• Title/Summary/Keyword: Internet Harmful Information

Search Result 94, Processing Time 0.024 seconds

Finding the Information Source by Voronoi Inference in Networks (네트워크에서 퍼진 정보의 근원에 대한 Voronoi 추정방법)

  • Choi, Jaeyoung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.684-694
    • /
    • 2019
  • Information spread in networks is universal in many real-world phenomena such as propagation of infectious diseases, diffusion of a new technology, computer virus/spam infection in the internet, and tweeting and retweeting of popular topics. The problem of finding the information source is to pick out the true source if information spread. It is of practical importance because harmful diffusion can be mitigated or even blocked e.g., by vaccinating human or installing security updates. This problem has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. In this paper, we study the impact of an anti-information spreading on the original information source detection. We consider an active defender in the network who spreads the anti-information against to the original information simultaneously and propose an inverse Voronoi partition based inference approach, called Voronoi Inference to find the source. We perform various simulations for the proposed method and obtain the detection probability that outperforms to the existing prior work.

Detection of Harmful Images Based on Color and Geometrical Features (색상과 기하학적인 특징 기반의 유해 영상 탐지)

  • Jang, Seok-Woo;Park, Young-Jae;Huh, Moon-Haeng
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5834-5840
    • /
    • 2013
  • Along with the development of high-speed, wired and wireless Internet technology, various harmful images in a form of photos and video clips have become prevalent these days. In this paper, we suggest a method of automatically detecting adult images by extracting woman's nipple areas which represent obscenity of the image. The suggested algorithm first segments skin color areas in the $YC_bC_r$ color space from input images and extracts nipple's candidate areas from the segmented skin areas through the suggested nipple map. We then select real nipple areas by using geometrical information and determines input images as harmful images if they contain nipples. Experimental results show that the suggested nipple map-based method effectively detects adult images.

A Study on Children's Cosmetics Based on Analyzing Internet News and Best Items (인터넷 기사와 Best Item 분석을 통해 살펴본 어린이 화장품 연구)

  • Shim, Joonyoung
    • Journal of Fashion Business
    • /
    • v.22 no.2
    • /
    • pp.134-149
    • /
    • 2018
  • The number of children wearing make-up is increasing. "Children's cosmetics" is not a legal term though it is commonly used. The purpose of this study is to analyze discussions on children's cosmetics based on news articles found on the internet. This study also identifies what products are being distributed as children's cosmetics. Keyword searches were conducted using internet portal sites. Information was extracted from news articles and Best Item 100 for children's cosmetics. The results of analyzing news articles and Best Item 100 lists are as follows : 1. There were two main discussion topics in news articles. The first topic was related to marketing(the branding and trends of children's cosmetics). The other topic was about government regulations(side effects, harmful ingredients, control, regulations, attention, proper product usage, product categorization, and the overall safety of children's cosmetics). By 2014, many articles had covered government control and regulation. However, since 2017, news articles have focused on the product categorization and the concern for overall safety has dramatically increased. 2. Three different product categories have appeared in the Best Item 100; they are cosmetics, toys, and other products. In market, consumers recognized children's cosmetics as cosmetics and also as toys. Between 2017 and 2018's Best Item, other products are dramatically down, color cosmetics and single cosmetics are on the rise, and the purchase of domestic products has increased.

Primary user localization using Bayesian compressive sensing and path-loss exponent estimation for cognitive radio networks

  • Anh, Hoang;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2338-2356
    • /
    • 2013
  • In cognitive radio networks, acquiring the position information of the primary user is critical to the communication of the secondary user. Localization of primary users can help improve the efficiency with which the spectrum is reused, because the information can be used to avoid harmful interference to the network while simultaneity is exploited to improve the spectrum utilization. Despite its inherent inaccuracy, received signal strength based on range has been used as the standard tool for distance measurements in the location detection process. Most previous works have employed the path-loss propagation model with a fixed value of the path loss exponent. However, in actual environments, the path loss exponent for each channel is different. Moreover, due to the complexity of the radio channel, when the number of channel increases, a larger number of RSS measurements are needed, and this results in additional energy consumption. In this paper, to overcome this problem, we propose using the Bayesian compressive sensing method with a calibrated path loss exponent to improve the performance of the PU localization method.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

