• Title/Summary/Keyword: blockchain technology

Search Result 630, Processing Time 0.027 seconds

An Encrypted Botnet C&C Communication Method in Bitcoin Network (비트코인 네크워크에서의 암호화된 봇넷 C&C 통신기법)

  • Kim, Kibeom;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.103-110
    • /
    • 2022
  • Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.

A Study on the Implementation of a Web-browser-based Global e-Navigation Service Discovery System for Decentralized Maritime Service Registries (탈중앙화 MSR 환경에서의 웹 브라우저 기반 글로벌 이내비게이션 서비스 검색 시스템 구현에 대한 연구)

  • Jinki, Jung;Young-Joong, Ahn
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.501-508
    • /
    • 2022
  • The flow of global digitalization is leading to the emergence of a decentralized system environment based on blockchain or distributed ledger technology in the fields of economy, identity authentication, and logistics. Accordingly, a requirement that public services be searchable from several decentralized maritime service registries (MSRs) has been derived in terms of the discoverability of e-navigation services. This study describes a decentralized MSR environment composed of the MSR ledger and multiple local MSRs, and it has implemented a service search system that can search global e-navigation services in the environment through a web browser. This system is a decentralized application that dynamically generates service attributes, geometry information, and free text queries, and that provides users with relevant MSR and service access information from search results that are registered in the MSR ledger. In this study, we tested the established decentralized MSR environment and the system that performs service search within that environment, and we discussed its advantages and limitations.

A Study on Zero Pay Image Recognition Using Big Data Analysis

  • Kim, Myung-He;Ryu, Ki-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.193-204
    • /
    • 2022
  • The 2018 Seoul Zero Pay is a policy actively promoted by the government as an economic stimulus package for small business owners and the self-employed who are experiencing economic depression due to COVID-19. However, the controversy over the effectiveness of Zero Pay continues even after two years have passed since the implementation of the policy. Zero Pay is a joint QR code mobile payment service introduced by the government, Seoul city, financial companies, and private simple payment providers to reduce the burden of card merchant fees for small business owners and self-employed people who are experiencing economic difficulties due to the economic downturn., it was attempted in the direction of economic revitalization for the return of alleyways[1]. Therefore, this study intends to draw implications for improvement measures so that the ongoing zero-pay can be further activated and the economy can be settled normally. The analysis results of this study are as follows. First, it shows the effect of increasing the income of small business owners by inducing consumption in alleyways through the economic revitalization policy of Zero Pay. Second, the issuance and distribution of Zero Pay helps to revitalize the local economy and contribute to the establishment of a virtuous cycle system. Third, stable operation is being realized by the introduction of blockchain technology to the Zero Pay platform. In terms of academic significance, the direction of Zero Pay's policies and systems was able to identify changes in the use of Zero Pay through big data analysis. The implementation of the zero-pay policy is in its infancy, and there are limitations in factors for examining the consumer image perception of zero-pay as there are insufficient prior studies. Therefore, continuous follow-up research on Zero Pay should be conducted.

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Development and Application of Private-focused Digital Public Service Evaluation Framework: Focused on AHP Analysis (민간 중심 디지털 공공 서비스 적합성 평가 프레임워크 개발 및 시범 적용 연구: AHP를 중심으로)

  • Sangjun Lee;DaeChul Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.2
    • /
    • pp.71-92
    • /
    • 2023
  • Globally, under the leadership of advanced ICT countries, the private sector is promoting various policies to promote the digital transformation of public services. Looking at the research trend, design of public service indicators, development of evaluation system, and empirical research are being carried out steadily, but there are insufficient research cases on models in which the private sector participates in the planning, development, and operation of public services. In this study, Private-centric digital public service suitability evaluation indicators were discovered through interviews with experts in various fields, and weights for each indicator were analyzed through AHP evaluation. In addition, by applying the analysis results to 18 digital public services on a trial basis, the importance and priority of evaluation indicators for each service were derived, and at the same time, the evaluation framework was designed and applied to diagnose implications. As a result of the study, 'social utility', 'corporate acceptability', and 'public acceptability' were selected as the top three indicators of suitability evaluation. At this time, it was analyzed that the weight of the 'company acceptability' index, which includes sub-indices such as 'service profitability', 'service scalability', and 'private initiative possibility', was the highest among the three top indicators. As a result of the demonstration for public services, "IoT facility unmanned remote monitoring service", "blockchain real estate transaction service", and "digital twin disaster prediction service" were evaluated as the most suitable public services for the transition to the private sector.

A Proposal for the Development of Online Graduate School for Lifelong Education (평생교육을 위한 온라인 대학원 발전방안 제안)

  • Kwon, Arum;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.415-422
    • /
    • 2022
  • This study requires a new paradigm for universities in line with the global pandemic and the 4th industrial revolution. Accordingly, we propose an educational plan for the H university online graduate school in Korea. As a research method, the implications of scholars and experts on future education were synthesized, and the cases of overseas universities using it were analyzed to propose an online graduate school education plan. As a result of the study, online graduate school needs diversity as a venue for providing new opportunities as lifelong education, and to realize this, they use a microcredit. Blockchain technology is introduced so that microcredit can be transparently verified. In addition, to correspond to various convergence major programs and further develop them, problem-solving-oriented teaching methods enhance students' convergent skills as well as active learning and interaction. More detailed curriculum research at online graduate schools is needed in the future, and we hope that you will contribute to the development of online graduate school education based on this study.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

The Interface between Wearable Devices and Metaverse: A Study on Soccer Game Character Ability Mapping using Mi Band (웨어러블 디바이스와 메타버스의 접점: 미밴드를 이용한 축구 게임 캐릭터 능력치 매핑 연구)

  • Hyun-Su Kim;Mi-Kyeong Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1345-1352
    • /
    • 2023
  • With the development of virtual reality (VR) and blockchain technology, Metaverse is being used in various fields such as games, education, and social networking. At the same time, shipments of wearable devices such as smartwatches are growing every year, becoming more and more integrated into people's daily lives. This study presents a new possibility of reflecting the user's body signals measured through the combination of the two phenomena in the metaverse character. Various biometric information such as the user's heart rate and amount of exercise collected through the smartwatch are reflected on the character in the metaverse, allowing the user's physical condition to be reflected in the virtual world. Through this, Metaverse is expected to provide a new experience that can be called 'extended reality' beyond simple virtual reality, improve user's satisfaction with Metaverse, and suggest a direction for the development of smartwatches.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.