• Title/Summary/Keyword: Security Data Analysis

Search Result 2,265, Processing Time 0.035 seconds

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication (특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체 정보 데이터의 가역성에 대한 보안 문제 분석)

  • Kim, Koon-Soon;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.51-59
    • /
    • 2008
  • The biometrics has been researched as a means for authenticating user's identity. Among the biometrics schemes for face recognition, the eigenvector-based schemes, which use eigenvector made from training data for transforming test data to abstracted data, are widely adopted. From those schemes, however, it is hard to expect cancelable feature, which is a general concept for security in the biometrics. In this paper, we point out the security problem that is the recovery of valuable face information from the abstracted face data and consider a possible attack scenario by showing our experiment results.

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

A Study on the Press Report Analysis of Special Security Guard in Korea Using Big Data Analysis

  • Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.183-188
    • /
    • 2020
  • This study is primarily aimed at providing a foundation for academic development and the leap forward of the Special Security Industry through the press report analysis on Korea's special security guard using big data. The research methods It was analyzed by the research methods in relation to keyword trends for 'special security guard' and 'special guards' using the Big Kinds program. According to the analysis based on the period of growth (quantitative and qualitative) of the special security industry, there were many press reports and exposure related to carrying firearms, national major facilities, and regular employees. Unlike the general security guards, the special security guards were released higher by media as a law was revised to allow them to carry or use firearms at important national facilities. There was a lot of media attention concerned about the side effects of misuse, and there were also high media reports on the transition of regular workers to improve poor treatment, such as the unstable status of special security guards and low wages. Therefore, the need for continuous development and improvement of professionalism and work efficiency of special security services are emphasized.

The relation between the five critical crime of criminal law and the private security services (형법범죄 중 5대 범죄와 민간경비 간의 관계)

  • Joo, Il-Yeob;Jo, Gwang-Rae
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.361-377
    • /
    • 2004
  • This study is to examine the relations between the big five critical crime that consist of homicide, robbery, rape, theft, violence and the private security services. To achieve this objective, this research selected the subject of study, specially, 2002 status of the private security such as the number of companies and employees classified by areas along with the big five crime mentioned above classified by area. The research data is secondary data that is from '2003 Crime Analysis' of the Supreme Public Prosecutors' Office and 'The private Security Related Data' of the National Police Agency. The selected data were analyzed according to the variables by using SPSS 10.0 statistics software program. Each hypothesis was verified around the level of significance ${\alpha}$=.05 by using the statistical techniques, such as Descriptive Statistics, Correlation, Regression, etc. The following was the result of the study, First, the total number of the big five crime affects the number of the companies at significant level. Second, the number of the security companies can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder. Third, the total number of the big five crime affects the number of the security employees at significant level. Forth the number of the security employees can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder.

  • PDF

The Effects of Customer Aggression on the Job Stress and Emotional Burnout of Security Guards in Casino (카지노 고객의 공격성이 시큐리티 종사자의 직무스트레스 및 소진에 미치는 영향)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.87-107
    • /
    • 2010
  • The purpose of this study is to examine the effects of customer aggression on the job stress and emotional burnout of security guards in casino. Investigating tools used questionnaire, the sampling was drawn from security guards at 6 casinos which had more than 30 security guards. To this study, the partisans of the study were 269 people. Data for creation for questionnaire is completely computed processing and using SPSS 15.0 Windows that is social studies scholastic mantle command program after imputed encoding according to each purpose. Analyzing techniques to use for analysis of data enforced technology figure analysis, factor analysis, reliability analysis, t-test, one-way ANOVA, multiple regression analysis. Through data analysis by such method and procedure, conclusion that gets in this research is as following. First, exposure that is difference that keep in mind partially as result that verify difference of aggression according to demographical features, job stress and emotional burnout that is security guard's in casino. Second, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in job stress of security guards in casino. Third, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in emotional burnout of security guards in casino.

  • PDF

The survey on the Approach to the problem of Security-Constrained Price-Based Unit Commitment in the Deregulated Power Market (전력시장에서 안전도와 가격을 고려한 발전기 기동정지계획문제에 대한 조사연구)

  • Jang, Se-Hwan;Kim, Jin-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.359-360
    • /
    • 2006
  • This paper introduces a variable of methodology and models of solving Security-Constrained Price-Based Unit Commitment(SPUC) Problems in the Deregulated Power Market. The objective of SPUC is coordination between GENCOs and the ISO. GENCOs apply Price-Based Unit Commitment(PBUC) without security constraints and submit capacity bids to the ISO for maximizing their revenues. Using generation data and transmission data obtained from TRANSCOs, the ISO applies Security-Constrained Unit Commitment(SCUC), executes congestion management and contingency analysis for minimizing line flow violations and the risk supplying loads. Considering analysis data, the ISO should adjust GENCOS' bid. In this paper, we presents the result of survey and analyze on the approach of the SPUC problem.

  • PDF

The Influence of the Organizational Environment and Culture of the Employees in Private Security Corporation on the Organizational Performance (민간경비업체 조직구성원의 조직 환경, 조직 문화가 조직 성과에 미치는 영향)

  • Jung, Nam-Ju
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.251-278
    • /
    • 2011
  • The purpose of this study aimed to examine work environment and culture of the employees in private security corporation on the organizational performance. 200 guards who worked at security employees in Julanam buk provinces in 2011 were selected by using the method of judgment sampling and 188 guards were used for analysis. The data were analyzed with frequency analysis, factor analysis, reliability analysis, and correlation analysis of the collected data from the respondents by using SPSS 15.0. The conclusion was as follows: First, there was significant relationship between work environment and culture of the employees, organizational performance in private security corporation. Second, organizational environment of employees in private security corporation exerts influence of organizational culture and organizational performance. That is, organizational environment of employees in private security corporation exerts direct influence on organization performance, but it exerts indirect effect through organizational culture.

  • PDF

An implementation of stable transmission and security management system of massive acoustic data in unsecurity and low speed network area (비보호 저속망 환경에서의 고용량 음향데이터의 안정적 전송 및 관리 시스템 구현)

  • Sun, Doo-Young;Kim, Yong-Deak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.164-167
    • /
    • 2009
  • The amount of acoustic data gathered from the acoustic data gathering system is increased dramatically as the acoustic data gathering system become various and highly effective. It is needed to transmit this acoustic data to analysis environment for precise analysis. In this gathering/analysis system, it is also needed the stable transmitting as well as highly perfect security. In this paper, I would like to propose a transmitting and management system sending a massive gathering acoustic data in the unsecurity and low speed networking environment. The implemented system is to transmit the acoustic data safely in low speed networking environment and secure the acoustic data from various threats.

  • PDF