• Title/Summary/Keyword: Internet Harmful Information

Search Result 94, Processing Time 0.027 seconds

Minimizing Security Hole and Improving Performance in Stateful Inspection for TCP Connections (TCP연결의 스테이트풀 인스펙션에 있어서의 보안 약점 최소화 및 성능 향상 방법)

  • Kim, Hyo-Gon;Kang, In-Hye
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.443-451
    • /
    • 2005
  • Stateful inspection devices must maintain flow information. These devices create the flow information also for network attack packets, and it can fatally inflate the dynamic memory allocation on stateful inspection devices under network attacks. The memory inflation leads to memory overflow and subsequent performance degradation. In this paper, we present a guideline to set the flow entry timeout for a stateful inspection device to remove harmful embryonic entries created by network attacks. Considering Transmission Control Protocol (TCP) if utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that for all practical purposes one should not reserve memory for an embryonic TCP connection with more than (R+T) seconds of inactivity where R=0, 3, 9 and $1\leqq{T}\leqq{2}$ depending on the load level.

A Standardizing research of Internet adverse effects catalog from Societal phenomenological pointview (사회현상학 관점에서의 인터넷역기능 분류체계 표준화 연구)

  • Kwon, Jung-In;Lee, Seong-Chul;Ahn, Seong-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2011
  • Since IT technology grow rapidly, our ethic of consciousness has become big issue with adverse effect. Many scholar has discussed and tired to solve this problem, but it is still helpless to fix. Therefor in this paper, author will not suggest the solution, but will present model list of adverse effects and cases to prevent accidents. The model list of adverse effects, what author will present is about media addiction, harmful content, cyber-violence, right infringement, cyber terror and decision obstacle. This model list is made by primary and secondary survey. This model will show adverse effect of present day, but also will show future adverse effects that can be prevent. Through out this paper, this model list could use for education plan.

  • PDF

Estimating the Rumor Source by Rumor Centrality Based Query in Networks (네트워크에서 루머 중심성 기반 질의를 통한 루머의 근원 추정)

  • Choi, Jaeyoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.7
    • /
    • pp.275-288
    • /
    • 2019
  • In this paper, we consider a rumor source inference problem when sufficiently many nodes heard the rumor in the network. This is an important problem because information spread in networks is fast in many real-world phenomena such as diffusion of a new technology, computer virus/spam infection in the internet, and tweeting and retweeting of popular topics and some of this information is harmful to other nodes. This problem has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. Motivated by this, we study the impact of query that is asking some additional question to the candidate nodes of the source and propose budget assignment algorithms of a query when the network administrator has a finite budget. We perform various simulations for the proposed method and obtain the detection probability that outperforms to the existing prior works.

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.

Harmful Traffic Control Using Sink Hole Routing (싱크홀 라우팅을 이용한 유해 트래픽 제어)

  • Chang, Moon-Soo;Lee, Jeong-Il;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.69-76
    • /
    • 2009
  • The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it's hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.

A Study on Regulation of Video on Demand Advertisements (주문형서비스(Video on Demand) 광고 규제에 관한 연구)

  • Cho, Dae-keun;Kim, Ki-youn
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.145-159
    • /
    • 2016
  • This study points out the problems of absence of the legislation for standard regulation on Video on Demand(VoD) advertisement which grows so fast lately, for this it recommends making legal references, which have the definition of non-linear broadcasting & VoD advertisement and VoD advertisement standard regulation in the merged Broadcasting Act, and adopting co-regulation system. Pay TV operators providing VoD service have the opportunities to make money as subscribers uses it increasingly. In case of linear service, the Broadcasting Act regulates the advertisement strictly, but not the VoD ads. The reason why is that Korean legislation including the Broadcasting Act does not have legal reference to regulate it, instead of that, it rely on the self-regulation system which is operated by pay-tv players who provide the VoD ads. So, there is the limitation to protect the minors such as children and youth from the harmful VoD ads, to be invulnerable for advertisers to influence to advertising agents, and to ensure the regulatory effectiveness under player-centric self-regulatory regime. In this context, this study analyses the how to regulate VoD ads standard with a three-pronged approach. First, it analyses the VoD ads regulation system in overseas countries, UK, Canada, EU and Ireland. Each country has the legal reference to regulate it in the Broadcasting Act or lower statures and adopts the co-regulatory regime the NRA and the 3rd entity operate together. Second, it reviews the objectives and scope of VoD ads standard. This study recommends that the objective of it is users protection and the scope of it is standard regulation not commercial practice. Third, this study researches how to legislate for regulation of VoD ads standard. Considering VoD service's characteristics(non-linear service) and legal position of Ads agency(i.e. pay tv operators), it suggest that legal reference will be in the integrated Broadcasting bill, which is the general law, not individual. If it is available to regulate VoD ads standard with co-regulatory regime, it expects the enhancement of user protection from the harmful VoD ads and make up sustainability of the pay-tv players' self-regulation.

