• Title/Summary/Keyword: Exploit site

Search Result 23, Processing Time 0.024 seconds

A Study on Characteristic Analysis and Countermeasure of Malicious Web Site (악성코드 유포 사이트 특성 분석 및 대응방안 연구)

  • Kim, Hong-seok;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.93-103
    • /
    • 2019
  • Recently, malicious code distribution of ransomware through a web site based on a drive-by-download attack has resulted in service disruptions to the web site and damage to PC files for end users. Therefore, analyzing the characteristics of the target web site industry, distribution time, application type, and type of malicious code that is being exploited can predict and respond to the attacker's attack activities by analyzing the status and trend of malicious code sites. In this paper, we will examine the distribution of malicious codes to 3.43 million websites in Korea to draw out the characteristics of each detected landing site, exploit site, and distribution site, and discuss countermeasures.

The Design of Optimized Type-2 Fuzzy Neural Networks and Its Application (최적 Type-2 퍼지신경회로망 설계와 응용)

  • Kim, Gil-Sung;Ahn, Ihn-Seok;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.8
    • /
    • pp.1615-1623
    • /
    • 2009
  • In order to develop reliable on-site partial discharge (PD) pattern recognition algorithm, we introduce Type-2 Fuzzy Neural Networks (T2FNNs) optimized by means of Particle Swarm Optimization(PSO). T2FNNs exploit Type-2 fuzzy sets which have a characteristic of robustness in the diverse area of intelligence systems. Considering the on-site situation where it is not easy to obtain voltage phases to be used for PRPDA (Phase Resolved Partial Discharge Analysis), the PD data sets measured in the laboratory were artificially changed into data sets with shifted voltage phases and added noise in order to test the proposed algorithm. Also, the results obtained by the proposed algorithm were compared with that of conventional Neural Networks(NNs) as well as the existing Radial Basis Function Neural Networks (RBFNNs). The T2FNNs proposed in this study were appeared to have better performance when compared to conventional NNs and RBFNNs.

A Comparative Study on the Development Cases of Relocated Urban Sites at Home and Abroad (국내.외 이전적지 활용 사례에 관한 비교연구)

  • Lee, Hwa-Ryoung;Dong, Jae-Uk;Kim, Jin-Su
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.4
    • /
    • pp.47-56
    • /
    • 2011
  • In recent years, the change of urban function and the decrease in birth rate have given rise to merge, abolition and relocation of the existing building in cities. This study explores the possibilities for various land utilizations of relocated urban sites. In doing so, it compares the development methods and the utilization pattern between home and abroad. It analyses the land use categories and the development methodologies of 4 relocated urban sites happened in Seoul and 4 foreign sites. In addition, it analyzes the land utilization after relocation, development principals, area, building usage and changes in land use regulation. Finally, it proposes the directions for developing relocated site and each of roles among the parties concerned. This study concludes that it is available to exploit the relocated urban sites by the variety of development methodologies, especially in a metropolis like Seoul.

A Study of Web Site Hacking Through Vulnerability Analysis (취약점 분석을 통한 Web Site 해킹 연구)

  • Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.303-306
    • /
    • 2010
  • Personal information being leaked, and personal assets that through a malicious web site for hackers to exploit. Other confidential information via the web site of the country, and your personal information by illegally accessing the data has been obtained who Hacker forces are operating in some countries. Due to the problem of web site management has many vulnerabilities that web sites, as well as programs. In this paper, in the trend world, as well as domestic XSS, SQL Injection, Web Shell analysis of the vulnerability to attacks and XSS, SQL Injection, Web Shell is a direct attack to attack. Security measures are presented what after the attack demonstrated the hack to data collection, analysis. In this study, web site management, web site security and safety can be improved and research will contribute.

  • PDF

Functional Assessments of Spodpotera Cell-expressed Human Erythrocyte-type Glucose Transport Protein with a Site-directed Mutagenesis

  • Lee, Chong-Kee
    • Biomedical Science Letters
    • /
    • v.14 no.2
    • /
    • pp.119-122
    • /
    • 2008
  • The baculovirus/insect cell expression system is of great value in the study of structure-function relationships in mammalian glucose-transport proteins by site-directed mutagenesis and for the large-scale production of these proteins for mechanistic and biochemical studies. In order to exploit this, the effects of substitution at the highly conserved residue glutamine 282 of the human erythrocyte-type glucose transporter have been examined by in vitro site-directed mutagenesis. The modified human transport protein has been expressed in Spodoptera frugiperda 21 cells by using the recombinant baculovirus AcNPV-GTL. To assess the functional integrity of the expressed transporter, measurements of the transport inhibitor cytochalasin B binding were performed, involving the membranes prepared from 4 days post infection with no virus, with wild-type virus or AcNPV-GTL virus. Data obtained showed that there was little or no D-glucose-inhibitable binding in cells infected with the wild type or no virus. Only the recombinant virus infected cells exhibited specific binding, which is inhibitable by D- but not by L-glucose. However, there was a notable reduction in the affinity for the potent inhibitor cytochalasin B when binding measurements of AcNPV-GTL were compared with those of AcNPV-GT, which has no substitution. It is thus suggested that although the modified and unmodified human transporters differed slightly in their affinity for cytochalasin B, the glutamine substitution did not interfere the heterologous expression of the human transporter in the insect cells.

