• 제목/요약/키워드: Piracy Site

검색결과 10건 처리시간 0.017초

Improved Piracy Site Detection Technique using Search Engine

  • Kim, Eui-Jin;Kim, Deuk-Hun;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2459-2472
    • /
    • 2022
  • With the increase in copyright content exports to overseas markets due to the recent globalization of the Korean culture, the added value of the Korean digital content market is increasing at a significant rate. As such, as the size of the copyright market increases, different piracy sites have emerged that generate profits by illegally distributing works without the permission of the copyright holders, resulting in direct and indirect damage to these copyright holders. The existing copyright detection methods used in public institutions for solving this problem are limited, while the piracy sites are ever-changing. Methods are being continuously developed to achieve better detection results. To this end, it is possible to detect the latest infringement site domain by detecting the infringement site domain that is constantly changed through the search engine. This paper proposes an improved piracy site detection method using a search engine to prevent the damage caused by piracy sites.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

전북 장수군 수분치의 하천쟁탈에 관한 연구 (A study on the Stream Piracy at Subunchi in Jangsu-Gun, Jeonlabuk-Do, Korea)

  • 손일
    • 대한지리학회지
    • /
    • 제49권6호
    • /
    • pp.795-811
    • /
    • 2014
  • 하천쟁탈은 산지에서 나타나는 역동적인 지형학적 프로세스의 하나로, 특정 지역에 하천쟁탈이 집중된다면 그것은 그 지역의 지질구조와 지반운동을 반영한 것으로 볼 수 있다. 본 연구에서는 지리산지와 덕유산지 사이 저지대에서 나타나는 하천쟁탈과 포항-광주의 지질 구조선 및 한산산맥과의 관련성에 대해 살펴보았다. 수분치의 하천쟁탈은 저위분지를 지나며 고도가 낮고 경사가 급한 섬진강 상류와 고도가 높고 경사가 완만한 고위분지를 흐르는 금강 상류 사이에서 발생한 것이다. 수분분지 주변에서는 하천쟁탈에 관한 다양한 지형학적 증거와 두부침식에 대한 인간의 대응을 확인할 수 있다. 하천쟁탈의 지형학적 프로세스를 한눈에 확인할 수 있는 수분치는 주변의 뜬봉샘(금강의 발원지)과 더불어 지리교육뿐만 아니라 지오투어리즘의 좋은 사이트가 될 수 있다.

  • PDF

Feature Analysis and Detection Techniques for Piracy Sites

  • Choi, Seul-Ki;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2204-2220
    • /
    • 2020
  • In recent years, digital content has become easily accessible because of internet technology. Representative examples of such digital content include various types, such as music, TV, (program, sport, drama etc.) and films. However, there are cases where internet technology is used in illegal ways without the authorization of the copyright holder for digital content. Such actions have a direct impact on copyright owners' profits and further affect the development of the digital culture industry adversely. Therefore, in this study, we analyze features to detect piracy sites that cause copyright infringement. Further, we develop a piracy site detection crawler based on these features and present the analysis of its performance.

영상 컨텐츠 불법 복제에 관한 사용자 의식 수준 (Level of User Awareness for Illegal Downloading of Movie Content)

  • 이혜경;김희완
    • 한국콘텐츠학회논문지
    • /
    • 제9권11호
    • /
    • pp.212-224
    • /
    • 2009
  • 인터넷과 컴퓨터의 성능이 향상됨에 따라 수 초 내에 영화 한 편을 내려 받을 수 있을 정도로 발전했다. 이에 따라 편의성을 이유로 합법적으로 비용을 지불하지 않고 영상 컨텐츠를 불법으로 다운로드 받아 감상하는 이용자들이 늘어가고 있는 추세이다. 이에 따라 국내외 적으로 저작권법을 강화 또는 개정하여 불법복제물을 상습적으로 게시하거나 복제하는 행위에 대해 강력한 법적 제재를 시행하고 있다. 본 논문에서는 네티즌들이 영상 컨텐츠의 불법 공유에 대해 과연 어떤 수준의 의식을 가지고 있는지에 대해 탐구하였다. 컴퓨터 소프트웨어 및 음악에 대한 불법복제에 관한 연구 및 논의는 활발하게 이루어졌고 불법 복제 완화에 대한 거의 완벽한 해법이 이미 나와 있으나 영화를 비롯한 영상 컨텐츠에 대한 불법복제 의식에 대한 연구는 수행되지 않고 있는 실정이다. 가장 정평이 나있는 온라인 조사 사이트 월드 서베이를 통해 사용자의 영상 컨텐츠 불법복제에 관한 의식 조사를 시행했다. 응답 결과에서 열 명 중 아홉 명이 영상 컨텐츠를 불법 복제하여 사용하고 있는 것으로 나타났다. 그러나 놀라운 사실은 그와 같은 수준인 95%의 응답자가 불법복제는 위법이라고 생각하는 것으로 밝혀졌다.

소프트웨어 라이선스 관리시스템의 설계 및 구현 : K사 사례를 중심으로 (Design and Implementation of Management Systems for Software License)

  • 강용식;권순동;고미현
    • Journal of Information Technology Applications and Management
    • /
    • 제20권3_spc호
    • /
    • pp.315-331
    • /
    • 2013
  • As the business has been highly informatized, many companies has bought the software for their works. There are two types of software license. One is a site license and the other is a user license. This paper is focused on the user license. User license has the number of the right to use software. So, software managers always need to know the number of licenses in use and should limit the number of software license in use. If someone in the company use a software without license, he will be treated as a piracy. In that case, the company should pay for the settlement cost for the exceeding license use. In this paper, we suggest the model how we can limit the installation of the software within the number of licenses by license management system.

최근 인도양 해적활동과 대해적작전 변화에 따른 한국 청해부대 역할 연구 (A study on role of ROK Escort Task Gruop according to recently Pirate Conducting Trend and Anti-Piracy Operation in Indian Ocean)

  • 최형민
    • Strategy21
    • /
    • 통권32호
    • /
    • pp.192-221
    • /
    • 2013
  • In order to deal with the current economic crisis, the U.S. government, as a part of its austerity fiscal policy, implemented a budget sequester. The sequester will hit the U.S. defense budget the hardest, and as a result will most likely put the security of the international community in jeopardy. The U.S. will have to cut 46 billion dollars from its original 525 billon defense spending in 2013. And by the year 2022, will have to cut 486.9 billion dollars. Such an astronomical decrease in the U.S. defense spending will inevitably burden the friendly nations. According to recent studies, pirate related incidents in Somalia, where piracy is most active, has declined from its 226 incidents to 76 incidents per year in 2012, a 66% drop from previous years'. However, piracy threats as well as those related to firearms still remain and thus participants of anti-piracy operations, namely the U.S., U.K., France, Canada, NCC, EUNAVFOR, and NATO, are facing a problem of declining forces. Considering the current situation as well as rising expectations from the international community, Republic of Korea, a supporter of NCC's maritime security operation, not to mention its foremost duty of securing its sea, is at a stage to re-examine its operational picture. Such action will be a good opportunity for Republic of Korea to build the trust and live up to the international community's expectation. To quote from the network theory, although in relation to other friendly nations participating in the anti-piracy operation, Republic of Korea currently remains at a single cell level, this opportunity will certainly develop Korea to a 'node' nation in which power and information would flow into. Through this expansion of operational capability, Republic of Korea will be able to exert more influence as a more developed nation. Currently however, not only is the single 4,500 ton class destroyer deployed in Somalia a limited unit to further expand the scale and amount of force projection in the area, but also the total of six 4,500 ton class destroyers ROK feet possess is at a high fatigue degree due to standard patrolling operations, midshipman cruise and the RIMPAC exercise. ROK fleet therefore must consider expanding the number of ships deployed along with either deploying combat support ships or constructing logistics support site in the African region. Thus, by expanding its operational capabilities and furthermore by abiding to the rightful responsibilities of a middle power nation, Republic of Korea will surely earn its respect among the members of the international community.

  • PDF

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

교육정보공유체제 이용 활성화를 위한 교사의 요구 분석 (Analysis of Teachers' Needs for the Active Use of Educational Information Sharing System)

  • 조진숙;오미자;김미량
    • 컴퓨터교육학회논문지
    • /
    • 제16권1호
    • /
    • pp.97-110
    • /
    • 2013
  • 본 연구는 교육정보공유체제의 이용 활성화를 위한 방안을 제안하고자 주 사용자인 교사들의 요구사항을 분석하였다. 교사들이 생각하는 현행 시스템의 문제점과 개선점 및 희망 컨텐츠가 무엇인지에 대한 세 가지 연구과제를 설정하고, 구체적인 의견 수렴을 위해 개방형 설문을 실시하였으며 NVivo 10 프로그램으로 분석하였다. 현 시스템은 기능적 문제, 자료의 신뢰성 부족 문제, 공유 및 활용을 위한 체제 문제를 갖고 있으며, 교사들은 개인의 상황에 맞는 매우 다양한 자료들을 요구하였다. 이에 본 연구에서는 맞춤형 검색이 가능한 새로운 검색엔진 도입, 컨텐츠 저작 도구 탑재 등의 웹사이트 기능 개선을 제안하였다. 또한 다양한 교사의 요구를 만족하기 위하여 교사가 주도적으로 컨텐츠를 생산 공유 유통할 수 있는 오픈마켓 서비스 체제를 제안하였고, 교사들의 교육정보공유체제 이용을 활성화하기 위해 저작권의 문제가 선결되어야 함을 강조하였다.

  • PDF