• Title/Summary/Keyword: Internet Information Collection

Search Result 452, Processing Time 0.028 seconds

The Effects of Factors for Choosing Sports Media as a Leisure Activity of College Students on Internet Sports Consumption (대학생의 여가 활동으로서 스포츠 미디어 선택 요인이 인터넷 스포츠 소비에 미치는 영향)

  • Hwang, Sun-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.244-251
    • /
    • 2008
  • The purpose of the study was to be aware of the types of leisure activity of the college students and to investigate factors for choosing the internet sports, and then to examine the effects of these factors on the consumption of the internet sports. A total of 412 college students participated in this study. The results of this study were as follows: 1) There was difference in the leisure type between male and female college students. 2) The amount of leisure time associated with sports of male college students was statistically greater than one of female college students. 3) The leisure time spent for the sports media of male college students was statistically greater than one of female college students. 4) The leisure time spent for the sports media of college students was prioritized for the TV, followed by the internet, newspapers, and the radio. 5) The results of the factor analysis indicated that the factors influencing choice of the internet sports consisted of the indirect experience, information collection, and accessibility. 6) Only information collection out of these factors positively influenced the increase of consumption of the internet sports. Above results could be evidence for that the internet is very important area for the sports consumption. Therefore, it requires more substantial research and investment of attention for the internet area because the internet is one of rapidly skyrocketing new areas in the leisure industry.

Design and Analysis of User's Libraries for Parallel Computing based on the Internet (인터넷 기반의 병렬 컴퓨팅을 위한 사용자 라이브러리 설계 및 성능 분석)

  • Sin, Pil-Seop;Jeong, Jun-Mok;Maeng, Hye-Seon;Hong, Won-Gi;Kim, Sin-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2932-2945
    • /
    • 1999
  • As the Internet and Java technology have been growing up, parallel processing approach to utilize those idle resources connected to the Internet has become quite attractive. In this paper, JICE(Java Internet Computing Environment) was implemented as a parallel computing platform based on the Internet using multithreading and RMI mechanisms provided by Java. The basic model of JICE is constructed as three components, such as a client, a set of workers, and a broker. A worker communicates with other workers via a globally shared memory system. It provides users with master-slave programming model and a collection of library functions. The basic model of JICE is also extended as a multimanaging system. This multimanaging system is evaluated by analysis to show its effectiveness. According to numerical analysis and experiments with several benchmarks, it is shown that the performance of basic model depends on the shared memory reference ratio and user's library is a quite promising.

  • PDF

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection

  • Kim, Jinsuk;Yoo, Dong-Hoon;Jang, Heejin;Jeong, Kimoon
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.229-238
    • /
    • 2015
  • Web shells are programs that are written for a specific purpose in Web scripting languages, such as PHP, ASP, ASP.NET, JSP, PERL-CGI, etc. Web shells provide a means to communicate with the server's operating system via the interpreter of the web scripting languages. Hence, web shells can execute OS specific commands over HTTP. Usually, web attacks by malicious users are made by uploading one of these web shells to compromise the target web servers. Though there have been several approaches to detect such malicious web shells, no standard dataset has been built to compare various web shell detection techniques. In this paper, we present a collection of web shell files, WebSHArk 1.0, as a standard dataset for current and future studies in malicious web shell detection. To provide baseline results for future studies and for the improvement of current tools, we also present some benchmark results by scanning the WebSHArk dataset directory with three web shell scanning tools that are publicly available on the Internet. The WebSHArk 1.0 dataset is only available upon request via email to one of the authors, due to security and legal issues.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

A Real-Time Surveillance System for Vaccine Cold Chain Based o n Internet of Things Technology

  • Shao-jun Jiang;Zhi-lai Zhang;Wen-yan Song
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.394-406
    • /
    • 2023
  • In this study, a real-time surveillance system using Internet of Things technology is proposed for vaccine cold chains. This system fully visualizes vaccine transport and storage. It comprises a 4G gateway module, lowpower and low-cost wireless temperature and humidity collection module (WTHCM), cloud service software platform, and phone app. The WTHCM is installed in freezers or truck-mounted cold chain cabinets to collect the temperature and humidity information of the vaccine storage environment. It then transmits the collected data to a gateway module in the radiofrequency_physical layer (RF_PHY). The RF_PHY is an interface for calling the bottom 2.4-GHz transceiver, which can realize a more flexible communication mode. The gateway module can simultaneously receive data from multiple acquisition terminals, process the received data depending on the protocol, and transmit the collated data to the cloud server platform via 4G or Wi-Fi. The cloud server platform primarily provides data storage, chart views, short-message warnings, and other functions. The phone app is designed to help users view and print temperature and humidity data concerning the transportation and storage of vaccines anytime and anywhere. Thus, this system provides a new vaccine management model for ensuring the safety and reliability of vaccines to a greater extent.

