• Title/Summary/Keyword: Internet Information Collection

Search Result 449, Processing Time 0.029 seconds

A Study on Data Acquisition of IoT Devices Intrusion (사물인터넷 기기 침해사고 데이터 수집 방안 연구)

  • Jong-bum Lee;Ieck-Chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.537-547
    • /
    • 2023
  • As Internet of Things (IoT) technology evolves, IoT devices are being utilized in a variety of fields. However, it has become a new surface of cyber attacks and is affecting industries that did not previously consider cyber breaches. After a intrusion occurs, post-processing and damage spread prevention are important, but it is difficult to respond due to the lackof standards and guidelines. Therefore, in order to respond to such incidents, this paper establishes an incident data collection procedure and presents the data that can be collected to improve the intrusion data acquisition method for general IoT devices. In addition, we proved the efficiency and feasibility of the data collection procedure through experiments.

Implementation of Smart Monitoring System based on Breathing Sensor

  • Cha, jin-gil;Kim, Seong-Kweon
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.36-41
    • /
    • 2022
  • In the 21st century, information collection and information provision based on digital informatization and intelligent automation are emerging as one of the social problems in the society for the elderly and the vulnerable groups in the welfare society including the disabled, and various methods are being studied to find realistic alternatives. Among these factors, the problem of the elderly living alone is emerging as the most serious, and as a realistic approach to solve some problems by applying information devices, it is a monitoring system using the Internet of Things(IoT). The need for an optimized system is emerging. In this study, the state of the elderly and the elderly living alone can be measured remotely by applying IoT technology. We present the research cases of a Breathing Sensor-based Smart Monitoring System that is used as a smart information system and used as a monitoring system for the elderly and infirm when it is identified as deceased through state detection

The study on SLA system architecture for IP TV (IP TV를 위한 SLA 시스템 구조에 관한 연구)

  • Kim, Seong-Hwan;Lee, Gil-Haeng
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.47-52
    • /
    • 2005
  • In this paper we describe SLA metrics and software architecture for newly upcoming IP TV service. Firstly we show the general description for IP TV. This consists of brief description of IP TV, the general figure of configuration and elements of IP TV network and communication protocol stack of IP TV data transmission for deriving communication quality parameter. And we propose SLA metrics depending on quality measurement point. According to the measurement point the measurable SLA metrics are different. The total view of the IP TV SLA measurement and management architecture is shown. When the quality measurement point is the routers that consist of internet node, the IP media NMS is the quality collection system. And when the quality measurement point is the IP TV STB(Set-Top Box), the IP media collector and Quality Collection Server are the quality collection system. And we show the software block diagram of IP TV SLA processing system and the other related network management systems.

  • PDF

A Study evidence collection and analysis procedures for smartphone forensic (스마트폰 포렌식을 위한 증거수집 및 분석절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.463-466
    • /
    • 2012
  • Smartphones along with the development of crime evidence has been using smartphones. Phone's internal storage medium can be used as evidence in the case of images, video, phone, GPS information, there are Internet access and other data records. Therefore, these data to collect evidence of a systematic procedure for collecting and analyzing evidence is needed. In this paper, the target mobile phone forensics forensic evidence collection, evidence analysis, and reporting results to the procedures and how to draw. Through this paper, phone forensics and will serve as a basis for the investigation.

  • PDF

System Design for Effective Data Collection and Analysis (효율적인 정보 추출을 위한 자료 집계 및 분석 시스템의 설계 및 구현 방안)

  • Cho, Kwang-Hyun;Park, Hee-Chang
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2006.04a
    • /
    • pp.307-315
    • /
    • 2006
  • Distributing information on the internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information. But instant messengers are gaining popularity abroad and domestically because of their immediate responses. Instant messaging has become the fastest growing communication technology in recent years. Instant messaging is effectively a chat room of two people. Users that have accounts with the same provider are able to send messages via computer in real time. Instant messaging has exploded into the business world as companies utilize the technology for everything from interoffice communication to client/customer communication. In this paper, we propose a system design for effective data collection and statistical analysis.

