• Title/Summary/Keyword: Internet Harmful Information

Search Result 94, Processing Time 0.026 seconds

Malicious User Suppression Based on Kullback-Leibler Divergence for Cognitive Radio

  • Van, Hiep-Vu;Koo, In-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1133-1146
    • /
    • 2011
  • Cognitive radio (CR) is considered one of the most promising next-generation communication systems; it has the ability to sense and make use of vacant channels that are unused by licensed users. Reliable detection of the licensed users' signals is an essential element for a CR network. Cooperative spectrum sensing (CSS) is able to offer better sensing performance as compared to individual sensing. The presence of malicious users who falsify sensing data can severely degrade the sensing performance of the CSS scheme. In this paper, we investigate a secure CSS scheme, based on the Kullback-Leibler Divergence (KL-divergence) theory, in order to identify malicious users and mitigate their harmful effect on the sensing performance of CSS in a CR network. The simulation results prove the effectiveness of the proposed scheme.

McDoT: Multi-Channel Domain Tracking Technology for Illegal Domains Collection

  • Cho, Ho-Mook;Lee, JeongYoung;Jang, JaeHoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.127-134
    • /
    • 2020
  • Recently, Harmful sites, including pornographic videos, drugs, personal information and hacking tool distribution sites, have caused serious social problems. However, due to the nature of the Internet environment where anyone can use it freely, it is difficult to control the user effectively. And the site operator operates by changing the domain to bypass the blockage. Therefore, even once identified sites have low persistence. In this paper, we propose multi-channel domain tracking technology, a technique that can effectively track changes in the domain addresses of harmful sites, including the same or similar content, by tracking changes in these harmful sites. Proposed technology is a technology that can continuously track information in a domain using OSINT technology. We tested and verified that the proposed technology was effective for domain tracking with a 90.4% trace rate (sensing 66 changes out of 73 domains).

Accident Prevention in Confined Space Using IoT Technology (IoT 기술을 활용한 밀폐공간에서의 사고 예방 연구)

  • Choi, Yoo-jung;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1159-1164
    • /
    • 2018
  • Recently, Internet use is increasing in various fields. Especially in the sudden disaster area, the role of Internet of things that can continuously monitor is getting bigger. In this study, the characteristics of the confined space and the environmental hazards are examined, and the Internet of the object which is being commercialized will be reviewed. Accidents in confined spaces are very high compared to other places, and it is very difficult to predict accidents. Recently, various attempts have been made to prevent accidents in confined spaces using the Internet of things. Especially, it detects the various gases that can occur in the closed space using sensors and sends them to the workers in real time, so that the risk can be detected in advance to minimize the risk. In this paper, we propose an effective disaster prevention plan using the Internet of things through the case study of the Internet for the prevention of accidents in a confined space.

Suggestions for Improvement of Youth Internet Regulation: Focusing on Youth Internet Regulation of the Major Country (청소년 인터넷규제 개선방향에 대한 제언: 주요국의 청소년 인터넷규제를 중심으로)

  • Song, Eun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.690-698
    • /
    • 2013
  • Advanced digital environment, ease of life would bring significant benefits, but rather indiscriminate access to information have occurred new social problems. Especially the youth and children using the Internet to increase in population resulting from harmful information on the Internet, concerns about the negative impact increases establish policies for the protection of youth and children emphasizes the importance of various activities international community. Despite major countries aim to self-regulation minimize the direct regulation through collaboration with the private sector cultivation and campaign, continuing education, Korea was analyzed that implement direct and coercive enforcement regulations such as 'internet game shut down' and insufficient social infrastructure to create activities. Therefore, in order to create a positive internet environment, self-regulation is essential with private experts and organizations based on cooperation and indirect regulation.

A Study of Internet Filtering for Public Information Resources (공공정보자원에서의 인터넷 필터링에 관한 연구)

  • Kim, You-Seung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.111-133
    • /
    • 2007
  • Illegal and harmful information on the Internet have been a great concern not only for regulatory authorities, but also all the public institutes, such as public libraries and schools, that provide Internet access service. In particular, for public libraries which play an important role in organizing, opening and providing information resources in the information society, providing Internet access service are indispensible. Therefore, any changes of Internet content regulatory system may have direct effects on services of public libraries. Due to unique characteristics of the Internet, content refutation on the Internet has made a best use of various regulatory methods, ranging from governmental regulation to self-refutation and technical regulatory methods. However, nation by nation. technical regulatory methods on the Internet have been developed in quite different ways. Applying them on public library has been strongly criticised for violating freedom of expression and rights of access to information. This article begins with a theoretical discussion about free speech rights and refutation on Internet. Then it examines filtering software which is one of the most popular technical regulatory methods based on both technical and socio-humanities' prospects and analyses several governments' regulatory approaches to Internet filtering. As a conclusion, issues concerning Internet filtering at public institutes are critically apprised.

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

Comparison of Internet Ethics between Gifted and General Students (영재학생과 일반학생의 인터넷 윤리의식 비교)

  • Lee, Jaeho;Lee, Kangmin
    • Journal of Creative Information Culture
    • /
    • v.5 no.1
    • /
    • pp.71-80
    • /
    • 2019
  • With the spread of smart phones, the Internet became a major 'space' of students' daily life and, at the same time, negative aspects of the internet are affecting their life. However, it doesn't seem that there is enough research on this subject. This study was conducted on 278 students in Gyeonggi. The results were as follows. First, gifted students' information and communication ethics index was higher than general students. Second, there was no statistically significant difference according to the gender of information and communication ethics index. Urban districts showed lower index in the upper grades than the lower grades. Third, about 10% of the students had experience of contact with harmful content, and about 1% of students had experienced cyber-wrongdoing. Through the results of this study, systematic education of IT ethics at the elementary school grade level can be expected to prevent school violence, improve information and communication culture, and serve as a future work ethic.

Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

  • Han, Byeong Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

The Design and Implementation of System for Blocking the Harmful Information on Client/server Environment (클라이언트/서버 환경에서 유해정보차단을 위한 시스템의 설계 및 구현)

  • 염태영
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.571-580
    • /
    • 2003
  • A intercepting program of Black List Filtering System is widely used for blocking the harmful information in the internet. Hut The Black List Filtering System give rise to reduce the performance of Client PC. In this thesis the author proposes the good way to solve a problem of the Black List Filtering System. Keep to the point that is puting the black List into The Black List Serve on Client/server Environment and building Black List into Client PC in use of revisiting pattern of web-user. The best effect that tried to Solve the problem in the experiment concerning the thesis is presented not only to maintain the performance of Client PC, but also to improve the speed of performance of Client PC.

  • PDF