A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer (윈도우 환경에서의 증거 수집 시스템 설계 및 구현에 관한 연구)

  • Lee, SeungWon;Roh, YoungSup;Han, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Lately, intrusive incidents (including system hacking, viruses, worms, homepage alterations, and data leaks) have not involved the distribution of an virus or worm, but have been designed to acquire private information or trade secrets. Because an attacker uses advanced intelligence and attack techniques that conceal and alter data in a computer, the collector cannot trace the digital evidence of the attack. In an initial incident response first responser deals with the suspect or crime scene data that needs investigative leads quickly, in accordance with forensic process methodology that provides the identification of digital evidence in a systematic approach. In order to an effective initial response to first responders, this paper analyzes the collection data such as user usage profiles, chronology timeline, and internet data according to CFFPM(computer forensics field triage process model), proceeds to design, and implements a collection application to deploy the client/server architecture on the Windows based computer.

Effect of threats to anonymity on data reliability in internet survey (인터넷 설문조사에서 익명성 훼손이 응답에 미치는 효과)

  • Heo, Sun-Yeong;Chang, Duk-Joon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.4
    • /
    • pp.785-794
    • /
    • 2011
  • The population of internet users are rapidly increasing and the interest of the internet survey is also increasing. Recent years has seen a transition from traditional modes of data collection into internet survey. Some surveys are administered with mixed modes of traditional data collection methods and internet survey, and some surveys are conducted through internet only instead of traditional modes, such as telephone survey, postal survey, face-to-face interviews and so on. However, one of most crucial parts of a survey is the reliability of the collected data and internet survey is no exemption. Changwon National University has been annually conducting a survey of new students and transfer students with almost same contents of questionnaire. The survey is a longitudinal survey and it had been administered by paper-pencil surveys until 2009. In 2010 the survey was administered through internet. Every students has to login with student ID number and the last 7-digit of national identity registration number, and complete the 2010 survey before registration their courses. If they leave any question without being answered, then could not move to the registration site for courses. This study explores the distortion of responses using the new students survey of Changwon National University, which could occur when the survey responses are not confidential. We find that the distortion of responses occurs from the questions with social desirability pressure, pressure of winning favor with the researcher, and pressure of explaining their situations. There are no distortion of responses from the questions which are describing simple opinions or simple facts, for example, the place they plan to live while in school.

A Study on the Facilitation Strategies of e-Trade in the Korean SMEs (중소기업의 전자무역(e-Trade) 활성화 방안에 관한 연구)

  • Choi, Jang-Woo
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.63-83
    • /
    • 2003
  • This paper's objective is to provide insights about the problems and expansion strategies of electronic trade. Korean small and medium-sized firms have adopted the Internet since the end of 1990s in order to reshape their competitiveness, and it is now being utilized as a major export marketing instrument to develop new customers, save export transaction costs ad facilitate new work processes. However, at present, the use of the internet in the field of trading is limited to the collection of market information, owing to legal, technical and institutional restraints between countries. In addition to that, because firms have the difficulties in making the trade contract through the e-trade system, the negative recognition on its' utility has been spreaded gradually between companies. This is one of the barriers to block the expansion of e-Trade between Korean firms. Therefore, this paper points out the problems of e-trade in the environmental, institutional and strategic view and provides many considerations for establishing the expansion strategy of e-trade by the Korean government and trade supporting institutions.

  • PDF

A study on BSN data collection technique through mobile devices in a cloud environment

  • Hwang, Chigon;Kim, Hyung-Seok;Lee, Jong-Yong;Jung, Kyedong
    • International journal of advanced smart convergence
    • /
    • v.6 no.2
    • /
    • pp.82-88
    • /
    • 2017
  • The data generated by the BSN sensor attached to the human body is mostly mobile. Accordingly, in a mobile cloud environment that processes BSN data, the service should not be fixed in a specific area but be able to support it according to the move. The mobile device must be able to process, filter and transmit the collected BSN data. The cloud server must be able to collect the data processed by the mobile device and provide it as a service. And the transfer of data requires standardized transfer between each device. In this paper, we propose a data delivery method through standard schema when mobile device processes data and provides service in cloud system and a data processing method according to the movement of the mobile device.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF