• Title/Summary/Keyword: Computer Viruses

Search Result 43, Processing Time 0.026 seconds

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

A Proposal of GA Using Symbiotic Evolutionary Viruses and Its Virus Evaluation Techniques

  • Sakakura, Yoshiaki;Taniguchi, Noriyuki;Hoshino, Yukinobu;Kamei, Katsuari
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.679-682
    • /
    • 2003
  • In this paper, we propose a Genetic Algorithm (GA) using symbiotic evolutionary viruses. Our GA is based on both the building block hypothesis and the virus theory of evolution. The proposed GA aims to control a destruction of building blocks by discovering, keeping, and propagating of building blocks based on virus operation. Concretely, we prepare the group of individuals and the group of viruses. In our GA, the group of individuals searches solutions and the group of viruses searches building blocks. These searches done based on the symbiotic relation of both groups. Also, our GA has two types of virus evaluation techniques. One is that each virus is evaluated by the difference of the fitness of an individual between before and after infection of virus. Another is that all viruses aye evaluated by the difference of the fitness of an individual between before and after infection of all viruses. Furthermore, we applied the proposed GA to the minimum value search problem of a test function which has some local solutions far from the optimal solution. And, we discuss a difference of behaviors of the proposed GA based on each virus evaluation techniques.

  • PDF

Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses (컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.59-64
    • /
    • 2007
  • In these days, malicious codes have become reality and evolved significantly to become one of the greatest threats to the modern society where important information is stored, processed, and accessed through the internet and the computers. Computer virus is a common type of malicious codes. The standard techniques in anti-virus industry is still based on signatures matching. The detection mechanism searches for a signature pattern that identifies a particular virus or stain of viruses. Though more accurate in detecting known viruses, the technique falls short for detecting new or unknown viruses for which no identifying patterns present. To cope with this problem, anti-virus software has to incorporate the learning mechanism and heuristic. In this paper, we propose a fuzzy diagnosis system(FDS) using fuzzy c-means algorithm(FCM) for the cluster analysis and a decision status measure for giving a diagnosis. We compare proposed system FDS to three well known classifiers-KNN, RF, SVM. Experimental results show that the proposed approach can detect unknown viruses effectively.

The design of the blocking system against file infected with virus on router (라우터기반 바이러스 감염파일에 대한 블록킹 시스템 설계)

  • 정종근;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1232-1237
    • /
    • 2001
  • The technology of the internet has made advanced progress the number of users increase rapidly. but, the technology doesn't only show users good and beautiful sides. the immoral hackers containing even children create computer viruses, and then spread them over network. so it makes the threat of viruses more serious. In this paper, we designed an improved blocking system against the infected file with viruses on router after analysing blocking systems against virus previously developed. comparising with other systems, the system designed is more efficient in terms of communication in complexity since it omits the transmission time between router and blocking system.

  • PDF

A Fuzzy Diagnosis System for Detecting Computer Viruses (컴퓨터 바이러스 탐지를 위한 퍼지 진단시스템)

  • Lee, Hyeon-Suk
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.210-212
    • /
    • 2007
  • 본 논문에서는 컴퓨터 바이러스 정보 구축과 탐색에 학습기능을 도입함으로 새로 발생하는 바이러스를 찾아내어 대처할 수 있도록 설계된 퍼지 진단 시스템 FDS를 제안한다. FDS에서는 FCM 알고리즘을 사용하여 알려진 정보의 클러스터를 형성하고 이에 전문가의 지식을 포함하는 지식베이스를 구축한다. 진단을 위한 컴퓨터 파일에 대하여 그 파일의 결정 상태를 확인하고 이미 저장된 지식베이스를 바탕으로 바이러스 침입에 대한 정보를 보고하도록 설계되어있다. 이 시스템은 이미 알려진 테스트 데이터와 이전에 알려지지 않은 새로운 테스트 데이터를 실험데이터로 준비하여 그 성능을 테스트 한다. 제안된 시스템이 알려지지 않은 컴퓨터 바이러스의 경우도 효과적으로 진단할 수 있는 타당성을 보이고 있다.

  • PDF

Classification of Viruses Based on the Amino Acid Sequences of Viral Polymerases (바이러스 핵산중합효소의 아미노산 서열에 의한 바이러스 분류)

  • Nam, Ji-Hyun;Lee, Dong-Hun;Lee, Keon-Myung;Lee, Chan-Hee
    • Korean Journal of Microbiology
    • /
    • v.43 no.4
    • /
    • pp.285-291
    • /
    • 2007
  • According to the Baltimore Scheme, viruses are classified into 6 main classes based on their replication and coding strategies. Except for some small DNA viruses, most viruses code for their own polymerases: DNA-dependent DNA, RNA-dependent RNA and RNA-dependent DNA polymerases, all of which contain 4 common motifs. We undertook a phylogenetic study to establish the relationship between the Baltimore Scheme and viral polymerases. Amino acid sequence data sets of viral polymerases were taken from NCBI GenBank, and a multiple alignment was performed with CLUSTAL X program. Phylogenetic trees of viral polymerases constructed from the distance matrices were generally consistent with Baltimore Scheme with some minor exceptions. Interestingly, negative RNA viruses (Class V) could be further divided into 2 subgroups with segmented and non-segmented genomes. Thus, Baltimore Scheme for viral taxonomy could be supported by phylogenetic analysis based on the amino acid sequences of viral polymerases.

