• Title/Summary/Keyword: Zombie

Search Result 49, Processing Time 0.019 seconds

A Study of Make-up Artists and Character's Special Make-up Effects in the Twentieth Century's Films (20세기 영화 특수 분장사와 캐릭터 특수 분장 연구)

  • Chang Mee-Sook;Yang Sook-Hi
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.6 s.96
    • /
    • pp.141-158
    • /
    • 2005
  • This study was motivated not only by the important role of the special make-up effects in films, but also by the prominent contributions created by make-up artists. The first objective was to study of Jack Pierce, Dick Smith, Tom Savini, Rick flake., and Stan Winston's impact in the most challenging and creative field of all make-up artistry. The second objective was to examine both affinities and differences in artistic styles as well as in make-up techniques through a comparative study of special make-up effects of horror and sci-fi movies in the 20th century films produced by Hollywood studios. The sci-fi films were designed to thrill the audience through the potential of futuristic ideas by fantastic special effects of futuristic creatures such as an extra-terrestrial, a mutant, a robot and a cyborg. In contrast, the horror films were designed to frighten the audience with more reliance on horrifying special effects including a vampire, a werewolf, a zombie and a psycho killer. Their features were shown in a common thread (masquerade, otherness and surrealism) as well as a number of different themes between horror and sci-fi films (transformation vs. extension, satanism vs. monstrosity, and primitivism vs. futurism).

Multi-Vector Defense System using Reverse Proxy Group and PMS(Patch Management System) Construction (Reverse Proxy Group과 PMS를 이용한 멀티벡터(Multi-Vector) DDoS 공격 방어시스템 구축 방안)

  • Kim, Min-Su;Shin, Sang-Il;Kim, JongMin;Choi, KyongHo;Lee, Daesung;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.79-86
    • /
    • 2013
  • The objective of DDoS Attacks is to simply disturb the services. In recent years, the DDoS attacks have been evolved into Multi-Vector Attacks which use diversified and mixed attacking techniques. Multi-Vector Attacks start from DDoS Attack and Malware Infection, obtain inside information, and make zombie PC to reuse for the next DDoS attacks. These forms of Multi-Vector Attacks are unable to be prevented by the existing security strategies for DDoS Attacks and Malware Infection. This paper presents an approach to effectively defend against diversified Multi-Vector attacks by using Reverse Proxy Group and PMS(Patch Management Server).

Design for Zombie PCs and APT Attack Detection based on traffic analysis (트래픽 분석을 통한 악성코드 감염PC 및 APT 공격탐지 방안)

  • Son, Kyungho;Lee, Taijin;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.491-498
    • /
    • 2014
  • Recently, cyber terror has been occurred frequently based on advanced persistent threat(APT) and it is very difficult to detect these attacks because of new malwares which cannot be detected by anti-virus softwares. This paper proposes and verifies the algorithms to detect the advanced persistent threat previously through real-time network monitoring and combinatorial analysis of big data log. In the future, APT attacks can be detected more easily by enhancing these algorithms and adapting big data platform.

The Design of Anti-DDoS System using Defense on Depth (다단계 방어기법을 활용한 DDoS 방어시스템 설계)

  • Seo, Jin-Won;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.679-689
    • /
    • 2012
  • There were clear differences between the DDoS attack on 7th July 2009 and the rest of them prior to the attack. Despite It had emitted relatively small sized packets per infected PC, the attack was very successful making use of HTTP Flooding attack by aggregating small sized packets from the well sized zombie network. As the objective of the attack is not causing permanent damage to the target system but temporal service disruption, one should ensure the availability of the target server by deploying effective defense strategy. In this paper, a novel HTTP based DDoS defense mechanism is introduced with capacity based defense-in-depth strategy.

Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services (웹서비스 대상 경량화 된 응용계층 DDoS 공격 대응 메커니즘)

  • Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.99-110
    • /
    • 2010
  • Recently, network based DDoS attacks have been changed into application layer DDoS attacks which are targeted at the web services. Specially, an attacker makes zombie PCs generate small traffic and its traffic pattern has been similar to the normal user's pattern. So, existing HTTP PPS based Threshold cannot defend the DDoS attacks effectively. In this paper, we displayed all the GET Flooding attack types and propose three DDoS attack defense mechanisms which are simple and very powerful. Proposed mechanisms can defend all the existing GET Flooding DDoS attacks and be deployed in the real environment immediately with little resource consumption.

