• 제목/요약/키워드: Computer virus

검색결과 213건 처리시간 0.026초

Antiviral Efficacy of an Aquatic Disinfectant Tablet Composed of Calcium Hypochlorite Against Viral Hemorrhagic Septicemia Virus

  • Park, Eun-Kee;Yu, Eun-Ah;Cha, Chun-Nam;Yoo, Chang-Yeul;Choi, Hyunju;Kim, Suk;Lee, Hu-Jang
    • 한국환경보건학회지
    • /
    • 제39권4호
    • /
    • pp.376-382
    • /
    • 2013
  • Objectives: The objectives of this study were to identify the virucidal efficacy against the viral hemorrhagic septicemia virus (VHSV) of an aquatic disinfectant tablet composed of calcium hypochlorite. Methods: Virucidal efficacy was determined through the viability of VHSV contacted with the disinfectant in a viral stock cultured in a fathead minnow cell line. An aquatic disinfectant tablet and VHSV were reacted under distilled water (DW), hard water (HW) or organic matter suspension (OM) conditions. Results: Under DW and HW conditions, VHSV was inactivated with 24,000- and 2000-fold dilutions of the aquatic disinfectant tablet, respectively. With the investigation of the antiviral effect of the disinfectant under OM conditions, VHSV was inactivated with a 16,000-fold dilution of the aquatic disinfectant tablet. Conclusions: The results from this study showed that the aquatic disinfectant tablet was a highly effective disinfectant against VHSV. In the future, a controlled field trial is required to determine whether the use of an aquatic disinfectant tablet will be able to reduce VHSV in a cultured marine fish farm.

Designing a novel mRNA vaccine against Vibrio harveyi infection in fish: an immunoinformatics approach

  • Islam, Sk Injamamul;Mou, Moslema Jahan;Sanjida, Saloa;Tariq, Muhammad;Nasir, Saad;Mahfuj, Sarower
    • Genomics & Informatics
    • /
    • 제20권1호
    • /
    • pp.11.1-11.20
    • /
    • 2022
  • Vibrio harveyi belongs to the Vibrio genus that causes vibriosis in marine and aquatic fish species through double-stranded DNA virus replication. In humans, around 12 Vibrio species can cause gastroenteritis (gastrointestinal illness). A large amount of virus particles can be found in the cytoplasm of infected cells, which may cause death. Despite these devastating complications, there is still no cure or vaccine for the virus. As a result, we used an immunoinformatics approach to develop a multi-epitope vaccine against most pathogenic hemolysin gene of V. harveyi. The immunodominant T- and B-cell epitopes were identified using the hemolysin protein. We developed a vaccine employing three possible epitopes: cytotoxic T-lymphocytes, helper T-lymphocytes, and linear B-lymphocyte epitopes, after thorough testing. The vaccine was developed to be antigenic, immunogenic, and non-allergenic, as well as having a better solubility. Molecular dynamics simulation revealed significant structural stiffness and binding stability. In addition, the immunological simulation generated by computer revealed that the vaccination might elicit immune reactions in the actual life after injection. Finally, using Escherichia coli K12 as a model, codon optimization yielded ideal GC content and a higher codon adaptation index value, which was then included in the cloning vector pET2+ (a). Altogether, our experiment implies that the proposed peptide vaccine might be a good option for vibriosis prophylaxis.

디지털 포렌식 기법을 활용한 알려지지 않은 악성코드 탐지에 관한 연구 (A Study on Unknown Malware Detection using Digital Forensic Techniques)

  • 이재호;이상진
    • 정보보호학회논문지
    • /
    • 제24권1호
    • /
    • pp.107-122
    • /
    • 2014
  • DDoS 공격과 APT 공격은 좀비 컴퓨터들로 정해진 시간에 동시에 공격을 가하여 사회적 혼란을 유발하였다. 이러한 공격에는 공격자의 명령을 수행하는 많은 좀비 컴퓨터들이 필요하며 좀비 컴퓨터에는 안티바이러스 제품의 탐지를 우회하는 알려지지 않은 악성코드가 실행되어야한다. 그동안 시그니처로 탐지하던 안티바이러스 제품을 벗어나 알려지지 않은 악성코드 탐지에 많은 방법들이 제안되어 왔다. 본 논문은 디지털 포렌식 기법을 활용하여 알려지지 않은 악성코드 탐지 방법을 제시하고 정상 파일과 악성코드의 다양한 샘플들을 대상으로 수행한 실험 결과에 대하여 기술한다.