Development of Safe and Effective rec-OPV Using Poliovirus Sabin 1-derived Mucosal Vaccine Vector

  • Bae Yong-Soo
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2002.10a
    • /
    • pp.121-124
    • /
    • 2002
  • This work was initiated to develope a recombinant oral poliovaccine (OPV), which is highly advanced in safety (minimizing VAPP) by introducing Type 2,3 poliovirus epitopes into our RPS-Vax system. We have introduced several potential vaccine epitopes of poliovirus Type 2, and 3 into RPS-Vax system, resulting in production of recombinant polioviruses. Any of these chimeric viruses, however, were not detected for their foreign gene expression by serotype-specific mouse antiserum. We have designed several folding units to stabilize the introduced vaccine protein and attached short epitope-concatamer or epitope-multimer to them, followed by production of chimeric viruses. Only those who have an HIV-1 Tat-mediated folding unit were nicely detected for the introduced foreign proteins by anti-Tat antiserum and type-specific peptide-induced antisera. Nevertheless, introduced epitopes were not detected in Western blot experiment with each serotype-specific antiserum. None of the mice inoculated with these chimeric viruses showed preventative immunity when challenged with Lansing and Leon wildtype 2 and 3 poliovirus, and the antiserum did not show neutralizing capacity in vitro. Conformational epitope covering B/C loop region of type 2 and 3 were newly designed by computer modeling, and introduced into the RPS-Vax vector system, followed by production of chimeric viruses. Introduced epitope regions were nicely detected by anti-Tag23 mAb or peptide antibody, but still not detected by poliovirus antiserum. Nevertheless, neutralizing antibody was detected in the Tg-PVR mice even when inoculated once with these chimeric viruses. Also, the immunized mice showed perfect preventative immunity against the wild Type poliovirus Lancing or Leon. When boosted appropriately, those chimeric virus-inoculated Tg-PVR mice produced equivalent amounts of neutralizing antibody to those in Sabin 2/3-immunized mice. These data strongly suggest that our recombinant poliovirus (RPS-PV2 and RPS-PV3) can be used as a safe and effective rec-OPV instead of any preexisting poliovaccine.

  • PDF

Estimation and Classification of COVID-19 through Climate Change: Focusing on Weather Data since 2018 (기후변화를 통한 코로나바이러스감염증-19 추정 및 분류: 2018년도 이후 기상데이터를 중심으로)

  • Kim, Youn-Su;Chang, In-Hong;Song, Kwang-Yoon
    • Journal of Integrative Natural Science
    • /
    • v.14 no.2
    • /
    • pp.41-49
    • /
    • 2021
  • The causes of climate change are natural and artificial. Natural causes include changes in temperature and sunspot activities caused by changes in solar radiation due to large-scale volcanic activities, while artificial causes include increased greenhouse gas concentrations and land use changes. Studies have shown that excessive carbon use among artificial causes has accelerated global warming. Climate change is rapidly under way because of this. Due to climate change, the frequency and cycle of infectious disease viruses are greater and faster than before. Currently, the world is suffering greatly from coronavirus infection-19 (COVID-19). Korea is no exception. The first confirmed case occurred on January 20, 2020, and the number of infected people has steadily increased due to several waves since then, and many confirmed cases are occurring in 2021. In this study, we conduct a study on climate change before and after COVID-19 using weather data from Korea to determine whether climate change affects infectious disease viruses through logistic regression analysis. Based on this, we want to classify before and after COVID-19 through a logistic regression model to see how much classification rate we have. In addition, we compare monthly classification rates to see if there are seasonal classification differences.

Natural Language Interface to an Intrusion Detection System

  • Collier, T.;Itoh, Masahiko
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.31.1-31
    • /
    • 2001
  • Computer security is a very important issue these days. Computer viruses, worms, Trojan horses, and cracking are prevalent and causing serious damages. There are also many ways developed to defend against such attacks including cryptography and firewalls. However, it is not possible to guarantee complete security of computer systems or networks. Recently much attention has been directed to ways to detect intrusions and recover from damages. Although there have been a lot of research efforts to develop efficient intrusion detection systems, little has been done to facilitate the interaction between intrusion detection systems and users ...

  • PDF

Computer Ethics in Computer Education (컴퓨터 윤리에 관한 연구)

  • Joo, Young-Ju;Lee, Kwang-Hi
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.84-100
    • /
    • 1997
  • All technology has both intended and unintended effects, we have said, and information technology is no exception. Information technology offers a number of challenges: those of computer education, computer literacy, the ethical and societal impacts of computing and communication systems. Current computer education focuses primarily on the history, parts and usage of a computer, and programming, it does not fully include the moral standards or ethics that help guide behavior and conduct for citizens of Information society. The purpose of this study is to review of the theoretical issues and societal impacts of computers, communication systems and computer ethics; then, to nalyse current curriculum and content of school computer education in Korea: finally, to develop a possible course in computer ethics containing a goal statement and aspects of computer literacy. Contents in computer ethics covers issues of nettiquette, privacy, health, copyright-related software and network piracy, computer crime and viruses. Six suggestions are made for the computer ethics of Information Age in the conclusion.

  • PDF