An Analysis of the state of Information and Communication Ethics awareness and Improvement - Centered on the Middle School in Gwangju City (정보통신 윤리의식의 실태 분석 및 개선 방안 - 광주시 중학교 중심으로)

  • Kim, Min-Jung;Lee, Sung-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.910-913
    • /
    • 2007
  • Information society, introduced by the rapid progress of computer technology and communication technology, has brought us the comfort and prosperity on every aspect of human life. However, the adverse and harmful effects of it, including the ethics problems, turn out to be serious. Concerning these problems, purpose of this study is set to investigate the actual state of ethics awareness on information and communication, since ethics awareness is required more urgently than ever in this era of technology. While adolescents, who will lead the future society, comprise the majority of internet usage population in our nation, they are exposed to the harmful and risky contents in the periods during which their world view would be established. Furthermore, the problems emerging in the progress towards information-oriented society are jeopardizing the dignity and inherent value of human being, therefore causing the serious moral chaos and social problems. In this paper, the awareness level of middle school students in Gwangju City has been investigated especially in the aspect of information and communication. Based on the results, it is revealed that the efforts of government, social organization, students' parents as well as the education circles are essential. Also the proposal for improvement on the awareness level has been presented.

  • PDF

Developing of VOC sensor Signal Processing System using Embedded System on the Web Environment (웹 환경에서 임베디드 시스템을 이용한 VOC센서 원격 신호 모니터링 시스템 개발)

  • Park, Jin-Kwan;Lim, Hae-Jin;Nam, Si-Byung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.375-383
    • /
    • 2011
  • Recent advances in digital technology and diversified internet services have resulted in a rapid growth of research on monitering systems using embedded web servers in USN systems. In designing USN systems equipped with wireless sensor modules requiring extra power for heating sensors for their appropriate operations, excessive power consumption introduces inefficiency to the entire system. In this paper, using embedded systems in web environment, we develop a remote-monitoring system with VOC (Volatile Organic Compounds) sensor signal, and propose a real time method of processing sensor-data streams by way of the serial bus from the sensor module in the USN system. The proposed system has an advantage of monitering the harmful gases on real-time basis and can be used semi-permanently by providing the sensor module with power through the serial bus. The harmful gas to be detected by the VOC sensor module is Toluene and the sensor module is composed of TGS-2602 VOC(Volatile Organic Compounds) sensors of FIGARO. The detected signal is transferred to the embedded web server using the RS-485 serial communication device. The proposed remote VOC monitering system is designed to coordinate in such a way that the VOC sensor module and embedded web server (EMPOS-II) work together effectively for real time monitering of harmful gases on the web at any places where the internet is connected.

Minimizing Sensing Decision Error in Cognitive Radio Networks using Evolutionary Algorithms

  • Akbari, Mohsen;Hossain, Md. Kamal;Manesh, Mohsen Riahi;El-Saleh, Ayman A.;Kareem, Aymen M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2037-2051
    • /
    • 2012
  • Cognitive radio (CR) is envisioned as a promising paradigm of exploiting intelligence for enhancing efficiency of underutilized spectrum bands. In CR, the main concern is to reliably sense the presence of primary users (PUs) to attain protection against harmful interference caused by potential spectrum access of secondary users (SUs). In this paper, evolutionary algorithms, namely, particle swarm optimization (PSO) and genetic algorithm (GA) are proposed to minimize the total sensing decision error at the common soft data fusion (SDF) centre of a structurally-centralized cognitive radio network (CRN). Using these techniques, evolutionary operations are invoked to optimize the weighting coefficients applied on the sensing measurement components received from multiple cooperative SUs. The proposed methods are compared with each other as well as with other conventional deterministic algorithms such as maximal ratio combining (MRC) and equal gain combining (EGC). Computer simulations confirm the superiority of the PSO-based scheme over the GA-based and other conventional MRC and EGC schemes in terms of detection performance. In addition, the PSO-based scheme also shows promising convergence performance as compared to the GA-based scheme. This makes PSO an adequate solution to meet real-time requirements.

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2067-2080
    • /
    • 2016
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.