• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.027 seconds

The weight analysis research in developing a similarity classification problem of malicious code based on attributes (속성기반 악성코드 유사도 분류 문제점 개선을 위한 가중치 분석 연구)

  • Chung, Yong-Wook;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.501-514
    • /
    • 2013
  • A grouping process through the similarity comparison is required to effectively classify and respond a malicious code. When we have a use of the past similarity criteria to be used in the comparison method or properties it happens a increased problem of false negatives and false positives. Therefore, in this paper we apply to choose variety of properties to complement the problem of behavior analysis on the heuristic-based of 2nd step in malicious code auto analysis system, and we suggest a similarity comparison method applying AHP (analytic hierarchy process) for properties weights that reflect the decision-making technique. Through the similarity comparison of malicious code, configured threshold is set to the optimum point between detection rates and false positives rates. As a grouping experiment about unknown malicious it distinguishes each group made by malicious code generator. We expect to apply it as the malicious group information which includes a tracing of hacking types and the origin of malicious codes in the future.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

The Effects of the Social Risk on the Resistance of Purchase in Mobile Shopping (모바일 쇼핑의 사회적 위험이 구매저항에 미치는 영향)

  • Moon, Hye-Mi;Lee, Kyeong-Rak;Lee, Sang-Joon
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.93-106
    • /
    • 2014
  • All of smart phone users not always make a good use of mobile shopping. The main cause is that in case of non-user of mobile shopping, potential apprehension to psychological and security weakness affects building up resistance on mobile shopping. In this paper, we designed models of innovation resistance heavily based on literature reviews and previous studies, and tried to find how perceived risk affects consumer's purchase intention in mobile shopping process. In conclusion, it shows that security, one of psychological factors, affects perceived risk in all aspects, while negative influence of society and cognitive dissonance just affect social risk and delivery risk, and uncertainty also just affects performance risk. Besides, it shows that all of variables made up perceived risk affects resistance of purchase. Especially social risk turns out to be a most influential factor to purchase behavior through smart phone.

The Effects of millitary lesson students' self-control and stress coping behavior are related to the level of smartphone addiction. (군사학과 학생의 자기 통제력과 스트레스 대처방식이 스마트폰 중독수준에 미치는 영향)

  • Jung, Sun-cheol;Lee, Young-sun
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.63-74
    • /
    • 2015
  • The purpose of this study was to determine the status using the smartphone targeting millitary lesson students, and self-control and coping investigate the influence on smartphone addiction level. The results were also analyzed were to affect this age of smartphones college hours per day using a smartphone to an hour or more self-important 95.3% in individual daily levels of smartphone addiction to sex differences. Smartphone addiction levels showed a higher female than male students, the higher the self-control and self-control over the smartphone results of analyzing the relationship between addiction smartphone addiction has been analyzed to be lowered. In addition, even between coping and smartphone addiction emerged as significant results. In conclusion, the self-control necessary for use in smartphones and use time period, and this was demonstrated that coping problem-oriented coping strategies are required. Were discussing the implications of the study on the basis of these findings, we discuss the future research challenges and limitations.

Game Behavior Pattern Modeling for Bots(Auto Program) detection (봇(오토프로그램) 검출을 위한 게임 행동 패턴 모델링)

  • Jung, Hye-Wuk;Park, Sang-Hyun;Bang, Sung-Woo;Yoon, Tae-Bok;Lee, Jee-Hyong
    • Journal of Korea Game Society
    • /
    • v.9 no.5
    • /
    • pp.53-61
    • /
    • 2009
  • Game industry, especially MMORPG (Massively Multiplayer Online Role Playing Game) has rapidly been expanding in these days. In this background, lots of online game security incidents have been increasing and getting more diversity. One of the most critical security incidents is 'Bots', mimics human player's playing behaviors. Bots performs the task without any manual works, it is considered unfair with other players. So most game companies try to block Bots by analyzing the packets between clients and servers. However this method can be easily attacked, because the packets are changeable when it is send to server. In this paper, we propose a Bots detection method by observing the playing patterns of game characters with data on server. In this method, Bots developers cannot handle the data, because it is working on server. Therefore Bots cannot avoid it and we can find Bots users more completely.

