• Title/Summary/Keyword: Security Detection

Search Result 2,046, Processing Time 0.025 seconds

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Social network analysis of keyword community network in IoT patent data (키워드 커뮤니티 네트워크의 소셜 네트워크 분석을 이용한 사물 인터넷 특허 분석)

  • Kim, Do Hyun;Kim, Hyon Hee;Kim, Donggeon;Jo, Jinnam
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2016
  • In this paper, we analyzed IoT patent data using the social network analysis of keyword community network in patents related to Internet of Things technology. To identify the difference of IoT patent trends between Korea and USA, 100 Korea patents and 100 USA patents were collected, respectively. First, we first extracted important keywords from IoT patent abstracts using the TF-IDF weight and their correlation and then constructed the keyword network based on the selected keywords. Second, we constructed a keyword community network based on the keyword community and performed social network analysis. Our experimental results showed while Korea patents focus on the core technologies of IoT (such as security, semiconductors and image process areas), USA patents focus on the applications of IoT (such as the smart home, interactive media and telecommunications).

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 안드로이드 모바일 악성 앱의 최적 특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.11
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose three approaches to modeling Android malware. The first method involves human security experts for meticulously selecting feature sets. With the second approach, we choose 300 features with the highest importance among the top 99% features in terms of occurrence rate. The third approach is to combine multiple models and identify malware through weighted voting. In addition, we applied a novel method of eliminating permission information which used to be regarded as a critical factor for distinguishing malware. With our carefully generated feature sets and the weighted voting by the ensemble algorithm, we were able to reach the highest malware detection accuracy of 97.8%. We also verified that discarding the permission information lead to the improvement in terms of false positive and false negative rates.

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

Optimal Ratio of Data Oversampling Based on a Genetic Algorithm for Overcoming Data Imbalance (데이터 불균형 해소를 위한 유전알고리즘 기반 최적의 오버샘플링 비율)

  • Shin, Seung-Soo;Cho, Hwi-Yeon;Kim, Yong-Hyuk
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.49-55
    • /
    • 2021
  • Recently, with the development of database, it is possible to store a lot of data generated in finance, security, and networks. These data are being analyzed through classifiers based on machine learning. The main problem at this time is data imbalance. When we train imbalanced data, it may happen that classification accuracy is degraded due to over-fitting with majority class data. To overcome the problem of data imbalance, oversampling strategy that increases the quantity of data of minority class data is widely used. It requires to tuning process about suitable method and parameters for data distribution. To improve the process, In this study, we propose a strategy to explore and optimize oversampling combinations and ratio based on various methods such as synthetic minority oversampling technique and generative adversarial networks through genetic algorithms. After sampling credit card fraud detection which is a representative case of data imbalance, with the proposed strategy and single oversampling strategies, we compare the performance of trained classifiers with each data. As a result, a strategy that is optimized by exploring for ratio of each method with genetic algorithms was superior to previous strategies.

Detection The Behavior of Smartphone Users using Time-division Feature Fusion Convolutional Neural Network (시분할 특징 융합 합성곱 신경망을 이용한 스마트폰 사용자의 행동 검출)

  • Shin, Hyun-Jun;Kwak, Nae-Jung;Song, Teuk-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1224-1230
    • /
    • 2020
  • Since the spread of smart phones, interest in wearable devices has increased and diversified, and is closely related to the lives of users, and has been used as a method for providing personalized services. In this paper, we propose a method to detect the user's behavior by applying information from a 3-axis acceleration sensor and a 3-axis gyro sensor embedded in a smartphone to a convolutional neural network. Human behavior differs according to the size and range of motion, starting and ending time, including the duration of the signal data constituting the motion. Therefore, there is a performance problem for accuracy when applied to a convolutional neural network as it is. Therefore, we proposed a Time-Division Feature Fusion Convolutional Neural Network (TDFFCNN) that learns the characteristics of the sensor data segmented over time. The proposed method outperformed other classifiers such as SVM, IBk, convolutional neural network, and long-term memory circulatory neural network.

McDoT: Multi-Channel Domain Tracking Technology for Illegal Domains Collection

  • Cho, Ho-Mook;Lee, JeongYoung;Jang, JaeHoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.127-134
    • /
    • 2020
  • Recently, Harmful sites, including pornographic videos, drugs, personal information and hacking tool distribution sites, have caused serious social problems. However, due to the nature of the Internet environment where anyone can use it freely, it is difficult to control the user effectively. And the site operator operates by changing the domain to bypass the blockage. Therefore, even once identified sites have low persistence. In this paper, we propose multi-channel domain tracking technology, a technique that can effectively track changes in the domain addresses of harmful sites, including the same or similar content, by tracking changes in these harmful sites. Proposed technology is a technology that can continuously track information in a domain using OSINT technology. We tested and verified that the proposed technology was effective for domain tracking with a 90.4% trace rate (sensing 66 changes out of 73 domains).

Development of AI-based Cognitive Production Technology for Digital Datadriven Agriculture, Livestock Farming, and Fisheries (디지털 데이터 중심의 AI기반 환경인지 생산기술 개발 방향)

  • Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.54-63
    • /
    • 2021
  • Since the recent COVID-19 pandemic, countries have been strengthening trade protection for their security, and the importance of securing strategic materials, such as food, is drawing attention. In addition to the cultural aspects, the global preference for food produced in Korea is increasing because of the Korean Wave. Thus, the Korean food industry can be developed into a high-value-added export food industry. Currently, Korea has a low self-sufficiency rate for foodstuffs apart from rice. Korea also suffers from problems arising from population decline, aging, rapid climate change, and various animal and plant diseases. It is necessary to develop technologies that can overcome the production structures highly dependent on the outside world of food and foster them into export-type system industries. The global agricultural industry-related technologies are actively being modified via data accumulation, e.g., environmental data, production information, and distribution and consumption information in climate and production facilities, and by actively expanding the introduction of the latest information and communication technologies such as big data and artificial intelligence. However, long-term research and investment should precede the field of living organisms. Compared to other industries, it is necessary to overcome poor production and labor environment investment efficiency in the food industry with respect to the production cost, equipment postmanagement, development tailored to the eye level of field workers, and service models suitable for production facilities of various sizes. This paper discusses the flow of domestic and international technologies that form the core issues of the site centered on the 4th Industrial Revolution in the field of agriculture, livestock, and fisheries. It also explains the environmental awareness production technologies centered on sustainable intelligence platforms that link climate change responses, optimization of energy costs, and mass production for unmanned production, distribution, and consumption using the unstructured data obtained based on detection and growth measurement data.

Preliminary Perfomances Anlaysis of 1.5-m Scale Multi-Purpose Laser Ranging System (1.5m급 다목적형 레이저 추적 시스템 예비 성능 분석)

  • Son, Seok-Hyeon;Lim, Jae-Sung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.9
    • /
    • pp.771-780
    • /
    • 2021
  • The space Debris laser ranging system is called to be a definite type of satellite laser ranging system that measures the distance to satellites. It is a system that performs POD (Precise Orbit Determination) by measuring time of flight by firing a laser. Distance precision can be measured in mm-level units, and it is the most precise system among existing systems. Currently, KASI has built SLR in Sejong and Geochang, and utilized SLR data to verify the precise orbits of the STSAT-2C and KOMASAT-5. In recent years, due to the fall or collision of space debris, its satellites have been threatened, and in terms of security, laser tracking of space objects is receiving great interest in order to protect their own space assets and protect the safety of the people. In this paper, a 1.5m-class main mirror was applied for the system design of a multipurpose laser tracking system that considers satellite laser ranging and space object laser tracking. System preliminary performance analysis was performed based on Link Budget analysis considering specifications of major components.