  • PDF

A Study on the Appropriate Utilization of Relocated School Sites - Focused on the 'A' Elementary School in Eun-Pyoung Gu, Seoul - (학교 이전적지의 적정활용 방안에 관한 연구 - 서울시 은평구 'A' 초등학교를 중심으로 -)

  • Kim, Jin-Su;Kim, Chang-Shin;Kim, Hyoun-Ho;Dong, Jae-Wook;Lee, Hwa-Ryong
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.18 no.1
    • /
    • pp.29-38
    • /
    • 2011
  • ent years, the change of urban function and the decrease in birth rate have given rise to merge, abolition and relocation of the existing schools. This study explores the possibilities for various land utilizations of relocated school sites, using the trial case of 'A' elementary school in Eun-pyeong gu, Seoul. 'A' elementary school has happened transfer plan due to the urban development project of the redevelopment area, Eun-pyeong gu in Seoul. Firstly, it studies the land use categories and the development methodologies of 7 relocated school sites happened in Seoul. In addition, it analyzes the land utilization after relocation, development principals, area, building usage and changes in land use regulation. Finally, it proposes the commercial exploitation of school site targeting 'A' elementary school site. Throughout the profit analysis, this study concludes that it is available to exploit the relocated school sites by the variety of development methodologies, especially in a metropolis like Seoul.

  • PDF

Clonal Stratehy and Physiological Integration a Rhizomatous perennial Convallaria Keiskei I Ramet Growth and Clonal Structure (지하경생장식물인 은방울꽃의 영양생장전략과 생리적 통합 1. 라메트의 생장과 클론의 구조)

  • Choung, Yeon Sook
    • The Korean Journal of Ecology
    • /
    • v.19 no.6
    • /
    • pp.507-517
    • /
    • 1996
  • To explain the horizontal expansion of a rhizomatous perennial, Convallaria keiskei(lily-of-the-valley), in a study site of Chunchon, Kangwon Province, Korea, ramet growth and clonal structure were studied. Remarkable growth stategies were clarified. First, the timing for the successive phenological events such as sprouting. flowering and rhizome growth for lily-of-the-valley was fitted to exploit early spring when the canopy of overstory was opened. Second, these events were supported by effective matter allocation pattern: for example, two-year investment for new rhizomes enabled the first year ramets to mature in six weeks after sprouting and to grow up to 85% of the leaf area of perennial ramets. Finally, the ramet population was increased by local disturbances such as freezing, herbivory and collection by human. The rule that a clone was supposed to produce one new thizome per year was broken by occasional disturbances. Then, up to 5rhizomes from latent bur could be redeveloped. Based on clonal structure, 80% or total clones have from 1 to 4 ramets. this means there have occurred minor disturbances. Therefore, in conclusion, the successful flourishing of lily-of-the-valley came from its effective frowth strategy to take advantage of site disturbance.

  • PDF

Explorations of the Electrostatic Character of a Model of Human Immunodeficiency Virus Type 1 Integrase to Offer a Prediction for the Orientation and Nature of DNA binding

  • Jung, Eun-Sun;Kwon, Yong-Jung
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.163-171
    • /
    • 2006
  • Human immunodeficiency virus type 1 (HIV-1) integrase plays a critical role in the life cycle of the HIV virus. An ability to accurately map its electrostatic potential, and then use this information to predict the manner in which DNA will bind to the active site of the catalytic domain could provide a foundation for inhibitory design. Attempts to discern the crystal structure of HIV-1 integrase have proven problematic, especially in the region of enzymatic activity, that being those residues involved in the catalysis of the integration of viral DNA into the host cell. However, there is a structural correlation in to the region of interest with avian sarcoma virus (ASV), so a homology model utilizing this similarity was constructed to approximate the behavior/structure of the undetermined portions of the HIV-1 integrase crystal. After this model was constructed and its energy minimized, electrostatic calculations were carried out on the substance, so that an electrostatic potential map was constructed. Using this information, it was determined that DNA binding was oriented so as to exploit the regions of positive potential nearby the active site, as well as the positive potential of the magnesium cofactors.

  • PDF

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

Risk-based Security Impact Evaluation of Bridges for Terrorism (Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가)

  • Kang, Sang-Hyeok;Choi, Hyun-Ho;Seo, Jong-Won
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF