• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.03 seconds

The analysis of Windows 7·8 IconCache.db and its application (Windows 7·8 IconCahe.db 파일 포맷 분석 및 활용방안)

  • Lee, Chan-Youn;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.135-144
    • /
    • 2014
  • Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis, "Iconcache.db" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.

Relations of Maternal Sensitivity and Temperament to linfants Attachment Security (영아의 애착 안정성에 영향을 미치는 변인 : 어머니의 민감성과 영아의 기질)

  • Park, Kyung Ja
    • Korean Journal of Child Studies
    • /
    • v.20 no.3
    • /
    • pp.3-17
    • /
    • 1999
  • Maternal sensitivity and infant temperament were studied in relation to infant attachment security. Subjects were 47 one-year-old infants anti their mothers from intact upper-middle class families. Mothers sorted the Attachment Q-set (Waters, 1987, version 3.0) and filled out the Toddlers Temperament Questionnaire(Chu, 1992). Maternal sensitivity was observed in the home for two 3-hour sessions, and observers completed the Maternal Behavior Q-set(Pederson, Moran et al., 1990). Attachment security scores of the infants, using criterion scores developed with Korean infants, were 42, which is comparable to Previous studies. Infants who were securely attached to mothers showed more secure-based behaviors and compliance, enjoyed physical contacts, and showed less fussy/difficult behaviors with mothers. Mothers of girls were observed to be more sensitive to their infants' signals than mothers of boys. Maternal sensitivity scores were not related to infant security scores. However, maternal sensitivity was related to less compliance to mothers for boys.

  • PDF

Geometric structure and electronic behavior of Rh decorating effect on zigzag CNTs (n=7-12): A DFT study

  • Cui, Hao;Zhang, Xiaoxing;Zhou, Yongjian;Zhang, Jun
    • Carbon letters
    • /
    • v.26
    • /
    • pp.61-65
    • /
    • 2018
  • Comprehensive calculations of the Rh decoration effect on zigzag CNTs with n ranging from 7 to 12 were conducted in this work to understand the effect of Rh doping on geometric structures and electronic behaviors upon metallic and semiconducting CNTs. The obtained results indicated that Rh dopant not only contributes to the deformation of C-C bonds on the sidewall of CNTs, but also transforms the electron distribution of related complexes, thereby leading to a remarkable increase of the conductivity of pure CNTs given the emerged novel state within the energy gap for metallic CNTs and the narrowed energy gap for semiconducting CNTs. Our calculations will be meaningful for exploiting novel CNT-based materials with better sensitivity to electrons and higher electrical conductivity compared with pure CNTs.

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

A Study on Malicious Behavior Pattern Analysis Using System Monitoring (시스템 모니터링을 통한 악성 행위 패턴 분석에 관한 연구)

  • Kim, Eun-Young;Oh, Hyung-Geun;Bae, Byung-Chul;Park, Joong-Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.999-1002
    • /
    • 2002
  • 기존의 바이러스 및 악성 코드 백신의 탐지 기법은 대부분 시그너쳐 기반의 패턴 매칭 기법을 사용하고 있다. 이러한 기법의 단점은 새로운 악성 코드가 발생하면 사용자가 매번 시그너쳐를 업데이트를 해야 탐지가 가능하며, 시그너쳐의 업데이트 없이는 알려지지 않은 바이러스 및 악성 코드를 탐지할 수 없다는 것이다. 따라서 이와 같은 패턴 매칭 기법의 단점을 보완하고자 각각의 악성 코드 종류에 따른 시그너쳐를 이용한 탐지 기법이 아닌 악성 행위별 패턴를 이용하여 탐지를 한다면 기존의 기능을 포함한 알려지지 않은 바이러스 및 악성 코드 등을 탐지할 수 있을 것이다. 본 논문에서는 시스템 모니터링을 통하여 악성 행위별 패턴 분석 및 결과에 대해 기술한다.

  • PDF

Attachment Representation of Preschool Children : Links to Attachment Security and Mother-Child Interaction Behavior (나레이티브를 통한 유아의 애착 표상 측정의 타당화 연구 : 애착 안정성, 어머니 유아 상호작용 행동과의 관계를 중심으로)

  • Park, Kyung Ja;Kwon, Yeon Hee
    • Korean Journal of Child Studies
    • /
    • v.26 no.4
    • /
    • pp.247-247
    • /
    • 2005
  • The attachment representation of 40 36- to 52-month-old upper-middle class children was analyzed in relation to their attachment security and mother-child interaction behaviors. Instruments were the Attachment Story Completion Task(Bretherton, Ridgeway, & Cassidy, 1990), the Attachment Q-set, and the Vocabulary test of the K-WIPPSI. Mother-child interaction behaviors were observed at home during semi-structured problem-solving situations. The Attachment Story Completion Task classified Korean preshoolers from these upper-middle class families as securely attached to their mothers. Girls' representation of their attachment relationship was more secure than boys. Preschoolers' attachment representation was significantly related to vocabulary ability. Attachment security correlated positively with preschool children's attachment representation. Mother-child interaction behaviors related significantly to preschool children's attachment representation.

