• Title/Summary/Keyword: Security visualization

Search Result 137, Processing Time 0.022 seconds

Use of Visual Digital Media to Develop Creativity: The Example of Video Games

  • V., Zabolotnyuk;S., Khrypko;I., Ostashchuk;D., Chornomordenko;A., Timchenko;T., Motruk;K., Pasko;O., Lobanchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.13-18
    • /
    • 2022
  • In the post-information era, most of technologies have a visual part, or at least some functions related to visualization. It is also one of the popular means of presenting materials in education area. However, despite its popularity, the impact of visualization on the effectiveness of learning still remains controversial. Even more controversial is its usefulness in developing creativity, which is one of the most important skills for today's employee. The authors considered the use of visualization as a tool for the development of children's creativity on the example of learning video games, in particular, ClassCraft to distinguish features that, from the point of view of psychology, may lead to developing creativity even being not useful for educational purposes. It is concluded that video games useful for learning may have features, that are inappropriate in formal educational context, but important to develop creative thinking.

Means of Visualization in Teaching Ukrainian as a Foreign Language to Modern Students with Clip Way of Thinking

  • Kushnir, Iryna;Zozulia, Iryna;Hrytsenko, Olha;Uvarova, Tetiana;Kosenko, Iuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.55-60
    • /
    • 2022
  • Acceleration of the pace of life, increasing the amount of information, the emergence of "clip way of thinking" as a phenomenon has led to the problem of choosing forms of presentation of educational materials to students. One of the ways to solve this problem is to use the means of visualization of information flow, forasmuch as the thinking of modern youth is more effective in perceiving visual images than verbal means. The purpose of the research is to prove the effectiveness of the use of visualization in the process of teaching Ukrainian as a foreign language to students with clip way of thinking. The following methods have been used, namely: analysis, synthesis, comparison, systematization and generalization of scientific literature; testing and surveys; pedagogical experiment; quantitative and qualitative analysis of data, interpretation and generalization of the research results. The essence of visualization means has been revealed; the expediency of their use in the methodology of teaching foreign students the Ukrainian language has been substantiated. It has been proven that the role of Ukrainian teachers lies in taking into account all new trends in teaching, integrating computer perception of information by foreign students into teaching technology and using cognitive visualization in order to intensify the learning process.

Visualization of Dynamic Simulation Data for Power System Stability Assessment

  • Song, Chong-Suk;Jang, Gil-Soo;Park, Chang-Hyun
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.4
    • /
    • pp.484-492
    • /
    • 2011
  • Power system analyses, which involve the handling of massive data volumes, necessitate the use of effective visualization methods to facilitate analysis and assist the user in obtaining a clear understanding of the present state of the system. This paper introduces an interface that compensates for the limitations of the visualization modules of dynamic security assessment tools, such as PSS/e and TSAT, for power system variables including generator rotor angle and frequency. The compensation is made possible through the automatic provision of dynamic simulation data in visualized and tabular form for better data intuition, thereby considerably reducing the redundant manual operation and time required for data analysis. The interface also determines whether the generators are stable through a generator instability algorithm that scans simulation data and checks for an increase in swing or divergence. The proposed visualization methods are applied to the dynamic simulation results for contingencies in the Korean Electric Power Corporation system, and have been tested by power system researchers to verify the effectiveness of the data visualization interface.

A Research for New Taxonomy of Information Visualization (정보시각화의 새로운 분류법에 관한 연구)

  • Bae, Jun-Woo;Lee, Suk-Won;Kim, In-Soo;Myung, Ro-Hae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.76-84
    • /
    • 2009
  • Since too much information has been generated, it became very difficult to find out valuable and necessary information. In order to deal with the problem of information overload, the taxonomy for information visualization techniques has been based upon visualized shapes such as tree map, fisheye view and parallel coordinates, so that it was difficult to choose the right representation technique by data characteristics. Therefore, this study was designed to introduce a new taxonomy for the information visualization by data characteristics which defined by space (3D vs. multi-dimensions), time (continuous vs. discrete), and relations of data (qualitative vs. quantitative). To verify the new taxonomy, forensic data which were generated to investigate the culprit of network security was used. The result showed that the new taxonomy was found to be very efficient and effective to choose the right visualized shape for forensic data for network security. In conclusion, the new taxonomy was proven to be very helpful to choose the right information visualization technique by data characteristics.

Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware (악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발)

  • Park, Jihyeon;Kim, Taeok;Shin, Yulim;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.650-657
    • /
    • 2020
  • The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware and the emergence of malicious code. For this, it is necessary to accurately and quickly detect and classify malware family. In this paper, we analyzed and classified visualization technology, which is a preprocessing technology used for deep learning-based malware classification. The first method is to convert each byte into one pixel of the image to produce a grayscale image. The second method is to convert 2bytes of the binary to create a pair of coordinates. The third method is the method using LSH. We proposed improving the technique of using the entire existing malicious code file for visualization, extracting only the areas where important information is expected to exist and then visualizing it. As a result of experimenting in the method we proposed, it shows that selecting and visualizing important information and then classifying it, rather than containing all the information in malicious code, can produce better learning results.

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

Smart Contract Security Audit Trends and Services (스마트 계약 보안 감사 동향 및 서비스)

  • Chansol Park;Janghwan Kim;R. Young Chul Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1017-1029
    • /
    • 2023
  • A large amount of transactions are taking place through Blockchain. Among them, the proportion of transactions through smart contracts is increasing. Accordingly, problems such as vulnerability attacks on smart contracts and fraud using smart contracts are increasing. Through security audits of smart contracts, developers can discover and resolve vulnerabilities, and users can distinguish whether smart contracts are fraudulent. However, there are currently no regulations and standards for security auditing of smart contracts, so services that perform security auditing are uneven. In this paper, we analyze security audit trends for smart contracts and identify what services are being provided. We investigate what elements are analyzed from smart contracts, focusing on security audit reports. Also, investigate what vulnerabilities can be detected. Finally, we investigate quality indicators for smart contracts and visualization elements of design extraction. Through this, we hope to be able to find visualization elements specialized for smart contracts.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.

Visualization of network traffic attack using time series radial axis and cylindrical coordinate system (시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화)

  • Chang, Beom-Hwan;Choi, Younsung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.17-22
    • /
    • 2019
  • Network attack analysis and visualization methods using network traffic session data detect network anomalies by visualizing the sender's and receiver's IP addresses and the relationship between them. The traffic flow is a critical feature in detecting anomalies, but simply visualizing the source and destination IP addresses symmetrically from up-down or left-right would become a problematic factor for the analysis. Also, there is a risk of losing timely security situation when designing a visualization interface without considering the temporal characteristics of time-series traffic sessions. In this paper, we propose a visualization interface and analysis method that visualizes time-series traffic data by using the radial axis, divide IP addresses into network and host portions which then projects on the cylindrical coordinate system that could effectively monitor network attacks. The proposed method has the advantage of intuitively recognizing network attacks and identifying attack activity over time.

COTS-Based Development of Power System Data Visualization Program (COTS기반의 전력계통 데이터 시각화 프로그램 개발)

  • Oh, Sea-Seung;Jang, Gil-Soo;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.184-186
    • /
    • 2007
  • Visualization has a strong capability to manage and display a large volume of data. It makes system analysis more intuitive and helps an operator in monitoring system status, understanding its phenomena, identifying its problems, and performing corrective action to maintain the security of the system. In this paper visualization program is developed based on a COTS-based software development concept in a distributed environment using open-source application software and development tools.

  • PDF