• Title/Summary/Keyword: SPAM

Search Result 284, Processing Time 0.038 seconds

Automatic knowledgebase extraction based smishing SMS detection (자동 지식베이스 추출 기반 스미싱 SMS 탐지)

  • Baek, Seong-Bin;Lee, Gary Geunbae
    • Annual Conference on Human and Language Technology
    • /
    • 2021.10a
    • /
    • pp.564-567
    • /
    • 2021
  • 스미싱은 SMS 문자를 통해 피해자를 현혹시켜 개인정보나 금전 등을 갈취하는 범죄이다. 발전하는 스미싱 범죄 수법에 대응하기 위해선 새로운 스미싱 범죄 사례에서 데이터를 추출하고, 추출한 데이터를 기존 시스템에 통합하여 빠르게 대응할 수 있어야 한다. 본 연구에서는 빠른 스미싱 대응을 위해 전처리를 하지 않은 SMS 문자 텍스트에서 지식베이스를 자동으로 추출하고 저장하는 자동 지식베이스 추출 모듈을 제안하며, 추출 시스템 지식베이스를 바탕으로 입력된 SMS가 스미싱인지 판별하는 스미싱 SMS 탐지 모듈을 통합한 자동 지식베이스 추출 기반 스미싱 SMS 탐지 시스템을 제시한다. 제시된 스미싱 SMS 탐지 모델은 UCI SMS Spam Collection Dataset을 기준으로 90.9 (F1 score)의 성능을 보여주었다.

  • PDF

A Technique to Detect Spam SMS with Composed of Abnormal Character Composition Using Deep Learning (딥러닝을 이용한 비정상 문자 조합으로 구성된 스팸 문자 탐지 기법)

  • Ka-Hyeon Kim;Heonchang Yu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.583-586
    • /
    • 2023
  • 대량 문자서비스를 통한 스팸 문자가 계속 증가하면서 이로 인해 도박, 불법대출 등의 광고성 스팸 문자에 의한 피해가 지속되고 있다. 이러한 문제점을 해결하기 위해 다양한 방법들이 연구되어 왔지만 기존의 방법들은 주로 사전 정의된 키워드나 자주 나오는 단어의 출현 빈도수를 기반으로 스팸 문자를 검출한다. 이는 광고성 문자들이 시스템에서 자동으로 필터링 되는 것을 회피하기 위해 비정상 문자를 조합하여 스팸 문자의 주요 키워드를 의도적으로 변형해 표현하는 경우에는 탐지가 어렵다는 한계가 있다. 따라서, 본 논문에서는 이러한 문제점을 해결하기 위해 딥러닝 기반 객체 탐지 및 OCR 기술을 활용하여 스팸 문자에 사용된 변형된 문자열을 정상 문자열로 복원하고, 변환된 정상 문자열을 문장 수준 이해를 기반으로 하는 자연어 처리 모델을 이용해 스팸 문자 콘텐츠를 분류하는 방법을 제안한다. 그리고 기존 스팸 필터링 시스템에 가장 많이 사용되는 키워드 기반 필터링, 나이브 베이즈를 적용한 방식과의 비교를 통해 성능 향상이 이루어짐을 확인하였다.

Spam post detection and blocking mechanism on web bulletin board (웹 게시판에서 스팸 게시물 탐지 및 블러킹 방안)

  • Cho, Yu Hyoung;Min, SungKi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1238-1241
    • /
    • 2007
  • 웹 게시판 서비스에서의 비정상행위 탐지 및 블러킹 방안 제시는 서비스를 제공하는 주체에게는 대량의 광고성 게시글로부터 안정적 서비스 운영이 가능하게끔 하고, 서비스를 이용하는 사용자에게는 원하지 않는 게시글로부터 블러킹 방안을 제공 받아 깨끗한 웹 게시판 서비스를 가능한 방안으로 인터넷 환경이 제공되면서 필터링 기술 발전 수준이 가장 높은 스팸 메일 필터링 기술을 응용하여 웹 게시판 서비스에 적용하여 필터링 효과 수준을 측정하고 다른 웹 서비스 등에 활용할 수 있는 방안을 제시한다.

Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain (사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향)

  • C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

The efficacy of Quantitative Analysis of Basal/Acetazolamide SPECT Using SPM and Statistical Probabilistic Brain Atlas in Patients with Internal Carotid Artery Stenosis (뇌혈관 협착 환자에서 SPM과 확률뇌지도를 이용한 기저/아세타졸아미드 SPECT의 정량적 분석법의 유용성)

  • Lee, Ho-Young;Lee, Dong-Soo;Paeng, Jin-Chul;Oh, Chang-Wan;Cho, Maeng-Jae;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.36 no.6
    • /
    • pp.357-367
    • /
    • 2002
  • Purpose: While cerebral blood flow and cerebrovascular reserve could be evaluated with basal/acetazolamide Tc-99m-HMPAO SPECT in cerebrovascular disease, objective quantification is necessary to assess the efficacy of the revascularization. In this study we adopted the SPM method to quantify basal cerebral blood flow and cerebrovascular reserve on basal/acetazolamide SPECT in assessment of the patients who underwent bypass surgery for linternal carotid artery (ICA) stenosis. Materials and Methods: Twelve patients ($51{\pm}15$ years) with ICA stenosis were enrolled. Tc-99m-HMPAO basal/acetazolamide perfusion SPECT was peformed before and after bypass surgery. After spatia1 and count normalization to cerebellum, basal cerebral blood flow and cerebrovascular reserve were compared with 21 age-matched normal controls and postoperative changes of regional blood flow and reserve were assessed by Statistical Parametric Mapping method. Mean pixel values of each brain region were calculated using probabilistic anatomical map of lobes. Perfusion reserve was defined as the % changes after acetazolamide over basal counts. Results: Preoperative cerebral blood flow and cerebrovascular reserve were significantly decreased in involved ICA territory, comparing with normal control (p<0.05). Postoperative improvement of cerebral blood flow and cerebrovascular reserve was observed in grafted ICA territories, but cerebrovasculr reserve remained with significant difference with normal control. Improvement of the cerebrovascular reserve was most prominent in the superior temporal and the angular gyrus, nearest to the anastomosis sites. Conclusion: Using SPM quantification method on hasal/acetazolamide Tc-99m-HMPAO SPECT, the cerebral blood flow and cerebrovascular reserve could be assessed before revascularization and so could the efficacy of the bypass surgery.

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Design of Module for Spam Mail Stocking with OTP(One Time Password) (OTP를 이용한 스팸 메일 차단 모듈 설계)

  • Choo Yeoun-Soo;Lee Jae-Sik;Kim Jung-Jae;Cho Chang-Hyun;Jun Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.235-237
    • /
    • 2005
  • 인터넷 사용의 증가로 않은 사람들이 기존의 편지나 엽서를 사용하던 것을 전자 메일(e-mail)로 대체하고 있다. 전자 메일은 텍스트뿐만 아니라 그림, 음성, 동영상까지 전송이 가능하여 필요한 문서들도 첨부가 가능하여 많은 사람들에게 호응을 얻고 있지만 광고 메일이나 음란 사이트 홍보 메일로 사용되면서 많은 전자 메일 사용자들에게 정신적 피해를 주고 있으며 메일링 서비스를 하고 있는 업체들에게 큰 유해를 끼치고 있다. 본 논문에서는 사용자가 요구하지 않은 광고성 스팸 메일을 OTP(One Time Password)를 이용하여 효과적으로 차단하는 모듈을 제안, 설계한다. 기존의 차단 방식은 메일 서버에 저장된 메일들을 삭제하는 방식으로 메일 서버에 많은 과부하를 주며 메일 서버의 저장 용량을 낭비하여 사용자로 하여금 곡 필요한 메일들을 송, 수신 하지 못할 수도 있었다. 본 논문에서 제안하는 시스템은 스팸 메일로 분류된 메일들을 메일 서버 자체에 저장하지 않는 방식을 사용하여서 기존의 문제점을 해결하였다.

  • PDF

Differential Multicast in Switch-Based Irregular Topology Network (스위치 기반의 비정규적 네트워크에서의 차별적인 다중 전송)

  • Roh, Byoun-Kwon;Kim, Sung-Chun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.7
    • /
    • pp.394-400
    • /
    • 2002
  • Networks of Workstations(NOWs), that has features of flexibility and scalability, recently has emerged as an inexpensive alternative to massively parallel multicomputers. However it is not easier to perform deadlock-free multicast than regular topologies like mash or hypercube. Single phase differential multicast(SPDM) is a modified multicast algorithm with less burden of the root node. By applying quality of serviece(QoS), a specific node can have differentiated service and artificial change of message flow pattern is also available. As the results of performance evaluation experiments, SPDM has lower latency and lower packet concentration rate of the root node than the case of SPAM, and has ability to control network load distribution among switch nodes by controlling the assignment rate among nodes.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF