• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.032 seconds

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

Quality of Life in Low Income Korean Aged (기초생활보장 수급 노인의 삶의 질)

  • Kim, Hye-Ryoung;Oh, Ka-Sil;Oh, Kyong-Ok;Lee, Sun-Ock;Lee, Sook-Ja;Kim, Jeong-Ah;Jun, Hoa-Yun;Kang, Jung-Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.38 no.5
    • /
    • pp.694-703
    • /
    • 2008
  • Purpose: The purpose of this study was to identify the quality of life and its predictors in low income Korean aged. Methods: This was a predictive correlational study. An accessible sample from the population of people who were 65 and over and were supported by the basic livelihood security system was 1,040. Quota sampling with strata of state division in the nation was chosen. Quality of life and its predictors in the subjects were measured. Results: The mean quality of life in the subjects was 47.0$\pm$10.7. Predictors of this study significantly explained 54.3% of the total variance of quality of life. Depression was the most significant predictor of quality of life. Health problems, district, social support, leisure activity, and health behavior had effects on quality of life. Conclusion: This finding indicates that quality of life in lower income Korean aged is different from other populations by economic status. Demographics, health status and social status were predictors of quality of life in the aged with a small income.

Traffic Anomaly Detection for Campus Networks using Fisher Linear Discriminant (Fisher 선형 분류법을 이용한 비정상 트래픽 탐지)

  • Park, Hyun-Hee;Kim, Mee-Joung;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.140-149
    • /
    • 2009
  • Traffic anomaly detection is one of important technology that should be considered in network security and administration. In this paper, we propose an abnormal traffic detection mechanism that includes traffic monitoring and traffic analysis. We develop analytical passive monitoring system called WISE-Mon which can inspect traffic behavior. We establish a criterion by analyzing the characteristics of a traffic training set. To detect abnormal traffic, we derive a hyperplane by using Fisher linear discriminant and chi-square distribution as well as the analyzed characteristics of traffic. Our mechanism can support reliable results for traffic anomaly detection and is compatible to real-time detection. In addition, since the trend of traffic can be changed as time passes, the hyperplane has to be updated periodically to reflect the changes. Accordingly, we consider the self-learning algorithm which reflects the trend of the traffic and so enables to increase the pliability of detection probability. Numerical results are presented to validate the accuracy of proposed mechanism. It shows that the proposed mechanism is reliable and relevant for traffic anomaly detection.

  • PDF

Factors affecting the Health Promotion Behaviors of the Low-Income Elderly Living Alone -Focusing on the Mediating Effect of Social Support (저소득 독거노인의 건강증진행위에 관한 융합적 연구 -사회적 지지의 매개효과를 중심으로-)

  • Cho, Sung-Hui
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.423-431
    • /
    • 2015
  • This study aimed to examine the mediating effect of social support in the influence of depression on the health promotion behavior of low-income elderly living alone. The data were collected from 294 elderly recipients of national basic livelihood security who are living alone and the data were analyzed by path analysis. The results were that depression and social support had direct effect on health promotion behaviors and depression had indirect effect on health promotion behaviors through mediating effect of social support. Results showed the importance of depression and social support in the health promotion behaviors of the low-income elderly living alone, which should be considered in the intervention. On the basis of the results, practical suggestions to increase the health promotion behaviors of the low-income elderly living alone were discussed.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF

A Macroscopic Framework for Internet Worm Containments (인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크)

  • Kim, Chol-Min;Kang, Suk-In;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.9
    • /
    • pp.675-684
    • /
    • 2009
  • Internet worm can cause a traffic problem through DDoS(Distributed Denial of Services) or other kind of attacks. In those manners, it can compromise the internet infrastructure. In addition to this, it can intrude to important server and expose personal information to attacker. However, current detection and response mechanisms to worm have many vulnerabilities, because they only use local characteristic of worm or can treat known worms. In this paper, we propose a new framework to detect unknown worms. It uses macroscopic characteristic of worm to detect unknown worm early. In proposed idea, we define the macroscopic behavior of worm, propose a worm detection method to detect worm flow directly in IP packet networks, and show the performance of our system with simulations. In IP based method, we implement the proposed system and measure the time overhead to execute our system. The measurement shows our system is not too heavy to normal host users.

An innovative BRB with viscoelastic layers: performance evaluation and numerical simulation

  • Zhou, Ying;Gong, Shunming;Hu, Qing;Wu, Rili
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.2
    • /
    • pp.205-229
    • /
    • 2018
  • Energy induced by minor earthquake and micro vibration cannot be dissipated by traditional buckling-restrained braces (BRBs). To solve this problem, a new type of hybrid passive control device, named as VE-BRB, which is configured by a BRB with high-damping viscoelastic (VE) layers, is developed and studied. Theoretical analysis, performance tests, numerical simulation and case analysis are conducted to study the seismic behavior of VE-BRBs. The results indicate that the combination of hysteretic and damping devices lead to a multi-phased nature and good performance. VE-BRB's working state can be divided into three phases: before yielding of the steel core, VE layers provide sufficient damping ratio to mitigate minor vibrations; after yielding of the steel core, the steel's hysteretic deformations provide supplemental dissipative capacity for structures; after rupture of the steel core, VE layers are still able to work normally and provide multiple security assurance for structures. The simulation results agreed well with the experimental results, validating the finite element analysis method, constitutive models and the identified parameters. The comparison of the time history analysis on a 6-story frame with VE-BRBs and BRBs verified the advantages of VE-BRB for seismic protection of structures compared with traditional BRB. In general, VE-BRB had the potential to provide better control effect on structural displacement and shear in all stages than BRB as expected.

A Study on the Characteristics of Repeat Foreign Tourists to Korea (한국을 재방문하는 외래 관광객의 특성에 관한 연구)

  • Kim, Su-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.507-517
    • /
    • 2018
  • This study is focused on analyzing the characteristics of repeat foreign tourists to Korea and suggest how to increase the repeat ratio. As the result of analysis, there were significant differences in the variables of sex, age, country in the case of demographic characteristics and in the variables of travel types, the number of company, the purpose of visit, accommodations, major visiting places and visiting areas in the case of travel characteristic. And also there were significant differences in the variables of accommodation fees per person and expenses per person in their own country in the case of travel expenses and in the variables of immigration formalities, public transportations, accommodations, foods, shopping, tourist attractions and security in the case of satisfaction. Lastly there were significant differences in the variables of revisit intention within 3 years, recommendation intention, the image of Korea(before trip) and the image of Korea(after trip) in the case of behavior intention after trip and image evaluation. Therefore it should be considered the characteristics of repeat foreign tourists when we make the tourism products to increase the repeat ratio.