• 제목/요약/키워드: Exploit site

검색결과 23건 처리시간 0.02초

악성코드 유포 사이트 특성 분석 및 대응방안 연구 (A Study on Characteristic Analysis and Countermeasure of Malicious Web Site)

  • 김홍석;김인석
    • 정보보호학회논문지
    • /
    • 제29권1호
    • /
    • pp.93-103
    • /
    • 2019
  • 최근 드라이브 바이 다운로드 공격 기반의 웹사이트를 통한 랜섬웨어 악성코드 유포로 인해 웹사이트 서비스 마비, 일반 이용자 PC 파일 손상 등의 피해가 발생하고 있다. 따라서 악성코드 경유지 및 유포지 사이트의 현황과 추이 파악을 통해 악성코드 유포의 공격 대상 웹사이트 업종, 유포 시간, 악용되는 어플리케이션 종류, 유포되는 악성 코드 유형에 대한 특성을 분석하는 것은 공격자의 공격활동을 예측하고 대응이 가능하다는 점에서 의미가 크다. 본 논문에서는 국내 343만개의 웹사이트를 대상으로 악성코드 유포여부를 점검하여 탐지된 악성코드 경유지 사이트, 익스플로잇 사이트, 악성코드 유포지 사이트별로 어떠한 특징들이 나타나는지를 도출하고, 이에 대한 대응방안을 고찰하고자 한다.

최적 Type-2 퍼지신경회로망 설계와 응용 (The Design of Optimized Type-2 Fuzzy Neural Networks and Its Application)

  • 김길성;안인석;오성권
    • 전기학회논문지
    • /
    • 제58권8호
    • /
    • pp.1615-1623
    • /
    • 2009
  • In order to develop reliable on-site partial discharge (PD) pattern recognition algorithm, we introduce Type-2 Fuzzy Neural Networks (T2FNNs) optimized by means of Particle Swarm Optimization(PSO). T2FNNs exploit Type-2 fuzzy sets which have a characteristic of robustness in the diverse area of intelligence systems. Considering the on-site situation where it is not easy to obtain voltage phases to be used for PRPDA (Phase Resolved Partial Discharge Analysis), the PD data sets measured in the laboratory were artificially changed into data sets with shifted voltage phases and added noise in order to test the proposed algorithm. Also, the results obtained by the proposed algorithm were compared with that of conventional Neural Networks(NNs) as well as the existing Radial Basis Function Neural Networks (RBFNNs). The T2FNNs proposed in this study were appeared to have better performance when compared to conventional NNs and RBFNNs.

국내.외 이전적지 활용 사례에 관한 비교연구 (A Comparative Study on the Development Cases of Relocated Urban Sites at Home and Abroad)

  • 이화룡;동재욱;김진수
    • 한국디지털건축인테리어학회논문집
    • /
    • 제11권4호
    • /
    • pp.47-56
    • /
    • 2011
  • In recent years, the change of urban function and the decrease in birth rate have given rise to merge, abolition and relocation of the existing building in cities. This study explores the possibilities for various land utilizations of relocated urban sites. In doing so, it compares the development methods and the utilization pattern between home and abroad. It analyses the land use categories and the development methodologies of 4 relocated urban sites happened in Seoul and 4 foreign sites. In addition, it analyzes the land utilization after relocation, development principals, area, building usage and changes in land use regulation. Finally, it proposes the directions for developing relocated site and each of roles among the parties concerned. This study concludes that it is available to exploit the relocated urban sites by the variety of development methodologies, especially in a metropolis like Seoul.

취약점 분석을 통한 Web Site 해킹 연구 (A Study of Web Site Hacking Through Vulnerability Analysis)

  • 송진영;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 춘계학술대회
    • /
    • pp.303-306
    • /
    • 2010
  • 웹사이트를 통한 해커들의 악의적인 웹 취약점 공격으로 개인정보와 개인자산이 유출되고 있다. 일부국가에서는 해커부대가 운용되어, 타 국가의 웹사이트를 통해 기밀정보 및 개인정보를 불법적으로 접근하여 자료를 획득하고 있다. 국내 웹사이트들은 프로그램뿐만 아니라 웹사이트 관리의 문제로 인해 많은 취약점을 갖고 있다. 본 논문에서는 국내뿐만 아니라 전 세계적으로 유행하는 XSS, SQL Injection, Web Shell 공격에 대한 취약점을 분석하고, XSS, SQL Injection, Web Shell 공격을 직접 공격한다. 공격 후에 해킹을 시연한 자료를 수집, 분석을 하여 보안 대응책을 제시한다. 본 연구는 웹사이트 보안과 안전한 웹사이트 관리를 향상 시킬 수 있는 기술연구에 이바지 할 것이다.

  • PDF

Functional Assessments of Spodpotera Cell-expressed Human Erythrocyte-type Glucose Transport Protein with a Site-directed Mutagenesis

  • 이종기
    • 대한의생명과학회지
    • /
    • 제14권2호
    • /
    • pp.119-122
    • /
    • 2008
  • The baculovirus/insect cell expression system is of great value in the study of structure-function relationships in mammalian glucose-transport proteins by site-directed mutagenesis and for the large-scale production of these proteins for mechanistic and biochemical studies. In order to exploit this, the effects of substitution at the highly conserved residue glutamine 282 of the human erythrocyte-type glucose transporter have been examined by in vitro site-directed mutagenesis. The modified human transport protein has been expressed in Spodoptera frugiperda 21 cells by using the recombinant baculovirus AcNPV-GTL. To assess the functional integrity of the expressed transporter, measurements of the transport inhibitor cytochalasin B binding were performed, involving the membranes prepared from 4 days post infection with no virus, with wild-type virus or AcNPV-GTL virus. Data obtained showed that there was little or no D-glucose-inhibitable binding in cells infected with the wild type or no virus. Only the recombinant virus infected cells exhibited specific binding, which is inhibitable by D- but not by L-glucose. However, there was a notable reduction in the affinity for the potent inhibitor cytochalasin B when binding measurements of AcNPV-GTL were compared with those of AcNPV-GT, which has no substitution. It is thus suggested that although the modified and unmodified human transporters differed slightly in their affinity for cytochalasin B, the glutamine substitution did not interfere the heterologous expression of the human transporter in the insect cells.

  • PDF

학교 이전적지의 적정활용 방안에 관한 연구 - 서울시 은평구 'A' 초등학교를 중심으로 - (A Study on the Appropriate Utilization of Relocated School Sites - Focused on the 'A' Elementary School in Eun-Pyoung Gu, Seoul -)

  • 김진수;김창신;김현호;동재욱;이화룡
    • 교육시설 논문지
    • /
    • 제18권1호
    • /
    • pp.29-38
    • /
    • 2011
  • ent years, the change of urban function and the decrease in birth rate have given rise to merge, abolition and relocation of the existing schools. This study explores the possibilities for various land utilizations of relocated school sites, using the trial case of 'A' elementary school in Eun-pyeong gu, Seoul. 'A' elementary school has happened transfer plan due to the urban development project of the redevelopment area, Eun-pyeong gu in Seoul. Firstly, it studies the land use categories and the development methodologies of 7 relocated school sites happened in Seoul. In addition, it analyzes the land utilization after relocation, development principals, area, building usage and changes in land use regulation. Finally, it proposes the commercial exploitation of school site targeting 'A' elementary school site. Throughout the profit analysis, this study concludes that it is available to exploit the relocated school sites by the variety of development methodologies, especially in a metropolis like Seoul.

