• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.026 seconds

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

An Encrypted Botnet C&C Communication Method in Bitcoin Network (비트코인 네크워크에서의 암호화된 봇넷 C&C 통신기법)

  • Kim, Kibeom;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.103-110
    • /
    • 2022
  • Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.

A Study on the Use of RDW Data in Virtual Environment (가상환경에서 방향전환보행 데이터 활용 연구)

  • Lim, Yangmi
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.629-637
    • /
    • 2022
  • This study is an experiment on the use of RDW(Redirected Walking) technology, which helps users to hardly feel the difference of user movement in the limited physical space and the extended virtual space when the user moves while wearing the HMD in the real world. The RDW function installed in 3D space realization software such as Unity3D is used to induce the user's redirection by slightly distorting the virtual space according to the user's point of view. However, if the RDW distortion rate is used excessively, dissonance is highly likely to occur. In particular, it is easy to make errors that cause cybersickness of users. It is important to obtain the RDW data value in the virtual environment so that the user does not feel fatigue and cybersickness even after wearing the HMD for a long time. In this experiment, it was tested whether the user's RDW was safely implemented, and item and obstacle arrangement data were obtained through this experiment. The RDW data obtained as a result of the experiment were used for item placement and obstacle placement in the virtual space.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

An Expert Opinion Analysis Study for Improvement of Biotop Area Ratio Index (생태면적률 산정지표 개선방안을 위한 전문가 의견분석 연구)

  • Byeong-Hwa, Song
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.6
    • /
    • pp.438-448
    • /
    • 2022
  • This study is to improve the quantitative estimation index of biotop area ratio, which is an environmental planning index and environmental ecological planning technique, as a planning means that can induce the improvement of ecological soundness in the spatial planning stage. It is intended to identify the relative importance of space types and calculation indicators currently in operation, and to find alternatives through opinion analysis on improvement of space types and weights. As the method of this study, AHP analysis was performed to evaluate the relative importance of spatial types for in-depth analysis of spatial types and calculation indicators. In order to secure the reliability and objectivity of the study, 50 experts participated. Through this study, it can be linked with the improvement of technologies and construction methods, maintenance efficiency, economic feasibility, and construction technology, which are developed through analysis on the limitations and improvements by type of biotop area ratio. And it is expected to contribute to the improvement of the urban environment and vitalization of the biotop area ratio through the application of the biotop area ratio.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

A Study on the Exploration of English Learning Design Elements Applying Immersive Virtual Reality (몰입형 가상현실을 적용한 영어학습 설계요소 탐색에 관한 연구)

  • Choi, Dong-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.209-217
    • /
    • 2022
  • Virtual reality entered a new phase with the introduction of wearable devices represented by Oculus. This study proposes an immersive virtual reality based on Oculus Rift that enables direct immersion in virtual reality from a first-person perspective for English learning. At this point, it is meaningful to provide considerations when designing instruction for language learning through a comprehensive and integrated review of immersive virtual reality. Therefore, the main purpose of this study is to find a way to maximize the application of language education in the immersive virtual world. And for the design elements for English learning through immersive virtual reality, the setting of learning theory, consideration of differences in learning, selection of learning tasks, regulation of teachers' influence, determination of types of applied senses, flexibility of design, and usage environment were suggested. By integrating the results, various discussions and directions for instructional design were presented.

A Study on Optimal Ventilation Design for Gas Boxes Installed in Semiconductor Manufacturing Equipment Handling Flammable Liquids (인화성 가스를 취급하는 반도체 제조장비에 설치된 가스박스 최적 환기 설계에 대한 연구)

  • Gyu Sun Cho;Sang Ryung Kim;Won Baek Yang
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.1
    • /
    • pp.63-69
    • /
    • 2023
  • Although Korea is the world's No. 1 semiconductor producing country, most studies are conducted with risk assessment for simple material risks due to the closedness of the site for industrial protection. In terms of industrial safety, a monitoring system such as a gas detector to determine the leakage of hazardous substances has been established, but research on effectively discharging harmful gastritis substances in case of leakage has only recently begun. Semiconductor manufacturing facilities (gas boxes) where a large amount of flammable materials are handled are currently being safety managed by using a gas detector and blocking the air inlet. It is difficult to dilute in a short time in case of leakage of flammable substances. Therefore, in this study, based on various criteria, the size of the duct according to the size of the gas box is determined and the appropriate size of the air inlet is studied to minimize the exhaust performance requirement without exposing hazardous chemicals to the outside in the event of a flammable leak. We want to do an optimal exhaust design.