  • PDF

Specificity and Commitment: UX approach to Netflix

  • Hwang, Joon Suk;Cheon, Youngjoon;Kwak, Kyu Tae
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.127-136
    • /
    • 2017
  • The strategy that using data collection from Netflix uses for its services is different from traditional human interaction and the communication, and it is represented by the systematic algorithm that rooted from intelligent information system based on the human interaction and communication. These characteristics allowed the study to reflect the influence of 'Asset specificity' which affects the continuous consumption of the media services of Netflix users through economic psychological analysis based on transactional cost economics. The result from the survey on actual Netflix users, three types of specificity (Space specificity, time specificity, relational specificity) reduced perceived searching cost whereas perceived instrumentality has increased, eventually reinforces the commitment to the service. This implies that the service characteristics of Netflix, trying to communicate with the individuals based on intelligent information system are distinct from the existing platform services and it gives the significance of work very effective for user's continuous consumption of the media services.

Deep Learning-based Delinquent Taxpayer Prediction: A Scientific Administrative Approach

  • YongHyun Lee;Eunchan Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.30-45
    • /
    • 2024
  • This study introduces an effective method for predicting individual local tax delinquencies using prevalent machine learning and deep learning algorithms. The evaluation of credit risk holds great significance in the financial realm, impacting both companies and individuals. While credit risk prediction has been explored using statistical and machine learning techniques, their application to tax arrears prediction remains underexplored. We forecast individual local tax defaults in Republic of Korea using machine and deep learning algorithms, including convolutional neural networks (CNN), long short-term memory (LSTM), and sequence-to-sequence (seq2seq). Our model incorporates diverse credit and public information like loan history, delinquency records, credit card usage, and public taxation data, offering richer insights than prior studies. The results highlight the superior predictive accuracy of the CNN model. Anticipating local tax arrears more effectively could lead to efficient allocation of administrative resources. By leveraging advanced machine learning, this research offers a promising avenue for refining tax collection strategies and resource management.

Authentication Method for Safe Internet of Things Environments (안전한 사물 인터넷 환경을 위한 인증 방식)

  • Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.1
    • /
    • pp.51-58
    • /
    • 2015
  • Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

The Effects of Factors for Choosing Sports Media as a Leisure Activity of College Students on Internet Sports Consumption (대학생의 여가 활동으로서 스포츠 미디어 선택 요인이 인터넷 스포츠 소비에 미치는 영향)

  • Hwang, Sun-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.244-251
    • /
    • 2008
  • The purpose of the study was to be aware of the types of leisure activity of the college students and to investigate factors for choosing the internet sports, and then to examine the effects of these factors on the consumption of the internet sports. A total of 412 college students participated in this study. The results of this study were as follows: 1) There was difference in the leisure type between male and female college students. 2) The amount of leisure time associated with sports of male college students was statistically greater than one of female college students. 3) The leisure time spent for the sports media of male college students was statistically greater than one of female college students. 4) The leisure time spent for the sports media of college students was prioritized for the TV, followed by the internet, newspapers, and the radio. 5) The results of the factor analysis indicated that the factors influencing choice of the internet sports consisted of the indirect experience, information collection, and accessibility. 6) Only information collection out of these factors positively influenced the increase of consumption of the internet sports. Above results could be evidence for that the internet is very important area for the sports consumption. Therefore, it requires more substantial research and investment of attention for the internet area because the internet is one of rapidly skyrocketing new areas in the leisure industry.

Implementation of RFID Data Transmission System using Wireless LAN (Wireless LAN 기반 RFID 데이터 전송시스템 구현)

  • 백수열;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.41-44
    • /
    • 2004
  • A RFID(Radio Frequency IDentification) system Is a kind of Radio Frequency Communication System and a branch of Automatic Data Collection System. The RFID System is composed of RF Tag(or Transponder) and RFID Reader(controller). This paper deal with Wireless communications that acquired RF Tag ID by RFID reader, and then target system will transmit Tag ID to RFID Server through the internet using Wireless LAN. The RFID system of Todays are commonly used by a wired RFID system. In this system uses commonly used Wireless LAN, and then we can connect the internet if we have a AP(Wireless Lan Access Point). Internet connection can make a transmission of RF Tag ID, and can make a reception of returning data that are images or information.

  • PDF