• Title/Summary/Keyword: Internet reply

Search Result 47, Processing Time 0.03 seconds

A Study of Connection Maintenance Techniques using TCP Hijacking

  • Kim, JeomGoo
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.57-63
    • /
    • 2014
  • Internet users drastically increases, also through the Internet to buy various intrusion significantly increased. These various methods of intrusion defense thinking hacker attempting to hack the actual position of the real-time tracking of the intruder backtracking technique for research have been actively carried out. In this paper, a technique used in TCP Connection trace-back System in one packet trace-back technique watermarking technique using TCP Hijacking Connection Reply packets how to solve the difficulties of maintaining presented.

The Effect of Parenting Attitudes on Writing Vicious Internet Replies and the Viewing of Internet Pornography: With a Focus on Gender Differences (부모양육태도가 청소년의 악성댓글작성과 음란사이트열람에 미치는 영향: 성별차이를 중심으로)

  • Park, Na Rae;Oh, Su Kyung;Jin, Mi Seon;Baek, Su Jeong;Chung, Ick-Joong
    • Korean Journal of Child Studies
    • /
    • v.36 no.2
    • /
    • pp.39-54
    • /
    • 2015
  • The purpose of this study was to examine the impact of parenting attitudes on writing vicious internet replies and the viewing of internet pornography. This study utilized logistic and multiple regression analyses of the 5th wave(2nd grade in middle school) data from the Korean Youth Panel Study(KYPS), as administered by the National Youth Policy Institute. The results of this study can be summarized as follows: First, parenting attitudes were found to decrease the writing of vicious internet replies and the viewing of internet pornography. Second, there was a significant gender difference in the effect of parenting attitudes. As for male adolescents, parental monitoring was more important in the decrease in writing vicious internet replies and the viewing of internet pornography than parental attachment. In contrast, for female adolescents, parental attachment was more important in decreasing the viewing of internet pornography than parental monitoring. On the basis of these results, several implications for youth welfare practice and policy were suggested.

A Reply Graph-based Social Mining Method with Topic Modeling (토픽 모델링을 이용한 댓글 그래프 기반 소셜 마이닝 기법)

  • Lee, Sang Yeon;Lee, Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.640-645
    • /
    • 2014
  • Many people use social network services as to communicate, to share an information and to build social relationships between others on the Internet. Twitter is such a representative service, where millions of tweets are posted a day and a huge amount of data collection has been being accumulated. Social mining that extracts the meaningful information from the massive data has been intensively studied. Typically, Twitter easily can deliver and retweet the contents using the following-follower relationships. Topic modeling in tweet data is a good tool for issue tracking in social media. To overcome the restrictions of short contents in tweets, we introduce a notion of reply graph which is constructed as a graph structure of which nodes correspond to users and of which edges correspond to existence of reply and retweet messages between the users. The LDA topic model, which is a typical method of topic modeling, is ineffective for short textual data. This paper introduces a topic modeling method that uses reply graph to reduce the number of short documents and to improve the quality of mining results. The proposed model uses the LDA model as the topic modeling framework for tweet issue tracking. Some experimental results of the proposed method are presented for a collection of Twitter data of 7 days.

Análisis Pragmático y Lingüístico de los Comentarios en la Prensa Digital

  • Choi, Hong-Joo
    • Iberoamérica
    • /
    • v.16 no.2
    • /
    • pp.151-188
    • /
    • 2014
  • This work aims to describe pragmatic strategies and linguistic features of replies that occur in the comment section of online newspapers. The dominant media in this digital age is the Internet and its rapid development and expansion of use have contributed not only to the change of the form of production of journalistic texts, but also to the consumption of those texts. In the past, the news was transmitted in a unidirectional way but now readers of online newspapers do not remain passively reading the articles. They actively participate in the exchange of opinions with other readers. The individual consumption of journalistic texts has become a collective and social act. The purpose of the study is to investigate the communication intention of the users of comment sections and analyze the linguistic formulation of replies. We attempt to discover specific aspects of replies and responses for online newspaper articles, considering them as an independent type of Computer Mediated Communication (Internet Mediated Communication). Observing language attitudes appearing in the electronic environment and discovering the characteristics of the Spanish language on the Internet will allow us to contribute to understand the theoretical aspects related to the CMO better.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains

  • Shen, Hu;Lv, Shaohe;Wang, Xiaodong;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.700-713
    • /
    • 2015
  • It is critical to design energy-efficient routing protocols for battery-limited mobile ad hoc networks, especially in which the energy-consuming MIMO techniques are employed. However, there are several challenges in such a design: first, it is difficult to characterize the energy consumption of a MIMO-based link; second, without a careful design, the broadcasted RREP packets, which are used in most energy-efficient routing protocols, could flood over the networks, and the destination node cannot decide when to reply the communication request; third, due to node mobility and persistent channel degradation, the selected route paths would break down frequently and hence the protocol overhead is increased further. To address these issues, in this paper, a novel Greedy Energy-Efficient Routing (GEER) protocol is proposed: (a) a generalized energy consumption model for the MIMO-based link, considering the trade-off between multiplexing and diversity gains, is derived to minimize link energy consumption and obtain the optimal transmit model; (b) a simple greedy route discovery algorithm and a novel adaptive reply strategy are adopted to speed up path setup with a reduced establishment overhead; (c) a lightweight route maintenance mechanism is introduced to adaptively rebuild the broken links. Extensive simulation results show that, in comparison with the conventional solutions, the proposed GEER protocol can significantly reduce the energy consumption by up to 68.74%.

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

The Effects of Internet Fashion Shopping Celebrity Advertising Model on Consumers' WOM (인터넷 패션 쇼핑 몰의 연예인 광고 모델이 소비자의 구전 행동(WOM)에 미치는 영향)

  • Noh, You-Na;Lee, Scung-Hee
    • The Research Journal of the Costume Culture
    • /
    • v.14 no.5
    • /
    • pp.850-863
    • /
    • 2006
  • The purpose of this study was to investigate if star marketing of on-line shopping malls affects consumers' WOM effect, and to compare the differences of consumption behavior between female teenagers and college students. Two hundred five female teenagers and college students who had purchased fashion goods through internet shopping mall participated in this study. For data analysis, descriptive statistics, factor analysis, t-test, and multiple regression were used. As the results, first, recognition of celebrity advertising models was classified into three factors such as 'trust of product', 'attractiveness of product' and 'leading interest of product' factors. Second, the greater exposure to celebrity models, the greater the good feelings about them, showing respondents' positive consumption behavior. Third, results of multiple regression revealed that behavior of pursuing celebrities' style accounted for 37% of the explained variance WOM behavior. Finally, t-test revealed that female college students were affected more by celebrity style and bought fashion items than female teenagers. However, female teenagers conducted more WOM behavior than college students. Based on these results, on-line fashion marketers would use these data for more their efficient fashion marketing strategies.

  • PDF