  • PDF

지하경생장식물인 은방울꽃의 영양생장전략과 생리적 통합 1. 라메트의 생장과 클론의 구조 (Clonal Stratehy and Physiological Integration a Rhizomatous perennial Convallaria Keiskei I Ramet Growth and Clonal Structure)

  • Choung, Yeon Sook
    • The Korean Journal of Ecology
    • /
    • 제19권6호
    • /
    • pp.507-517
    • /
    • 1996
  • To explain the horizontal expansion of a rhizomatous perennial, Convallaria keiskei(lily-of-the-valley), in a study site of Chunchon, Kangwon Province, Korea, ramet growth and clonal structure were studied. Remarkable growth stategies were clarified. First, the timing for the successive phenological events such as sprouting. flowering and rhizome growth for lily-of-the-valley was fitted to exploit early spring when the canopy of overstory was opened. Second, these events were supported by effective matter allocation pattern: for example, two-year investment for new rhizomes enabled the first year ramets to mature in six weeks after sprouting and to grow up to 85% of the leaf area of perennial ramets. Finally, the ramet population was increased by local disturbances such as freezing, herbivory and collection by human. The rule that a clone was supposed to produce one new thizome per year was broken by occasional disturbances. Then, up to 5rhizomes from latent bur could be redeveloped. Based on clonal structure, 80% or total clones have from 1 to 4 ramets. this means there have occurred minor disturbances. Therefore, in conclusion, the successful flourishing of lily-of-the-valley came from its effective frowth strategy to take advantage of site disturbance.

  • PDF

Explorations of the Electrostatic Character of a Model of Human Immunodeficiency Virus Type 1 Integrase to Offer a Prediction for the Orientation and Nature of DNA binding

  • Jung, Eun-Sun;Kwon, Yong-Jung
    • 산업기술연구
    • /
    • 제26권B호
    • /
    • pp.163-171
    • /
    • 2006
  • Human immunodeficiency virus type 1 (HIV-1) integrase plays a critical role in the life cycle of the HIV virus. An ability to accurately map its electrostatic potential, and then use this information to predict the manner in which DNA will bind to the active site of the catalytic domain could provide a foundation for inhibitory design. Attempts to discern the crystal structure of HIV-1 integrase have proven problematic, especially in the region of enzymatic activity, that being those residues involved in the catalysis of the integration of viral DNA into the host cell. However, there is a structural correlation in to the region of interest with avian sarcoma virus (ASV), so a homology model utilizing this similarity was constructed to approximate the behavior/structure of the undetermined portions of the HIV-1 integrase crystal. After this model was constructed and its energy minimized, electrostatic calculations were carried out on the substance, so that an electrostatic potential map was constructed. Using this information, it was determined that DNA binding was oriented so as to exploit the regions of positive potential nearby the active site, as well as the positive potential of the magnesium cofactors.

  • PDF

웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구 (A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities)

  • 성종혁;이후기;고인제;김귀남
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.37-44
    • /
    • 2018
  • 오늘날 우리는 웹 사이트의 홍수 속에 살고 있으며, 다양한 정보를 얻기 위해서 인터넷을 통해 수많은 웹 사이트에 접속을 하고 있다. 하지만 웹 사이트의 보안성이 담보되지 않는다면, 여러 악의적인 공격들로부터 웹 사이트의 안전성을 확보할 수가 없다. 특히 금전적인 목적, 정치적인 목적 등 다양한 이유로 웹 사이트의 보안 취약점을 악용한 해킹 공격이 증가하고 있다. SQL-Injection, 크로스사이트스크립트(XSS), Drive-By-Download 등 다양한 공격기법들이 사용되고 있으며, 그 기술 또한 갈수록 발전하고 있다. 이와 같은 다양한 해킹 공격들을 방어하기 위해서는 웹 사이트의 개발단계부터 취약점을 제거하여 개발하여야 하지만, 시간 및 비용 등 여러 문제들로 인해 그러지 못하는 것이 현실이다. 이를 보완하기 위해 웹 취약점 점검을 통해 웹 사이트의 취약점을 파악하고 조치하는 것이 중요하다. 이에 본 논문에서는 웹 취약점 및 진단기법에 대해 알아보고 실제 웹 취약점 진단 사례를 통해 각 사례별 조치현황에 따른 개발단계에서의 취약점별 조치 우선 순위에 대해 알아보고자 한다.

  • PDF

Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가 (Risk-based Security Impact Evaluation of Bridges for Terrorism)

  • 강상혁;최현호;서종원
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2008년도 정기총회 및 학술발표대회
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF