• Title/Summary/Keyword: User

Search Result 29,224, Processing Time 0.051 seconds

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

A Reflection of Aging Society in Online Communities: An Exploratory Study on Changes in Conversation Style and Language Usage (온라인 커뮤니티에서 보여지는 노령화 사회의 단면: 대화 방식과 사용 언어의 변화에 대한 탐색적 연구)

  • Jung Lee;Jinyoung Han;Juyeon Ham
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.51-68
    • /
    • 2023
  • With the emergence of the internet and the increasing use of online communities for over 20 years, the age range of users has also been rising. This study explores the linguistic changes that have occurred as the user age in online communities has increased. To do this, data was collected and analyzed from an online community that has been actively operating, despite new member registrations being closed nine years ago. By comparing the posts over an 11-year period from 2012 to 2022, changes such as an increase in average comments, a decrease in interrogative sentences, and a decrease in imperative statements were observed. The study also proposed loneliness due to aging and a decline in curiosity and confidence as potential causes of these changes. In South Korea, which is rapidly entering an aging society unprecedentedly fast on a global scale, the increase in single-person households has evolved loneliness from a personal issue to a social problem, manifested in an increase in solitary deaths and reclusive individuals. This research sheds light on one aspect of these social phenomena through the analysis of data from a large online community.

Generative AI service implementation using LLM application architecture: based on RAG model and LangChain framework (LLM 애플리케이션 아키텍처를 활용한 생성형 AI 서비스 구현: RAG모델과 LangChain 프레임워크 기반)

  • Cheonsu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.129-164
    • /
    • 2023
  • In a situation where the use and introduction of Large Language Models (LLMs) is expanding due to recent developments in generative AI technology, it is difficult to find actual application cases or implementation methods for the use of internal company data in existing studies. Accordingly, this study presents a method of implementing generative AI services using the LLM application architecture using the most widely used LangChain framework. To this end, we reviewed various ways to overcome the problem of lack of information, focusing on the use of LLM, and presented specific solutions. To this end, we analyze methods of fine-tuning or direct use of document information and look in detail at the main steps of information storage and retrieval methods using the retrieval augmented generation (RAG) model to solve these problems. In particular, similar context recommendation and Question-Answering (QA) systems were utilized as a method to store and search information in a vector store using the RAG model. In addition, the specific operation method, major implementation steps and cases, including implementation source and user interface were presented to enhance understanding of generative AI technology. This has meaning and value in enabling LLM to be actively utilized in implementing services within companies.

A Study on Real-time Autonomous Driving Simulation System Construction based on Digital Twin - Focused on Busan EDC - (디지털트윈 기반 실시간 자율주행 시뮬레이션 시스템 구축 방안 연구 - 부산 EDC 중심으로 -)

  • Kim, Min-Soo;Park, Jong-Hyun;Sim, Min-Seok
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.2
    • /
    • pp.53-66
    • /
    • 2023
  • Recently, there has been a significant interest in the development of autonomous driving simulation environment based on digital twin. In the development of such digital twin-based simulation environment, many researches has been conducted not only performance and functionality validation of autonomous driving, but also generation of virtual training data for deep learning. However, such digital twin-based autonomous driving simulation system has the problem of requiring a significant amount of time and cost for the system development and the data construction. Therefore, in this research, we aim to propose a method for rapidly designing and implementing a digital twin-based autonomous driving simulation system, using only the existing 3D models and high-definition map. Specifically, we propose a method for integrating 3D model of FBX and NGII HD Map for the Busan EDC area into CARLA, and a method for adding and modifying CARLA functions. The results of this research show that it is possible to rapidly design and implement the simulation system at a low cost by using the existing 3D models and NGII HD map. Also, the results show that our system can support various functions such as simulation scenario configuration, user-defined driving, and real-time simulation of traffic light states. We expect that usability of the system will be significantly improved when it is applied to broader geographical area in the future.

A Method for Selecting AI Innovation Projects in the Enterprise: Case Study of HR part (기업의 혁신 프로젝트 선정을 위한 모폴로지-AHP-TOPSIS 모형: HR 분야 사례 연구)

  • Chung Doohee;Lee Jaeyun;Kim Taehee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.5
    • /
    • pp.159-174
    • /
    • 2023
  • In this paper, we proposed a methodology to effectively determine the selection and prioritization of new business and innovation projects using AI technology. AI technology is a technology that can upgrade the business of companies in various industries and increase the added value of the entire industry. However, there are various constraints and difficulties in the decision-making process of selecting and implementing AI projects in the enterprise. In this paper, we propose a new methodology for prioritizing AI projects using Morphology, AHP, and TOPSIS. The proposed methodology helps prioritize AI projects by simultaneously considering the technical feasibility of AI technology and real-world user requirements. In this study, we applied the proposal methodology to a real enterprise that wanted to prioritize multiple AI projects in the HR field and evaluated the results. The results confirm the practical applicability of the methodology and suggest ways to use it to help companies make decisions about AI projects. The significance of the methodology proposed in this study is that it is a framework for prioritizing multiple AI projects considered by a company in the most reasonable way by considering both business and technical factors at the same time.

  • PDF

An Empirical Study on the Effects of Venture Company's Website Properties on Bounce Rate (벤처기업 웹사이트의 속성이 웹사이트 이탈률에 미치는 영향에 관한 실증연구)

  • Yun Do Hwang;Tae Kwan Ha
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.2
    • /
    • pp.67-79
    • /
    • 2023
  • The bounce rate is the rate at which a user leaves immediately after visiting, and this study aimed to find out what attributes of a website affect the bounce rate. Web site evaluation items were defined as a total of 4 items and 27 evaluation attributes, including usability, information, service interaction, and technology, so that they can be commonly applied to venture companies in various industries through prior research. As a result of the study, 6 website attributes that affect the bounce rate were verified to be significant by discriminant analysis and decision tree analysis. Suggestions to reduce the bounce rate of venture business websites through this study are as follows. First, the path name of the website is displayed as mandatory and a pull-down menu function is added to facilitate movement to other pages. Second, it is good to expose core content that can attract users' attention in the form of a banner, and place internal link banners in the right place on sub-pages. Third, external links should be linked to a new window so that they do not leave the current page immediately so that they can be re-entered. Lastly, it is recommended to expose the contact information of the person in charge and consultation function as direct information for communication with customers, but if individual response is difficult, at least the consultation function must be added. These suggestions are expected to be of practical help in various fields such as website development, operation, and marketing. However, in special cases, a high bounce rate may be normal, so it should be considered according to the situation.

  • PDF

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

Establishment of Risk Database and Development of Risk Classification System for NATM Tunnel (NATM 터널 공정리스크 데이터베이스 구축 및 리스크 분류체계 개발)

  • Kim, Hyunbee;Karunarathne, Batagalle Vinuri;Kim, ByungSoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.1
    • /
    • pp.32-41
    • /
    • 2024
  • In the construction industry, not only safety accidents, but also various complex risks such as construction delays, cost increases, and environmental pollution occur, and management technologies are needed to solve them. Among them, process risk management, which directly affects the project, lacks related information compared to its importance. This study tried to develop a MATM tunnel process risk classification system to solve the difficulty of risk information retrieval due to the use of different classification systems for each project. Risk collection used existing literature review and experience mining techniques, and DB construction utilized the concept of natural language processing. For the structure of the classification system, the existing WBS structure was adopted in consideration of compatibility of data, and an RBS linked to the work species of the WBS was established. As a result of the research, a risk classification system was completed that easily identifies risks by work type and intuitively reveals risk characteristics and risk factors linked to risks. As a result of verifying the usability of the established classification system, it was found that the classification system was effective as risks and risk factors for each work type were easily identified by user input of keywords. Through this study, it is expected to contribute to preventing an increase in cost and construction period by identifying risks according to work types in advance when planning and designing NATM tunnels and establishing countermeasures suitable for those factors.

A Study on the User-Based Small Fishing Boat Collision Alarm Classification Model Using Semi-supervised Learning (준지도 학습을 활용한 사용자 기반 소형 어선 충돌 경보 분류모델에대한 연구)

  • Ho-June Seok;Seung Sim;Jeong-Hun Woo;Jun-Rae Cho;Jaeyong Jung;DeukJae Cho;Jong-Hwa Baek
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.358-366
    • /
    • 2023
  • This study aimed to provide a solution for improving ship collision alert of the 'accident vulnerable ship monitoring service' among the 'intelligent marine traffic information system' services of the Ministry of Oceans and Fisheries. The current ship collision alert uses a supervised learning (SL) model with survey labels based on large ship-oriented data and its operators. Consequently, the small ship data and the operator's opinion are not reflected in the current collision-supervised learning model, and the effect is insufficient because the alarm is provided from a longer distance than the small ship operator feels. In addition, the supervised learning (SL) method requires a large number of labeled data, and the labeling process requires a lot of resources and time. To overcome these limitations, in this paper, the classification model of collision alerts for small ships using unlabeled data with the semi-supervised learning (SSL) algorithms (Label Propagation and TabNet) was studied. Results of real-time experiments on small ship operators using the classification model of collision alerts showed that the satisfaction of operators increased.