Molecular Docking Study of Naturally-derived Neuraminidase Inhibitors Isolated from Phellinus Baumii

  • Babu, Sathya
    • 통합자연과학논문집
    • /
    • 제8권3호
    • /
    • pp.209-213
    • /
    • 2015
  • Influenza A virus (H1N1) causes and spreads infectious diseases and becomes a major health threat in humans. Among the subtypes of influenza virus, neuraminidase (NA) plays an important role in viral life cycle and becomes an attractive therapeutic target. Currently two NA inhibitors namely Zanamivir and Oseltamivir are available for treating infectious diseases. Recently five naturally derived polyphenols extracted from Phellinus baumii was reported as inhibitors against NA. Molecular docking is powerful tool in computer aided drug designing which aids in exploring and elucidating the properties of the molecules from their 3D structure. Hence, in the present study, molecular docking was carried out on reported polyphenols isolated from ethanolic extract of fruiting bodies of Phellinus baumii. The objective of this work was to study the interaction and to propose the binding mode of these compounds within the binding site of H1N1 neuraminidase. The results showed these compounds had better binding energy and H-bond interactions with the important active site residues of the receptor which authenticate these compounds contributes to inhibitory activity of neuraminidase to treat influenza infection.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments

  • Qianfeng Lin;Jooyoung Son
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.644-662
    • /
    • 2023
  • There are still outbreaks of COVID-19 across the world. Ships increase the risk of worldwide transmission of the virus. Close contact tracing remains as an effective method of reducing the risk of virus transmission. Therefore, close contact tracing in ship environments becomes a research topic. Exposure Notifications API (Application Programming Interface) can be used to determine the encountered location points of close contacts on ships. Location points of close contact are estimated by the encountered location points. Risky areas in ships can be calculated based on the encountered location points. The tracking of close contacts is possible with Bluetooth technology without the Internet. The Bluetooth signal can be used to judge the proximity among detecting devices by using the feature that Bluetooth has a strong signal at close range. This Bluetooth feature makes it possible to trace close contacts in ship environments. In this paper, we propose a method for close contact tracing and showing the risky area in a ship environment by combining beacon and Exposure Notification API using Bluetooth technology. This method does not require an Internet connection for tracing close contacts and can protect the personal information of close contacts.

Identification of the+1 Ribosomal Frameshifting Site of LRV1-4 by Mutational Analysis

  • Kim Se Na;Choi Jung Ho;Park Min Woo;Jeong Sun Joo;Han Kyung Sook;Kim Hong Jin
    • Archives of Pharmacal Research
    • /
    • 제28권8호
    • /
    • pp.956-962
    • /
    • 2005
  • Leishmania virus (LRV)1-4 has been reported to produce a fusion of ORF2 and ORF3 via a programmed +1 frameshift in the region where ORF2 and ORF3 overlap (Lee et a/., 1996). However, the exact frameshift site has not been identified. In this study, we compared the frameshift efficiency of a 259bp (nt. 2565-2823), frameshift region of LRV1-4, and the 71 bp (nt. 2605-2678) sub-region where ORF2 and ORF3 overlap. We then predicted the frameshift site using a new computer program (Pseudoviewer), and finally identified the specific region associated with the mechanism of the LRV1-4's+1 frameshift by means of a mutational analysis based on the predicted structure of LRV1-4 RNA. The predicted structure was confirmed by biochemical analysis. In order to measure the frameshift efficiency, constructs that generate luciferase without a frameshift or with a+1 frameshift, were generated and in vitro transcription/translation analysis was performed. Measurements of the luciferase activity generated, showed that the frameshift efficiency was about $1\%$ for both the 259bp (LRV1-4 259FS) and 71 bp region (LRV1-4 71FS). Luciferase activity was strongly reduced in a mutant (LRV1-4 NH: nt. 2635-2670) with the entire hairpin deleted and in a mutant (LRV1-4 NUS: nt. 2644-2659) with the upper stem of the hairpin deleted. These results indicate that the frameshift site in LRV1-4's is in the 71 bp region where ORF2 and ORF3 overlap, and that nt. 2644-2659 (the upward hairpin stem) playa key role in generating the +1 frameshift.

