• Title/Summary/Keyword: Social Engineering Attack

Search Result 70, Processing Time 0.029 seconds

A Study on Repair Method of Concrete Structures using the Solution of Removing Chloride (염분제거용 약액을 이용한 콘크리트 구조물의 보수공법에 관한 연구)

  • Kim, Woonhak;Hwang, Sungwoon;Kang, Seokwon
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.562-569
    • /
    • 2017
  • Reinforced concrete is used for bridges and large structures that are constructed with social overhead capital because they are economically and semi-permanently integrated with reinforcing bar and concrete. However, when the chloride ion in the concrete destroys the passive film of the reinforcing bar by the marine exposure environment and the snow remover used in the winter season, and the reinforcing bar is corroded by various chemical and physical actions, the durability is deteriorated in a short period, and the life span is shortened. In this study, a repair method to recover the durability of the initial structure by effectively removing chloride ion from the damage caused by salting of the above mentioned reinforced concrete was conducted.

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

A fundamental study on the sulphate-resistant mortar using waste glass fine powder and meta-kaolin according to various fine aggregates (잔골재 종류에 따른 폐유리 미분말 및 메타카올린을 사용한 내황산염 모르타르에 관한 기초적 연구)

  • Jeong, Dongwhan;Park, Junhui;Ahn, Taeho;Park, Yeongsik;Sho, Kwangho
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.27 no.3
    • /
    • pp.115-121
    • /
    • 2017
  • The degradation of the concrete due to deterioration factors, such as corrosion of steel bars, cracks and structural strength of reinforced concrete structures, is a social problem. Especially, concrete structures constructed in seawater, underground water, waste water treatment facilities and sewerage are subject to chemical attack by acid and sulphate. Therefore, this study was conducted to compare sulfated glass and fine aggregate of slag using waste glass fine powder and meta kaolin. The results showed that the slag fine aggregate showed better sulfate resistance than the river sand, and the fine powder of waste glass showed the best performance at 3 % displacement.

Tactile Sensing for Virtual Interaction as a Part of Ubiquitous Game Development (유비쿼터스게임의 상호작용 구성요소 개발을 위한 촉각응용)

  • Lee, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1062-1068
    • /
    • 2007
  • In order to design and develop a ubiquitous game, it is necessary to develop a natural and flexible interface between the real world and the virtual world, based on social and physical context awareness. We design user interface model and the tactile sensing system that performs virtual interaction and collection of the sensor data. It is sensitive so the collected data should be filtered, rearranged and analyzed. This information is quite different from stylus input, keyboard, button or mouse for interaction. We detect kicked 3D force position of a ball, moment of area, moment of inertia and modified ball shape using tactile sensing system and analyzed data. The results demonstrate that the proposed approach is desirable and robust as well as the results can be used realistic actions and reactions considering attack force and to make interesting environments for ubiquitous game.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Vulnerability Analysis of the Creativity and Personality Education based on Digital Convergence Curation System (창의·인성 교육기반의 디지털 융합 큐레이션 시스템에 관한 취약점 분석)

  • Shin, Seung-Soo;Kim, Jung-In;Youn, Jeong-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.225-234
    • /
    • 2015
  • With the growing number of people that use web services, the perception of the importance of securing web applications is also increasing. There are many different types of attacks that target web applications. In the rapidly-changing knowledge and information society, which came into being with the advancements made in information and communication technology, there is currently an urgent need for building web sites for the purposes of developing one's creativity and character. In this paper, attack schemes that use SQL injections and XSS and target educational digital curation systems which provide educational contents with the aim of developing of one's creativity and character are analyze, in terms of how the attacks are carried out and their vulnerabilities. Furthermore, it suggests ways of dealing appropriately with these web-based attacks that use SQL injections and XSS.

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF

A Trends Analysis on Safety for CNG/HCNG Complex Fueling Station (CNG/HCNG 복합충전소의 안전에 관한 동향분석)

  • Lee, Seung-Hyun;Kang, Seung-Kyu;Sung, Jong-Gyu;Lee, Young-Soon
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.2
    • /
    • pp.1-8
    • /
    • 2011
  • In this research, the safety trends and technologies of HCNG, a mixture of hydrogen and natural gas, are analyzed. This is an attracting alternative fuels to meet the strengthened automotive exhaust gas emission standards. HCNG is very important opportunities and challenges in that it is available the existing CNG infrastructures, meets the strengthened emission standards, and the technical, social bridge of the coming era of hydrogen. It is essential for the commercialization of HCNG that hydrogen - compressed natural gas blended fuel for use in preparation of various safety considerations included accidents scenario, safety distance, hydrogen attack, ignition sources and fire detectors are examined. Risk assessments also are suggested as one of permission procedure for HCNG filling station.

Research on Secure Keypads for Mobile Devices with Stretchable Displays (스트레처블 디스플레이가 적용된 모바일 기기의 보안 키패드 연구)

  • Dongmin Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.885-890
    • /
    • 2024
  • This study proposes a secure keypad structure that can adapt to screen changes in mobile devices equipped with stretchable display. For this purpose, we compared and analyzed the authentication methods applied to current rigid form factor smartphones with those applied to rollable and bendable display based smartphones, which are the previous stages of stretchable display. Based on the results of this analysis, we identified potential user convenience and security safety issues that may arise in the form factor structure for smart wallets, multitasking, screen expansion and media viewing, and gaming and entertainment applications where stretchable displays will be applied, then proposed a security keypad structure for these form factors. Our keypad structure provides enhanced user convenience and security compared to the structures applied in the smartphone environment based on the conventional rigid display form factor and rollable, bendable display form factor.