through this, one can think of pathological narcissism, behind growing aggression in modern society. There are a number of social and environmental factors, attributable to increasing narcissism in modern society. Among them, change in parenting practices, and parent-child relationships, is likely to have affected increase in narcissism in terms of personality development. In conclusion, when treating patients exhibiting aggression in psychotherapy, it is critical to fully consider the possibility of pathological narcissism and its use in analysis.

Experimental analysis of blast loading effects on security check-post

  • Muhammed Rizvan Akram;Ali Yesilyurt
    • Structural Engineering and Mechanics
    • /
    • v.87 no.3
    • /
    • pp.273-282
    • /
    • 2023
  • Concrete construction, one of the oldest building practices, is commonly used in all parts of the world. Concrete is the primary building material for both residential and commercial constructions. The challenge of protecting the buildings, hence nation, against the attack of terrorism has raised the importance to explore the understanding of building materials against the explosion. In this research, a security check-post (reinforced concrete frame filled with plain cement concrete) has been chosen to study the behavior of structural elements under blast loading. Eight nitroglycerines-based dynamite blasts with varying amounts of explosive charge, up to 17 kg weight has been carried out at various scale distances. Pressure and acceleration time history records are measured using blast measuring instruments. Security check post after being exposed by explosive loading are photographed to view cracking/failure patterns on the structural elements. It is noted that with the increase of quantity of explosive, the dimensions of spalling and crack patterns increase on the front panels. Simple empirical analyses are conducted using ConWep and other design manuals such as UFC 3-340-02 (2008) and AASTP-1 (2010) for the purpose of comparison of blast parameters with the experimental records. The results of experimental workings are also compared with earlier researchers to check the compatibility of developed equations. It is believed that the current study presents the simple and preliminary procedure for calculating the air blast and ground shock parameters on the structures exposed to blast explosion.

The Related Factors to Perceived gastritis or Perceived enteritis in High school seniors -the 2009 Korea Youth Risk Behavior Web-based Survey- (고등학교 3학년 학생들이 인지한 위염 및 장염 관련요인 -2009년 청소년 건강행태 온라인 조사 자료를 중심으로-)

  • Bea, Sang-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.668-677
    • /
    • 2012
  • This study analyzed the related factors affecting to perceived gastritis or perceived enteritis for 11,753 Korean high school seniors who participated in the 2009 Korea Youth Risk Behavior Web-based Survey (KYHRBWS). Of the subjects, 5,685 (47.6%)were male and 6,068(52.4%) were female and 8.7% of the students responded that they had suffered from gastritis or enteritis for a long time and the females had a slightly higher attack rate of gastritis or enteritis. Survey logistic regression models and decision tree analysis were used to calculate odd ratios and 95% confidence intervals. As a result, there was affecting to their stress and health behaviors in the risk of gastritis and enteritis, and that their lower level perceived health, smoking, heavy drinking or starting drinking before they were 13 years old and a higher level of perceived stress significantly affected the risk of gastritis or enteritis in the subjects(p<.001).

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Design and Verification of the Integrated Log Analysis System for Enterprise Information Security (기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증)

  • Lee, Jae-Yong;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.491-498
    • /
    • 2008
  • The leakage of sensitive information by an insider within the organization becomes a serious threat nowadays. Sometimes, these insider threats are more harmful to an organization than external attack. Companies cannot afford to continue ignoring the potential of insider attacks. The purpose of this study is to design an integrated log analysis system that can detect various types of information leakages. The system uses threat rules generated through risk analysis, and monitors every aspect of the online activities of authorized insider. Not only should system have the ability to identify abnormal behavior, they should also be able to predict and even help to prevent potential risk. The system is composed of three modules, which are log collector, log analyzer and report generator.

  • PDF

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Multi-layered Gap Measurement on In-Vessel Cerium Retention Using Ultrasonic Wave Reflective Pattern Analysis and Frequency Diversity Signal Processing (초음파 반사 패턴과 주파수 대역 분할 신호처리를 이용한 다층구조인 노내 간극 측정)

  • Koo, Kil-Mo;Sim, Cheul-Mu;Kim, Jong-Hwan;Kim, Sang-Baik;Kim, Hee-Dong;Park, Chi-Seung
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.20 no.4
    • /
    • pp.314-321
    • /
    • 2000
  • A gap between a $Al_2O_3/Fe$ thermite and lower head vessel is formed in the lower-plenum arrested vessel attack(LAVA) experiment which is the 1st phase study of simulation of naturally arrested vessel attack in vessel(SONATA-IV). The gap measurement using a conventional ultrasonic method would be lack of a reliability due to the structure complexity and the metallurgical grain size change of the lower head HAZ occurred by a thermite $Al_2O_3/Fe$ melt or a $Al_2O_3$ melt at $2300^{\circ}C$. The grain echoes having false signals and lower S/N ratio signals are detected due to a multiple scattering, a mode conversion and an attenuation of a ultrasonic resulted from at the interface of increased grain size zone. In this test, the signals pattern was classified to understand the behavior of the ultrasonic in a multi-layer specimen of solid-liquid-solid of assuming that the thermite and the lower head vessel is immersed. The polarity threshold algorithm of frequency diversity gives us the enhancement about 6dB of the ratio S/N.

  • PDF

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.