  • PDF

Multiple and Unlinkable Public Key Encryption without Certificates (불연계성을 갖는 다중 공개키 암호 시스템)

  • Park, So-Young;Lee, Sang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.20-34
    • /
    • 2009
  • We newly propose a multiple and unlinkable identity-based public key encryption scheme which allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with those public keys. Also our scheme removes the use of certificates as well as the key escrow problem so it is functional and practical. Since our public keys are unlinkable, the user's privacy can be protected from attackers who collect and trace the user information and behavior using the known public keys. Furthermore, we suggest a decryption key renewal protocol to strengthen the security of the single decryption key. Finally, we prove the security of our scheme against the adaptive chosen-ciphertext attack under the random oracle model.

Seismic performance of precast joint in assembled monolithic station: effect of assembled seam shape and position

  • Liu, Hongtao;Du, Xiuli
    • Earthquakes and Structures
    • /
    • v.17 no.6
    • /
    • pp.611-621
    • /
    • 2019
  • Precast concrete structure has many advantages, but the assembled seam will affect potentially the overall seismic performance of structure. Based on the sidewall joint located in the bottom of assembled monolithic subway station, the main objectives of this study are, on one hand to present an experimental campaign on the seismic behavior of precast sidewall joint (PWJ) and cast-in-place sidewall joint (CWJ) subjected to low-cycle repeated loading, and on the other hand to explore the effect of shape and position of assembled seam on load carrying capacity and crack width of precast sidewall joint. Two full-scale specimens were designed and tested. The important index of failure pattern, loading carrying capacity, deformation performance and crack width were evaluated and compared. Based on the test results, a series of different height and variably-shape of assembled seam of precast sidewall joint were considered. The test and numerical investigations indicate that, (1) the carrying capacity and deformation capacity of precast sidewall and cast-in-place sidewall were very similar, but the crack failure pattern, bending deformation and shearing deformation in the plastic hinge zone were different obviously; (2) the influence of the assembled seam should be considered when precast underground structures located in the aquifer water-bearing stratum; (3) the optimal assembled seam shape and position can be suggested for the design of precast underground concrete structures according to the analysis results.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.

A Study on the Systematization of the Pedestrian Space for the Prevention of Accidents in Urban Areas - The side of Planning and Management - (도시지역 사고예방을 위한 보행공간 체계화에 관한 연구 - 계획과 운영측면에서 -)

  • Hwang, Eui Jin;Ryu, Ji Hyeob;Lim, Ik Hyeon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • Walking is one of human functions and has been the base of the development of human civilization. Walking ability had made the first village and urban pattern of the mankind. Cities had been constructed for pedestrian's convenience and happy life. But conventional cities have been crowded by the rapid increasing vehicles and population since material civilization had developed. On the other hand, pedestrian space has been neglected urban districts. Chose this study to suggest a direction for improvement by following the direction of the city characteristics and roadside pedestrian space. 1. Investigate the relationship and the significance and problems of pedestrian space by finding survey of the literature and discussion with those that affect the behavior of the pedestrian environment around. 2. For a comfortable pedestrian space on the improvement of the pedestrian area of space (physical and psychological) and gait characteristics, service levels and basic data. 3. Chose how to extract the most appropriate of the best alternatives presented several proposals based on the above survey of the literature data and field survey.

The Study for Establishing the Criteria of Measurement Items in the Monitoring System for the Steel-Box Girder Bridge by FEM Analysis (구조해석에 의한 강상자형교 상시계측시스템 계측항목별 관리기준치 설정 연구)

  • Joo, Bong-Chul;Park, Ki-Tae;You, Young-Jun;Lee, Chin-Hyung;Hwang, Yoon-Koog
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • If any bridge has the monitoring system, the bridge manager can check the history of bridge behavior and the progress of the damage more exactly. When the unexpected event (ex: earthquake and flood) happens, the manager can check the safety condition of the bridge and make the pertinent action for bridge management which is reduction of vehicle speed or traffic control through the system. Additionary the manager can make the well-timed repair or reinforcement through the system, so he can save the management cost or the life cycle cost. This study presents the method of setting the criteria by FEM analysis in bridge monitoring system, and the standard progress for setting the criteria about measurement items of monitoring system for the steel box type bridge.

  • PDF