Hero's journey content and glocal storytelling strategy (영웅서사 콘텐츠와 글로컬 스토리텔링 전략 -웹툰 <좀비가 된 나의 딸>을 중심으로-)

  • Seo, Seong-Eun;Kang, Ji-won
    • Journal of Korea Game Society
    • /
    • v.21 no.1
    • /
    • pp.99-112
    • /
    • 2021
  • This paper aims to explore the glocal storytelling strategy of hero's journey content. Many digital games use hero's journey as a framework. However, it is also true that game storytelling is so common that it is soon recognized as a hero's journey. Therefore, this paper paid attention to the new hero's journey application method of the webtoon . The story created an atypical and Korean character on a typical hero's journey plot. It implements an alternative glocal storytelling aiming at harmony between the region and the world by presenting a regional character on a global universal plot.

VR Interface for Immersive Expression of the User's Walking, Running, Limp and Zombie States (사용자의 걷기, 뛰기, 절름발이 움직임을 몰입감 있게 표현하기 위한 VR 인터페이스)

  • Moon, YeRin;Park, Seong-A;Park, Soyeon;Kim, Jong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.549-552
    • /
    • 2022
  • 본 논문에서는 가상현실에서 헤드 마운티드 디스플레이(Head mounted display, HMD) 사용자와 Non-HMD 사용자에게 사용자의 걷기, 뛰기, 절름발이 움직임을 몰입감 있게 표현하기 위한 새로운 가상현실(VR, Virtual Reality) 인터페이스를 제안한다. 가상현실에서는 몰입감을 높이기 위해 시각적 감각을 활용한 HMD와 사용자의 자세나 움직임을 추적하는 장비를 활용하지만, 일반적인 사용자들에게 HMD 보급은 많이 이루어져 있지 않으며, 비용적인 측면과 멀미로 인해 가상현실 콘텐츠에 몰입하기 어렵다. 본 논문에서는 효율적으로 몰입도를 높이고 비용적인 부담을 줄여주기 위해 아두이노를 활용한 새로운 보행 인터페이스 장치를 제안한다. 보행 인터페이스 장치는 사용자의 다리 가속도 정보를 기반으로 사용자의 상태 변화에 맞게 패턴을 설정하여 사용자의 걷기, 뛰기, 절름발이 움직임을 통해 사용자 캐릭터의 움직임을 제어하고 표현할 수 있는 새로운 결과를 보여준다.

  • PDF

The Expression of Fantastic Body in Fashion Illustration (패션 일러스트레이션에 나타난 판타스틱 신체의 표현 분석)

  • Choi, Jung-Hwa
    • Fashion & Textile Research Journal
    • /
    • v.11 no.6
    • /
    • pp.867-877
    • /
    • 2009
  • These days, the fantastic in opposition to classic beauty becomes a genre of creative body expression. The purpose of this study was to analyze the expressive characteristics of body types and meanings in recent fantastic fashion illustration. The method of this study was to analyze recent documentaries, fashion books, internet web site and so forth. The results were as follows: In literatures, pictures and movies, the category of the fantastic body's expressive types were classified as dominant mutant based on SF, multi body or fragment body by disruption, heterogeneous compound based on myth, personified humanoid and non substance in supernatural boundary. The dominant mutant based on SF was expressed image morphing, composition of machine image with body and modern metamorphosis of classic SF body. It means propensity to post-feminism and reservation of meaning analysis based on human unconsciousness. The multi body or fragment body by disruption in fashion illustration was expressed distorted composition of same body pictures, replacement of different bodies, deconstruction and partial omission of body and composition of meaning or non meaning images. It means permanence of self and basic narcissism. The heterogeneous compound based on myth was expressed general composition or optical illusion of various and aggressive animal motive. It means reinterpretation of original myth, metaphor of basic femme fatale, pursuit of permanence and sign of primitive mind in unconsciousness. The personified humanoid was expressed real human body description of mannequin or ball joint doll and anthropomorphism of robot image. It means representative satisfaction and nostalgia of childhood. The non substance in supernatural boundary was expressed grotesque description of ghost, zombie, vampire, angel, fairy, using of symbolic red, black color and non body. It means human's basic desire about immortality and taboo. Through the result of these study, the expression of fantastic body in fashion illustration will expend expressive method and we will understand human and cultural codes of today.

Classification of Malicious Web Pages by Using SVM (SVM을 활용한 악성 웹 페이지 분류)

  • Hwang, Young-Sup;Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.77-83
    • /
    • 2012
  • As web pages provide various services, the distribution of malware via the web pages is being also increased. Malware can make personal information leak, system mal-function and system be zombie. To protect this damages, we should block the malicious web pages. Because the malicious codes embedded in web pages are obfuscated or transformed, it is difficult to detect them using signature-based approaches which are used by current anti-virus software. To overcome this problem, we extracted features to classify malicious web pages and benign ones by analyzing web pages. And we propose a classification method using SVM which is widely used in machine learning. Experimental results show that the proposed method is better than other methods. The proposed method could classify malicious web pages correctly and be helpful to block the distribution of malicious codes.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.