A Smartphone Addiction and Disease Prevention System Through the Collection and Analysis of Smartphone Usage Patterns (스마트폰 사용 패턴 수집 및 분석을 통한 스마트폰 중독 및 질병 예방 시스템)

  • Ryu, Myeong-Un;Ryu, Yo-Han;Hyun, WooSeok;Lim, Jiyoung;You, Ilsun;Jeong, Hae-Duck
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.95-104
    • /
    • 2015
  • In recent years, in accordance with the rapidly increasing number of smartphone users, various social problems have started to occur. Examples of these problems are the overuse of smartphones and bad usage habits of smartphone users that can cause new social problems such as smartphone addiction and other smartphone related diseases. With the aim of preventing these social problems, this paper proposes a new smartphone addiction and disease prevention system. This system was developed by collecting and analyzing smartphone usage patterns. This proposed system analyzes the usage patterns and working hours of smartphone users in real time. If the detected smartphone usage patterns reach a dangerous level, the system will send warning messages to the user. This will enable users to recognize the unhealthy situation in advance by themselves. In addition, this solution could possibly prevent smartphone addiction and other smartphone related illness by preventing overuse and encouraging abstinence from using smartphones to the extent that it becomes harmful to the user.

Apple eases up on SDK policy: Avoiding antitrust? or strategic decision? (Apple의 폐쇄적 SDK정책 포기의 함의: 반독점성 시비의 회피와 전략적 결정)

  • Kim, Joon-Young;Park, Jin-Kyung;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.135-144
    • /
    • 2010
  • Apple recently announced a new policy about software development kit that banned the use of tools that convert apps built on other platforms into iPhone apps. Therefore, Adobe cannot develop their software to AppStore that inquire to the Department of Justice and the Federal Trade Commission about antitrust actions. Someone argue that Apple try to exclusive smartphone market such as the Microsoft antitrust lawsuit in 1998, but this case is essentially different. First, it need to define Apple's software development kit for iPhone and iPad is whether antitrust or not. Because of the characteristics of two-sided market in Smartphone Apple's iPhone cannot monopoly in cellphone or smartphone market, but it can be an antitrust in application store market. However, Apple re-announced new software development kit policy that shows positive results. Instead of hastily intervened regulatory agencies, the DOJ or the FTC, it is quite desirable that watching the interaction between companies that whether market failures or not and if it's harmful for consumer's benefit. Adobe attack Apple to advocate consumers and developers freedom of choice, but the most important thing is conclusion based on a comprehensive analysis need to objective point of view that Apple do whether antitrust act or not and damage to developers and consumers who are both side of platform.

Formulating Strategies from Consumer Opinion Analysis on AI Kids Phone using Text Mining (AI 키즈폰의 소비자리뷰 분석을 통한 제품개선 전략에 대한 연구)

  • Kim, Dohun;Cha, Kyungjin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.71-89
    • /
    • 2019
  • In order to come up with satisfying product and improvement, firms use traditional marketing research methods to obtain consumers' opinions and further try to reflect them. Recently, gathering data from consumer communication platforms like internet and SNS has become popular methods. Meanwhile, with the development of information technology, mobile companies are launching new digital products for children to protect them from harmful content and provide them with necessary functions and information. Among these digital products, Kids Phone, which is a wearable device with safe functions that enable parents to learn childern's location. Kids phone is relatively cheaper and simpler than smartphone but it is noted that there are several problems such as some useless functions and frequent breakdowns. This study analyzes the reviews of Kids phones from domestic mobile companies, identifies the characteristics, strengths and weaknesses of the products, proposes improvement methods strategies for devices and services through SNS consumer analysis. In order to do that customer review data from online shopping malls was gathered and was further analyzed through text mining methods such as TF/IDF, Sentiment Analysis, and network analysis. Customer review data was gathered through crawling Online shopping Mall and Naver Blog/$Caf\acute{e}$. Data analysis and visualization was done using 'R', 'Textom', and 'Python'. Such analysis allowed us to figure out main issues and recent trends regarding kids phones and to suggest possible service improvement strategies based on sentiment analysis.

A Study on the Factors that Influence Adult Cyberbullying - focusing on the mediation effect on the attitude to cyberbullying (성인의 사이버폭력 가해 경험에 대한 영향 요인 연구 - 사이버폭력에 대한 태도의 매개효과를 중심으로)

  • Kim, Bong-Seob
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.57-80
    • /
    • 2021
  • This study aimed to identify the causes of adult cyberbullying, an issue which arouses little academic interest despite its seriousness and its harmful consequences, in order to provide basic data for the formulation of reasonable measures for preventing and reducing adult cyberbullying. To that end, the author of the study analyzed the results of the government-led Cyber Violence Survey conducted in 2019. First, the online survey panel owned by the research company selected a sample of 1,500 adult men and women in their 20s to 50s in proportion to reflect the composition of the local population. The survey was conducted online, with male subjects and female subjects accounting for 51.5% and 48.7% of the respondents, respectively. The result of the analysis shows that the respondents' attitude towards cyberbullying was fully mediaed according to such factors as gender, age, family relations, relationship with colleagues, Internet usage time, and contact with illegal content. In addition, partial mediation was observed with regard to online delinquency colleague numbers and cyberbullying victimization. As a result, the respondents' attitude towards cyberbullying was found to be the most important factor affecting adult cyberbullying. Based on these results, this study suggests that the formation of a non-conservative attitude towards cyberbullying should be considered to be more important than any other factors when preparing programs aimed at preventing cyberbullying.