• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.035 seconds

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

An Educational Service Platform using Collective Intelligence and Presence of Web 2.0

  • Kim, Chang-Suk;Son, Dong-Cheul;Cho, Chung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.115-121
    • /
    • 2009
  • Web 2.0 has become the face next generation Web among the business world and research community. Web 2.0 is instant superficial gratification of people. On the other hand, Semantic Web is deep, meaningful and lasting relationship with data. So, it is difficult to apply the Semantic Web to the real world. In this paper, a platform for educational services using the Semantic Web and Web 2.0 is proposed. The proposed platform is based mix of the Semantic Web and Web 2.0, so it is useful to apply in the real world applications. Two services are presented, one is a semantic email system and the other is a cyber study space. The cyber study space adjusted each student is presented. The study environment is called iStudySpace that has personal scheduler, study status plan table, personalized search engine and several gadgets. Finally characteristics and limitations of the Semantic Web and Web 2.0, the organization and components of the platform, evaluation of iStudySpace are shown.

Cyber-Physical Computing: Leveraging Cloud computing for Ubiquitous Healthcare Applications (사이버 물리 컴퓨팅 : 유비쿼터스 건강 관리 응용에 대한 레버리징 클라우드컴퓨팅)

  • Abid, Hassan;Jin, Wang;Lee, Sung-Young;Lee, Young-Koo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.41-43
    • /
    • 2011
  • Cyber-Physical Systems are tight integration of computation, networking and physical objects to sense, monitor, and control the physical world. This paper presents a novel architecture that combines two next generation technologies i.e. cyber-physical systems and Cloud computing to develop a ubiquitous healthcare based infrastructure. Through this infrastructure, patients and elderly people get remote assistance, monitoring of their health conditions and medication while living in proximity of home. Consequently, this leads to major cost savings. However, there are various challenges that need to be overcome before building such systems. These challenges include making system real-time responsive, reliability, stability and privacy. Therefore, in this paper, we propose an architecture that deals with these challenges.

Design and Implementation of ATP(Advanced Persistent Threat) Attack Tool Using HTTP Get Flooding Technology (HTTP Get Flooding 기술을 이용한 APT(지능적 지속 위협)공격 도구의 설계와 구현)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.65-73
    • /
    • 2011
  • As we can see from the recent cyber attack, APT(Advanced Persistent Threat) is trend of hacking attack in the World. Thus, HTTP Get Flooding attack is considered to be one of the most successful attacks in cyber attack method. In this paper, designs and implements new technique for the cyber attack using HTTP get flooding technology. also, I need a defence about DDoS attack through APT Tools.

  • PDF

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

A Study on cost damage of Cyber Attacks and their Impact on Stock Market (사이버공격으로 인한 기업의 피해 비용과 주식시장에 미치는 영향)

  • Oh Il-Seok;Lee Seok-Yun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.63-68
    • /
    • 2006
  • Cyber Attacks have increased damages constantly in all over the world for several years. A survey said the cost caused by Cyber Attacks had increased 225 times from 1996 to 2003. It is very difficult to calculate the cost by the Attacks exactly but the calculating the cost of cyber attacks would be great helpful for a company to decide how much budget to spend to Information Security. In this research we could reach the conclusion : the cyber attacks has decreased the stock price of the companies, especially pure internet companies. But the stock market has not greatly impacted by the types of Cyber Attacks. Korean stock market also impacted by the Internet Destruction Accident happened Jan. 25. 2003. On the basis of this study we will recommend a policy or a regulation which force board of directors and officers of a company to have information security liability.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

A Study on the Cyber motion sickness of VR Content -Focused on Content Environment- (VR 콘텐츠 사이버 멀미에 관한 연구 -콘텐츠 환경을 중심으로-)

  • Koo, Ja-yoon;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.135-140
    • /
    • 2019
  • This study is aimed at analyzing cyber motion sickness factors focus on virtual environment-based VR and real-world VR. First literature study of cyber motion sickness, 3D animations and documentaries were conducted. As a measurement tool for the degree of motion sickness, the symptom values were measured in a standardized SSQ (Simulator Sickness Questnire) questionnaire. Following the measurement, an in-depth interview was conducted based on the SSQ questionnaire. The results are as follows, First, actual environment based VR caused bigger cyber motion sickness, second, values of strong saturation of VR contents cause cyber motion sickness. This study is expected to be used as design guidelines for configuring VR early contents and to be used for cyber motion sickness research.

Design and Implementation of web based cyber counseling system (웹기반 사이버 상담시스템의 설계 및 구현)

  • Lee Jae-Inn
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.21-39
    • /
    • 2003
  • Many people including teachers and students' parents must assist each student who will be a hero of future to develop their potential abilities and acquire various skills. Counseling is a fundamental thing to achieve this goal. But, in reality, it is usually difficult to do counseling which makes it possible to establish desirable self-view and world view expertly and systema tically because of burdensome task of teachers, spatial and time limit and students' extracurri cular activities. Taking advantages of computer networking, this research was designed to solve various problematic situations we can usually face with in school and home, to reduce limitations among three parties: teachers, parents and students, and to keep record continuously on the process and contents of counseling. And, also, this research is focused to web-based counseling network that makes possible to build database system easily adapts to specialty of each schools. Web based counseling system will provide these advantages: 1. Through analyzing and editing which will be done by expert In of accumulated database, to realize more systematic and expert database will be possible. 2. Owing to the physical characteristic of cyber space, counseling will be done any time and anywhere the computer is. 3. Because it is possible to minimize social limitations on physical condition, communication channel and anonymity of cyber space, counseling will be relatively easy to perform. 4. The contents of counseling will be automatically recorded on the database.

  • PDF

Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.204-214
    • /
    • 2022
  • Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.