마코프 프로세스에 기반한 확률적 피해 파급 모델 (A Probabilistic Model of Damage Propagation based on the Markov Process)

  • 김영갑;백영교;인호;백두권
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제33권8호
    • /
    • pp.524-535
    • /
    • 2006
  • 급속한 인터넷 기술의 발전으로 기업이나 기관에서의 업무 처리는 인터넷 기반 기술에 의존하고 있다. 또한 주요 정보통신 시설의 네트워크 의존도와 결합도가 증가함에 따라 시스템내의 취약성을 대상으로 하는 침해 행위와 같은 사이버 보안 사고의 수가 크게 증가하고 있다. 이에 따라 개인정보는 물론 컴퓨터 자원들의 침해와 관련된 피해 파급 (damage propagation)에 관한 연구가 요구된다. 그러나 기존의 제안된 모델들은 위험 관리 측면의 방법론적인 접근이거나, 바이러스 (virus) 나 웹 (worm) 같은 특정 위협 (threats) 에 대해서만 적용할 수 있는 연구가 진행되어 왔다. 따라서 본 논문에서는 과거의 위협 발생 데이타를 근거로 하여 전체 시스템이 가지고 있는 다양한 위협들에 대해 적용 가능한 마코프 프로세스 (markov process) 에 기반한 피해 파급 모델을 제시한다. 이를 통하여 각 위협별 발생 확률 및 발생 빈도를 예측할 수 있다.

스토리와 캐릭터 변이 시스템을 기반으로 한 액션게임 개발 (Implementation of Action Game based Story and Character Variation System)

  • 함혜인;고동원;강소은;김세연;김슬기;방준식;신수민;강명주;박찬일;오현주;김상중;이종원
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2014년도 제50차 하계학술대회논문집 22권2호
    • /
    • pp.499-502
    • /
    • 2014
  • 본 논문에서는 'M-virus'게임의 설명과 작업자들의 제작의도를 보여준다. 'M-virus'는 '꿀사주세요'팀의 졸업 작품 게임으로 딸의 감염을 치료하기 위해 숙주를 찾는 아버지의 스토리를 기반으로한 3인칭 액션게임이다. '캐릭터 변이'를 특징으로 플레이어의 성향에 따라 캐릭터를 자유자재로 바꿀 수 있으며 캐릭터마다의 고유 스킬로 다양한 플레이를 경험할 수 있다.

  • PDF

점증적 학습 퍼지 신경망을 이용한 적응 분류 모델 (An Adaptive Classification Model Using Incremental Training Fuzzy Neural Networks)

  • 이현숙
    • 한국지능시스템학회논문지
    • /
    • 제16권6호
    • /
    • pp.736-741
    • /
    • 2006
  • 분류 시스템은 데이터 전처리 모듈, 학습모듈, 의사결정모듈로 구성되어 있으며 지능형시스템의 중요한 구성요소로 활용되어왔다. 특히 학습모듈은 사전정보를 제공하므로 분류를 위한 핵심 역할을 수행하여 왔다. 기존의 학습을 위한 기법은 주로 승자독점방식으로 데이터를 처리하므로 경계가 불명확한 대부분의 실세계 응용에 적합하지 못하다. 또한 학습 알고리즘에 필요한 데이터를 한꺼번에 준비해야 하지만 이는 일반적으로 가능하지 않은 경우가 많다. 이를 위하여 본 논문에서는 점증적 학습 퍼지신경망, FNN-I,를 이용한 적응 분류모델을 설계한다. 이 모델에서는 유용하게 정보를 표현하기 위하여 퍼지이론을 도입하고 계속적으로 모여지는 데이터를 가지고 점증적으로 학습할 수 있는 알고리즘을 제시한다. 제안된 모델을 컴퓨터 바이러스 분류를 위한 실제 데이터에 적용하여 점증적으로 학습할 수 있고 효과적으로, 새로운 바이러스 데이터를 분류할 수 있음을 보인다.