• Title/Summary/Keyword: Blacklist

Search Result 31, Processing Time 0.033 seconds

A Study on the Blocking of Commercial Mail Systems for the Prevention of Information Leakage in Public Institutions (공공기관 내부 정보유출 방지를 위한 상용메일시스템 차단 방안)

  • Kim, Seo-Hye;Kim, Do-hyun;Lee, Dae-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.195-197
    • /
    • 2022
  • In this paper, we intend to study the fundamental blocking methodology for the use of external commercial mail systems in the corporate internal Internet network, which is a common concern of public and administrative agencies. By checking the limitations of the blacklist-based blocking method used in the past, and by analyzing packet of the mail sending web page, the delimiter used for mail transmission is extracted, and the purpose is to monitor and block the leakage of intenal information of the company using whitelist technology.

  • PDF

A Method to Collect Trusted Processes for Application Whitelisting in macOS (macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.397-405
    • /
    • 2018
  • Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

Square and Court -Social Imagination of Korean Cinema in Blacklist Era (광장과 법정 -블랙리스트 시대 한국영화의 사회적 상상력)

  • Song, Hyo-Joung
    • Journal of Popular Narrative
    • /
    • v.25 no.4
    • /
    • pp.159-190
    • /
    • 2019
  • This paper aims to examine to the political unconsciousness of social movies that have caused social repercussions in the 2010s, and to study the social imagination of Korean films at that time. Korean Movies such as (2013), <1987>(2017) and (2017) reflect the ethos of civil society based on common sense and justice. The epic structure was the same as that of ordinary citizens, who move toward a public space (court, square) after awakening their political correctness. More than anything else, the fact that such films were based on "a historical fact" could have been a strategy to avoid censorship in the era of the blacklist. In these social films, courts and squares have become places for democracy. The conservative government of the time was tired of anti-government resistance and the politics of the square. Thus, films from directors and producers blacklisted were difficult to produce. That's why the court in the movie during this period could become a symbolic proxy for the "legitimate" reenactment of the politics of the square, which was subject to censorship and avoidance by the regime of the time. Meanwhile, the square has gradually become the main venue for political films that advocate "historic true stories." The square of the 1980s, which appeared in the movies, will be connected to the Gwanghwamun candlelight square that audiences experienced in 2017. Furthermore, it was able to reach the concept of an abstract square as an "open space for democracy." At the foundation of these works is a psychological framework that equates the trauma of the failed democratic movement of the 1980s to the trauma of the failed progressive movement of the 2010s. Through this study, we were able to see that social political films in the 2010s were quite successful, emphasizing "political correctness" and constitutional common sense. But they also had limitations as "de-political popular films" that failed to show imagination beyond the censorship of the blacklist era.

Dealing with Unruly Behavior on Board Aircraft: A Chinese Perspective

  • Qin, Huaping
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.193-209
    • /
    • 2012
  • China's airline industry is experiencing a booming development as one hand, on the other hand the incidents involving unruly behaviour on board aircraft also becomes a growing concern for the whole industry. The thesis examines the basic issues concerning the unruly behaviour, such as definition of unruly behaviour, the impact and root causes of unruly behaviour. Then it focuses on the China's legal sources governing the problem of unruly behaviour. Generally speaking, China's legislation with this respect is systematic and self-contained, except some minor shortcomings which need to be revised. Finally the thesis holds the view that the preventative measures jointly contributed by all the parties concerned are something more important than the legislation itself.

  • PDF

Android Based SMS Management Application Design (안드로이드 기반 SMS 관리 애플리케이션 설계 및 구현)

  • Qiao, He;Park, Hung-Bog
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.357-360
    • /
    • 2014
  • 현대 사회에서는 휴대 전화 때문에 신속하고 효율적이 된다. 사람은 휴대 전화를 이용해서 서로 통신할 수 있다. 그리고 안드로이드가 빠르게 발전하고 다양한 지능 전자 상품에서 사용하고 있다. 본 논문에서는 구글 안드로이드 플랫폼기반으로 스마트폰의 SMS 관리 응용 애플리케이션을 설계 및 구현하였으면 기본 메시징 기능뿐만 아니라 블랙리스트 및 모바일 그룹 채팅 기능을 포함하고 있다. 그룹 채팅 기능은 네트워크 환경을 기반으로 설정될 수 있다. 모바일 네트워크가 켜져있을 때, 네트워크 트래픽 그룹 채팅을 사용할 수 있고 모바일 네트워크가 꺼져있을 때, SMS 기능 그룹 채팅을 사용할 수 있다.

  • PDF

Respond System for Low-Level DDoS Attack (저대역 DDoS 공격 대응 시스템)

  • Lee, Hyung-Su;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.732-742
    • /
    • 2016
  • This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.

Whitelist-Based Anomaly Detection for Industrial Control System Security (제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법)

  • Yoo, Hyunguk;Yun, Jeong-Han;Shon, Taeshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.641-653
    • /
    • 2013
  • Recent cyber attacks targeting control systems are getting sophisticated and intelligent notoriously. As the existing signature based detection techniques faced with their limitations, a whitelist model with security techniques is getting attention again. However, techniques that are being developed in a whitelist model used at the application level narrowly and cannot provide specific information about anomalism of various cases. In this paper, we classify abnormal cases that can occur in control systems of enterprises and propose a new whitelist model for detecting abnormal cases.

The Ecosystem of the Smartphone Industry in Korea: Perspectives on Its Sustainable Growth (지속적 성장 관점에서 본 한국 스마트폰 산업 생태계)

  • Park, Jinsoo;Choi, Youngseok
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.25-43
    • /
    • 2013
  • The Korean Smartphone industry has advanced rapidly. There seems to have a considerable change in Korea smartphone industry as the security policy related to wireless devices is changed from Whitelist Policy to Blacklist Policy. In regard to such a change, this paper analyzes the smartphone market in terms of the Business Ecosystem Model suggested by Moore. This study examines how Korean Smartphone Ecosystem has been formed and how any shifts in policy will have an effect on the ecosystem. In line with this policy shift, this study also suggests the ways how these ecosystem members should establish a strategy for the continuous development of this smartphone ecosystem. Furthermore, this study presents cooperation directions among ecosystem members based on the organic connections in the ecosystem as well as each individual's corresponding measures. In addition, based on this analysis, this study puts forward Korean smartphone ecosystem's current problems, improvement, and its future.

  • PDF

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.