• Title/Summary/Keyword: Black List

Search Result 38, Processing Time 0.023 seconds

The Comparison of Ginseng Prosapogenin Composition and Contents in Red and Black Ginseng (흑삼과 홍삼의 인삼 프로사포게닌 성분 비교)

  • Jo, Hee-Kyung;Sung, Min-Chang;Ko, Sung-Kwon
    • Korean Journal of Pharmacognosy
    • /
    • v.42 no.4
    • /
    • pp.361-365
    • /
    • 2011
  • The objective of this study is to provide basic information for developing a high-value ginseng product using ginseng saponin and prosapogenin. In order to achieve the proposed objective ginsenoside compositions of Black (BG) and Red (RG) ginseng extract with 95% ethyl alcohol were examined by means of HPLC. The crude saponin and ginsenoside composition of processed ginseng products were analyzed and compared, with BG topping the list with a crude saponin content of 7.53%, followed by RG (5.29%). Ginseng prosapogenin (ginsenosides $Rg_2$, $Rg_3$, $Rg_5$, $Rg_6$, $Rh_1$, $Rh_4$, $Rk_1$, $Rk_3$, $F_1$ and $F_4$) in BG was found to be contained almost 2.6 times as much as that in RG. Ginsenosides $Rg_3$, $Rg_5$, $Rk_1$, $Rh_4$ and $F_4$ in BG in particular were found to be almost 3 times as much as those in RG. $Rg_6$ and $Rk_3$ in BG were also found to be almost 4 times as much as those in RG.

Population genetic structure and regional fragmentation of rare CO1 haplotypes of Black-tailed Gulls (Larus crassirostris: Laridae) in Korean Peninsula (한반도 괭이갈매기의 개체군 유전 구조와 희귀 CO1 유전자형의 지리적 파편화)

  • Jeong, Gilsang;Hwang, Bo-Yeon;Kwon, Young Soo;Jin, Seon Deok;Choi, Sunghoon;Kim, Miran;Choi, Hansu;Park, Jin Young
    • Korean Journal of Ornithology
    • /
    • v.25 no.2
    • /
    • pp.106-111
    • /
    • 2018
  • The Black-tailed gull (Larus crassirostris) is one of the most common gull species in the Northeast Asia and classified as LC (least concern) in the IUCN Red List. The bird has become a useful indicator for marine environmental pollution and habitat disruption, since the human activities impacted marine environments. Here we show that the black-tailed Gull has 6 haplotypes and some rare haplotypes are locally limited implying that the bird may not disperse far. This study may be the first report on population genetic study of Black-tailed Gull in Korea and could be used as the baseline data for monitoring and genetic study on the bird as an environmental indicator.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Historical Review and Notes on Small Mammals (Mammalia: Erinaceomorpha, Soricomorpha, Rodentia) in Korea

  • Lee, Jeong-Boon;Kim, Yong-Ki;Bae, Yang-Seop
    • Animal Systematics, Evolution and Diversity
    • /
    • v.30 no.3
    • /
    • pp.159-175
    • /
    • 2014
  • A taxonomic study of small mammals (Erinaceomorpha, Soricomorpha and Rodentia) was conducted in order to find out the scientific names which have been used in Korea. The synonymy of each species and taxonomical research was reviewed and confirmed in this study. The species names are rearranged based on recent studies. Among the various confused names, available names were adopted such as follows: C. shantungensis shantungensis known as Crocidura suaveolens; C. shantungensis quelpartis known as C. dsinezumi; Rattus tanezumi known as R. rattus, called black rat, roof rat and ship rat, respectively. Apodemus sylvaticus (Muridae, wood mouse) is excluded in the checklist based on indistinct previous records and ambiguous habitation on the Korean Peninsula, and neighbors. In addition, we provide a new Korean vernacular name for Myocastor coypus, called the "Nutria" in Korea. We reflect that several species are repositioned to other genera. A checklist of Korean small mammals and synonym list for each species is provided to avoid confusion of scientific names in Korea. In this study, the list of small mammals in Korea is arranged to 33 species, 20 genera, 8 families, and 3 orders.

A Method to Collect Trusted Processes for Application Whitelisting in macOS (macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.397-405
    • /
    • 2018
  • Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Modeling Ringing Time Display and Active Response System Based on Black List against One-Ring Spam (원링 스팸에 대응하기 위한 링 개수 표시 및 블랙 리스트에 근거한 적극적 대응 방법)

  • Kang, Dae-Ki
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.441-444
    • /
    • 2008
  • 본 연구에서는 휴대폰에서 원 링 (one ring) 방식의 스팸 전화에 대응하기 위한, 두 가지의 간단하면서도 효과적인 대응 방법들을 제시하고자 한다. 첫 번째 대응 방안은 휴대폰 단말기 기반의 수동적인 감지 방법으로, 사용자의 휴대폰 터미널에 전화벨이 울린 시간을 디스플레이하는 방안이다. 원 링 스팸은 울리는 시간이 매우 짧기 때문에, 터미널에 나타나는 벨 울림 시간은 사용자로 하여금 부재중 전화에 대해서 응답 전화를 해야 하는지에 대한 유용한 정보를 제공할 수 있다. 두 번째 대응 방안은 기본적으로 블랙 리스트를 관리하는 서버 기반의 적극적인 대응 방법으로 스패머에게 적극적으로 보복을 하는 것이다. 이 방안을 구현하기 위해서는, 원 링 스팸 전화번호 데이터베이스에서 블랙 리스트를 휴대폰으로 다운받은 후, 블랙 리스트에 등록된 번호에서 전화가 오면 자동으로 전화를 받았다가 바로 끊는다. 이로써, 스패머가 자신의 제품을 알리지 못하고 전화비를 지불하게 되는 것이다.

  • PDF

Detection Technique of Suspected Piracy Sites based on Image Black List (이미지 블랙리스트 기반 저작권 침해 의심 사이트 탐지 기법)

  • Kim, Eui-Jin;Jung, In-Su;Song, Yu-Rae;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.148-150
    • /
    • 2021
  • 저작권 콘텐츠의 해외 진출과 함께, 국내·외 저작권 시장 규모가 증가하고 있다. 이와 동시에 등장한 저작권 침해사이트는 메인 페이지에 저작권 침해사이트를 대표하는 이미지를 게시하는 특징이 있다. 이러한 저작권 침해사이트는 음악, 영화, 드라마 등의 저작권 콘텐츠를 불법 유통시키며 저작권 시장에 피해를 입히고 있다. 공공기관에서는 저작권 침해를 방지하기 위해 저작권 침해사이트를 차단하는 등의 대응을 하고 있지만, 저작권 침해사이트의 생성 속도에 비해 침해 여부 판단 속도가 상대적으로 느려서 차단에 어려움이 존재한다. 따라서, 본 논문에서는 저작권 침해사이트의 대표 이미지를 활용한 이미지 블랙리스트에 기반하여 저작권 침해 의심 사이트 탐지 기법을 제안하고자 한다.