• Title/Summary/Keyword: Illegal information

Search Result 771, Processing Time 0.021 seconds

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

An Effective Counterattack System for the Voice Spam (효과적인 음성스팸 역공격 시스템)

  • Park, Haeryong;Park, Sujeong;Park, Kangil;Jung, Chanwoo;KIM, Jongpyo;Choi, KeunMo;Mo, Yonghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1267-1277
    • /
    • 2021
  • The phone number used for advertising messages and voices used as bait in the voice phishing crime access stage is being used to send out a large amount of illegal loan spam, so we want to quickly block it. In this paper, our system is designed to block the usage of the phone number by rapidly restricting the use of the voice spam phone number that conducts illegal loan spam and voice phishing, and at the same time sends continuous calls to the phone number to prevent smooth phone call connection. The proposed system is a representative collaboration model between an illegal spam reporting agency and an investigation agency. As a result of developing the system and applying it in practice, the number of reports of illegal loaned voice spam and text spam decreased by 1/3, respectively. We can prove the effectiveness of this system by confirming that.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

DRM Implementation by Multimedia Fingerprint (멀티미디어 핑거프린트에 의한 DRM 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.

Security Problems and Protection Methods in Remote Control Communication for Mobile Robots Using Wireless IP Network

  • Mizoguchi, Hiroshi;Teshiba, Masashi;Goto, Yoshiyasu;Hidai, Ken-Ichi;Shigehara, Takaomi;Mishima, Taketoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.401-406
    • /
    • 1998
  • If a mobile robot can be controlled remotely via the internet using wireless IP protocol network, it becomes much useful and convenient. However risk of illegal access is also increased. This paper discusses problems of the illegal access and proposes protection methods against the access.

  • PDF

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

A Study on Deep Learning Model for Discrimination of Illegal Financial Advertisements on the Internet

  • Kil-Sang Yoo; Jin-Hee Jang;Seong-Ju Kim;Kwang-Yong Gim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.21-30
    • /
    • 2023
  • The study proposes a model that utilizes Python-based deep learning text classification techniques to detect the legality of illegal financial advertising posts on the internet. These posts aim to promote unlawful financial activities, including the trading of bank accounts, credit card fraud, cashing out through mobile payments, and the sale of personal credit information. Despite the efforts of financial regulatory authorities, the prevalence of illegal financial activities persists. By applying this proposed model, the intention is to aid in identifying and detecting illicit content in internet-based illegal financial advertisining, thus contributing to the ongoing efforts to combat such activities. The study utilizes convolutional neural networks(CNN) and recurrent neural networks(RNN, LSTM, GRU), which are commonly used text classification techniques. The raw data for the model is based on manually confirmed regulatory judgments. By adjusting the hyperparameters of the Korean natural language processing and deep learning models, the study has achieved an optimized model with the best performance. This research holds significant meaning as it presents a deep learning model for discerning internet illegal financial advertising, which has not been previously explored. Additionally, with an accuracy range of 91.3% to 93.4% in a deep learning model, there is a hopeful anticipation for the practical application of this model in the task of detecting illicit financial advertisements, ultimately contributing to the eradication of such unlawful financial advertisements.

Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

  • Han, Byeong Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.

Design of document security to maximize knowledge value (지식가치를 극대화하기 위한 다큐먼트 보안 디자인)

  • Jang, Deok-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.161-170
    • /
    • 2003
  • Knowledge management system building knowledge acquisition, knowledge share, and knowledge maintenance for the member of corporation is expanded throughout whole industry to cope with rapid business environment. Electronic document basing knowledge management system can copy, print, and transfer knowledge to another party, so it is being regarded as a essential infrastructure to share knowledge. However, considering most of information leakage is sprung up by insider of organization, it is considered to provide countermeasure to protect illegal use from information leakage. The purpose of this paper is to establish digital information security system through design of document and manage digital information assets safely through electronic document security system protecting illegal leakage of digital information assets.

  • PDF