  • PDF

The Study on System Log Analysis of Malicious Behavior (악성 행위에 대한 시스템 로그 분석에 관한 연구)

  • Kim, EunYoung;Lee, CheolHo;Oh, HyungGeun;Lee, JinSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1193-1196
    • /
    • 2004
  • 1980년 후반. MIT에 버너스 리 교수가 인터넷 상에 웹(WWW)을 창시하면서부터 우리의 일상생활은 엄청난 변화를 가져왔다. 시 공간을 초월할 수 있는 인터넷이라는 가상 세계에서는 개인뿐만 아니라 정치 경제 사회등 모든 분야에 걸쳐 인터넷을 통한 쉽고 간편하며 빠른 교류가 이루어짐으로써 이제 더 이상 네트워크를 이용하지 않는 분야는 찾아 볼 수 없을 것이다. 그러나 이러한 현실 속에서 인터넷은 항상 순기능만을 수행하지는 않는다. 특히 악성코드를 이용한 사이버 침해 행위 기술이 인터넷의 발전과 함께 동시에 발전함으로써 이제는 악성코드를 이용한 사이버 침해 행위를 방지하고자하는 노력을 해야할 것이다. 따라서 본 논문에서는 악성코드를 탐지하기 위해 실시간 시스템 모니터링 도구를 이용하여 악성코드가 시스템에 어떠한 침해행위를 행하고, 해당 침해 행위 모니터링 로그 분석을 통해 기존의 알려진 악성코드뿐만 아니라 알려지지 않은 악성코드를 탐지할 수 있는 악성 패턴 분석 및 추출에 초점을 두어 기술하였다.

  • PDF

ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) (ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) 접근통제)

  • Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.396-400
    • /
    • 2001
  • 본 논문은 현재 안전한 운영체제 개발에 사용되고 있는 강제 접근통제(MAC)와 역할행위 기반 접근통제(RBBAC)의 혼합 기법인 다중 등급 역할 행위 기반 접근통제 (ML/RBBAC)를 제안하고, 접근통제 모델을 기술한다. ML/RBBAC은 안전한 운영체제가 MAC과 RBBAC을 동시 지원하기 위한 최적의 방법이며, 기존 MAC의 단점인 지나치게 엄격한 정보흐름 통제 및 보안 관리 부담의 증대 문제를 해결한다.

  • PDF

The overview of various leadership theories (다양한 리더십 이론에 대한 고찰)

  • Lee, Jae-Chang
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.265-288
    • /
    • 2005
  • The study of leadership has been an important and central part of various organizations. The purpose of this study is to provide an overview of the literature on organizational leadership, with an emphasis on recent trends and developments likely to dominate the field through the turn of the century. Leadership has been studied in different ways, depending on the researcher's conception of leadership and methodological preferences. Most of the studies divide naturally into distinct lines of research and can be classified according to whether the primacy focus is on leader traits, behavior, influence, or situational factors. Charismatic and transformational, and self leadership, a subject that became popular in recent years, can be viewed as a hybrid approach that involves elements from each of the other approaches. Finally, it discussed implication of the present study and the research required in the future.

  • PDF

Abnormal Crowd Behavior Detection Using Heuristic Search and Motion Awareness

  • Usman, Imran;Albesher, Abdulaziz A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.131-139
    • /
    • 2021
  • In current time, anomaly detection is the primary concern of the administrative authorities. Suspicious activity identification is shifting from a human operator to a machine-assisted monitoring in order to assist the human operator and react to an unexpected incident quickly. These automatic surveillance systems face many challenges due to the intrinsic complex characteristics of video sequences and foreground human motion patterns. In this paper, we propose a novel approach to detect anomalous human activity using a hybrid approach of statistical model and Genetic Programming. The feature-set of local motion patterns is generated by a statistical model from the video data in an unsupervised way. This features set is inserted to an enhanced Genetic Programming based classifier to classify normal and abnormal patterns. The experiments are performed using publicly available benchmark datasets under different real-life scenarios. Results show that the proposed methodology is capable to detect and locate the anomalous activity in the real time. The accuracy of the proposed scheme exceeds those of the existing state of the art in term of anomalous activity detection.