• Title/Summary/Keyword: Web Page

Search Result 675, Processing Time 0.027 seconds

Evaluation of the Korean e-government Web Sites Focused on Usability (대한민국 전자정부 웹사이트의 유용성 평가)

  • Byun, Dae-Ho
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.1-20
    • /
    • 2005
  • In this paper we evaluate the Korean e-government portal and linked web sites, based on usability. We pick a set of 18 representative government sites, and consider two approaches of type-I and type-II testing with different questionnaires. We ask users two questions at each site, regarding simple facts. We count a task as successful if the user find the right answer for fact questions. In type-I testing, after users have finished working with a site, we give them a post-test questionnaire asking them to rate the site in 16 different areas, in order to calculate the site rating. In type-II testing, we investigate page design, contents design, and site design of the web sites.

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

Transcoding Web Documents Using CC/PP and Annotation (CC/PP와 어노테이션을 이용한 웹 문서의 트랜스코딩)

  • Kim Hwe-Mo;Song Teuk-Seob;Choy Yoon-Chul;Lee Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.137-153
    • /
    • 2005
  • This paper presents a transcoding method that dynamically adapts Web pages to various devices. The proposed method is based on a CC/PP profile that is a standard description of a device's context information. Additionally, to support a sophisticated transcoding, we define an annotation schema for representing additional information about original contents. Since a mobile device has a screen of limited size, A Web page is splitted into many small ones. Our method constructs a navigation-map that represents the hierarchical relations among the splitted pages. Experimental results with various Web contents show that the proposed method is superior in terms of user's convenience of navigation and the transcoding Quality.

  • PDF

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

  • Choi, Sang-Yong;Kim, Daehyeok;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.422-435
    • /
    • 2016
  • Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today's cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribution. Researchers have proposed various methods for detecting a drive-by download attack effectively. However, existing methods have limitations against recent evasion techniques, including JavaScript obfuscation, hiding, and dynamic code evaluation. In this paper, we propose an emulation-based malicious webpage detection method. Based on our study on the limitations of the existing methods and the state-of-the-art evasion techniques, we will introduce four features that can detect malware distribution networks and we applied them to the proposed method. Our performance evaluation using a URL scan engine provided by VirusTotal shows that the proposed method detects malicious webpages more precisely than existing solutions.

Privacy and Security on the Web (웹에서의 개인정보보호 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.657-660
    • /
    • 2013
  • The Internet is referred as sea of information, which provides huge information, but personal information is collected for malicious behavior and provided to various web sites via internet. This can lead to economic losses as well as the disclosure of personal information. We can easily get personal information from device, such as mobile and private terminal, as well as internet, and then it can be spread very quickly. The personal information leakage and damage cases are also increasing, while the importance of personal information on the web page to distinguish the individual as the basic information is growing. In this paper we review and analyse recent invasion of privacy practices on the web and its causes, and technical and administrative protections.

  • PDF

Analysis and Implementation of a Web Document Converter for Wireless Internet Use XHTML On Mobile Communication Environment (이동통신환경에서 XHTML을 이용한 무선인터넷 문서변환기 분석 및 구현)

  • 백진영;이종옥;조성언;조경룡
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.105-108
    • /
    • 2001
  • This paper is purposed in design and implement of a device which can convert XHTML documents in web-Server into WML documents when users access the web by using portable devices. Users access XHTML(so-called HTML) web page and ask for informations, this document convertor recognizes of XHTML documents structures, reconstructs into simple WML documents by using