• Title/Summary/Keyword: CyberSecurity

Search Result 1,611, Processing Time 0.035 seconds

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.

An Extended I-O Modeling Methodology based on FSM (유한상태기계에 기반한 확장된 I-O 모델링 방법론)

  • Oh, Soo-Yeon;Wang, Gi-Nam;Kim, Ki-Hyung;Kim, Kangseok
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Recently manufacturing companies have used PLC control programs popularly for their automated production systems. Since the life cycle of production process is not so long, the change of the production lines occur frequently. Most of changes happen with modification of the position information and control process of the equipment. PLC control program is also modified based on the fundamental process. Therefore, to verify new PLC program by configuring virtual space according to real environment is needed. In this paper we show a logical modeling method, based on Timed-FSA useful for sequence control and dead-lock prevention. There is a problem wasting user's labor and time when defining a variety of states in a device. To overcome this problem, we propose an extended I-O model based on existing methods by adding a token concept of Petri Nets. Also we will show the usability of the extended I-O modeling through user study.

Gender Difference on Trust in Internet-Only Banks Using the Multi-Group Path Analysis (다집단 경로 분석을 통한 남녀 간 인터넷전문은행의 신뢰 차이)

  • Nam, Sang-Wook;Hong, Eun-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.99-105
    • /
    • 2018
  • The purpose to this study is to analyze the difference of trust toward Internet-only bank into two groups according to the gender. We specially examined whether there is any gap in the determinant of trust. For this, we attempted to analyze the significance of the difference in the path coefficients between the gender through latent mean and path analysis. As a results, the difference of the determinant of trust between the male and the female group occurred in the factor of benefit and security. Moreover, it reconfirmed that trust are later strongly extended to relationship commitment. These findings suggest that it's very important to establish a trust with customers.

A Case Study on the Development of Learning-Instruction for Computer Network Courses and CCNA Certification (컴퓨터 네트워크 교과목 수업과 CCNA 인증을 위한 교수학습 개발에 관한 사례 연구)

  • Kim, No-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.229-240
    • /
    • 2013
  • This study critically review the textbooks and the syllabus of computer network courses currently used at universities, and the specifications of the certifications concerned to provide the students with the competitive and optimized course contents. Considering the vitality of the practicum in the computer network courses, we also suggest a new learning-instruction case study that focuses on the practice by analyzing the computer network practice test simulators which are certified nationally and the internationally. The proposed learning-instruction case study for computer network courses includes the weekly core lessons and contents, study goals and key points, the practice theme, handy tools based on two track of lecture and practice. Therefore it is expected to be a quite resourceful and practical teaching plan for the teacher, and a highly achievement of learning outcomes through motivation which can facilitate CCNA certification enrolling in the field of network aspect for the learner.

Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification

  • Wu, Chunming;Wang, Meng;Gao, Lang;Song, Weijing;Tian, Tian;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3917-3941
    • /
    • 2019
  • The recent interest in artificial intelligence and machine learning has partly contributed to an interest in the use of such approaches for hyperspectral remote sensing (HRS) imagery classification, as evidenced by the increasing number of deep framework with deep convolutional neural networks (CNN) structures proposed in the literature. In these approaches, the assumption of obtaining high quality deep features by using CNN is not always easy and efficient because of the complex data distribution and the limited sample size. In this paper, conventional handcrafted learning-based multi features based on expert knowledge are introduced as the input of a special designed CNN to improve the pixel description and classification performance of HRS imagery. The introduction of these handcrafted features can reduce the complexity of the original HRS data and reduce the sample requirements by eliminating redundant information and improving the starting point of deep feature training. It also provides some concise and effective features that are not readily available from direct training with CNN. Evaluations using three public HRS datasets demonstrate the utility of our proposed method in HRS classification.

An Analysis on the Status Quo of International Students' Media Information Literacy in Social Network Environment (소셜 네트워크 환경에서 국내 외국인 유학생의 미디어 정보 리터러시 현황분석)

  • Choi, Jin-Sik;Lee, Young-Suk;Uh, Je-Sun;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1323-1332
    • /
    • 2018
  • The purpose of this study is to analyze the level of Media Information Literacy of international students in K-university, who attend the courses in which the classes are delivered only in English. A survey was carried out to find out the level of media information literacy. In order to verify the validity and reliability of the measurement result gathered from the responses, an item analysis was carried out with SPSS21.0, a statistics analysis software, and the diversity of utilizing media information literacy was also measured according to the factors of each analysand group. The analysis result gathered through ${\chi}^2-test$, a frequency analysis tool, shows that international students use domestic media information literacy mainly for daily life activities such as the internet shopping and the bank transaction.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.