• Title/Summary/Keyword: computer virus

Search Result 212, Processing Time 0.026 seconds

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

Virucidal efficacy of a disinfectant solution composed of n-alkyl-dimethyl-benzyl-ammonium chloride against porcine epidemic diarrhea virus

  • Cha, Chun-Nam;Yu, Eun-Ah;Yoo, Chang-Yeul;Cho, Ki-Yung;Lee, Soo-Ung;Kim, Suk;Lee, Hu-Jang
    • Korean Journal of Veterinary Service
    • /
    • v.37 no.2
    • /
    • pp.105-110
    • /
    • 2014
  • Porcine epidemic diarrhea virus (PEDV) is the causative agent of porcine epidemic diarrhea (PED) and causes a considerable economic loss in swine industry. In this study, the virucidal efficacy of the disinfectant composed to n-alkyl-dimethyl-benzyl-ammonium chloride (n-ADBAC) was investigated against PEDV. A virucidal efficacy was determined with the viability of PEDV contacted with the disinfectant in Vero cells. The disinfectant and PEDV were reacted on the hard water (HW) or organic matter suspension (OM) condition. On HW condition, PEDV was inactivated with 50 fold dilutions of the disinfectant. When the antiviral effect on OM condition was evaluated, the antiviral activity of the disinfectant showed on 10 fold dilutions against PEDV. As the disinfectant possesses the virucidal efficacy against PEDV, the disinfectant solution can be used to limit the spread of animal viral diseases.

Quick Inspection of Virus Using Urban-Map and K-d Tree based Graph Construction and Efficient Patient Movement Route System (바이러스의 빠른 검사를 위한 도시 맵과 K-d 트리 기반의 그래프 구축과 효율적인 환자 이동 경로 시스템)

  • Shin, Young Chan;Moon, Seong-Hyeok;Kim, Donghui;Kim, Jong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.383-386
    • /
    • 2022
  • 본 논문에서는 COVID-19와 같은 위급한 상황에서 바이러스 검사를 빠르게 진행하기 위한 K-d 트리 기반의 그래프 구축과 환자 이동 경로 시스템을 제안한다. 가상환경에서 활용되는 대표적인 길 찾기 알고리즘은 A*나 NavMesh 자료구조는 정해진 정적 이동 경로만을 안내하려는 방법이기 때문에 가상환경에서 NPC를 제어할 때는 효율적이지만, 실제 환경에 적용하여 문제를 풀기에는 충분하지 않다. 특히, 빠른 바이러스 검사를 받기 위해서는 짧은 거리만을 이용하는 게 아닌, 실제 도로 교통상황, 병원의 크기, 환자 이동 수, 환자 처리 시간 등 고려해야 할 상황들이 많다. 본 논문에서는 위에서 언급한 다양한 속성들과 이를 이용한 최적화 함수를 모델링하여, 실제 도시 맵에서 바이러스 검사를 빠르고 효율적으로 제어할 수 있는 프레임워크를 제안한다.

  • PDF

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

High-performance computing for SARS-CoV-2 RNAs clustering: a data science-based genomics approach

  • Oujja, Anas;Abid, Mohamed Riduan;Boumhidi, Jaouad;Bourhnane, Safae;Mourhir, Asmaa;Merchant, Fatima;Benhaddou, Driss
    • Genomics & Informatics
    • /
    • v.19 no.4
    • /
    • pp.49.1-49.11
    • /
    • 2021
  • Nowadays, Genomic data constitutes one of the fastest growing datasets in the world. As of 2025, it is supposed to become the fourth largest source of Big Data, and thus mandating adequate high-performance computing (HPC) platform for processing. With the latest unprecedented and unpredictable mutations in severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the research community is in crucial need for ICT tools to process SARS-CoV-2 RNA data, e.g., by classifying it (i.e., clustering) and thus assisting in tracking virus mutations and predict future ones. In this paper, we are presenting an HPC-based SARS-CoV-2 RNAs clustering tool. We are adopting a data science approach, from data collection, through analysis, to visualization. In the analysis step, we present how our clustering approach leverages on HPC and the longest common subsequence (LCS) algorithm. The approach uses the Hadoop MapReduce programming paradigm and adapts the LCS algorithm in order to efficiently compute the length of the LCS for each pair of SARS-CoV-2 RNA sequences. The latter are extracted from the U.S. National Center for Biotechnology Information (NCBI) Virus repository. The computed LCS lengths are used to measure the dissimilarities between RNA sequences in order to work out existing clusters. In addition to that, we present a comparative study of the LCS algorithm performance based on variable workloads and different numbers of Hadoop worker nodes.

A Study to Prevent Computer Virus Infection (컴퓨터 바이러스 감염 예방을 위한 연구)

  • 김경수;노태상;정민영;김판구
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.177-184
    • /
    • 1996
  • 요즘 새로운 컴퓨터 바이러스가 날로 늘어나고 있고, 또한 지능화되어 가고 있다. 기존의 시스템들은 그들을 막기 위해 화일의 내용에 대해 바이러스의 문자열을 비교하거나 바이러스의 행동을 모니터 하는 방법으로 바이러스에 대처하고 있다. 그러나 이러한 방법들은 알려지지 않은 바이러스를 감지할 수 없고 일단 바이러스가 먼저 실행되면 예방 시스템이 감지할 수 없게 된다. 따라서, 바이러스 감지시스템은 반드시 시스템이 바이러스에 감염되기 전에 수행되어야 한다. 본 논문에서는 시스템의 오버헤드를 증가시키지 않고 부팅시에 부트 바이러스가 실행되기 전에 안전한 부팅을 보장하고, 감염되었다 하더라도 부팅시에 안전하게 복구할 수 있고 아울러 화일 바이러스의'피해를 최소화할 수 있는 새로운 예방 기법인 VIDS(Virus Intrusion Detection System)을 설계, 구현하였다.

  • PDF

The design of the blocking system against file infected with virus on router (라우터기반 바이러스 감염파일에 대한 블록킹 시스템 설계)

  • 정종근;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1232-1237
    • /
    • 2001
  • The technology of the internet has made advanced progress the number of users increase rapidly. but, the technology doesn't only show users good and beautiful sides. the immoral hackers containing even children create computer viruses, and then spread them over network. so it makes the threat of viruses more serious. In this paper, we designed an improved blocking system against the infected file with viruses on router after analysing blocking systems against virus previously developed. comparising with other systems, the system designed is more efficient in terms of communication in complexity since it omits the transmission time between router and blocking system.

  • PDF

Threat Analysis of Mobile Environment (모바일 환경에서의 보안위협 분석)

  • Jeong Youn-Seo;Kim Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.749-753
    • /
    • 2006
  • Since the appearance of the first computer virus in 1986, a significant number of new viruses has appeared every year. Recently, there has been a marked increase in the number of mobile malicious code(virus, worm, trojan) in Mobile devices(smart phone, PDA). As a growing number of people use mobile device, we have to prepare for coming mobile attacks. In this paper, we study trends and characteristics of mobile malicious code. And, we describe considerations of on-device and network security in mobile environment.

  • PDF

A New Double-Stranded RNA Mycovirus from Pleurotus ostreatus (ASI 2504)

  • Lee, Jin-Kyung;Lee, Kang-Hyo;Shim, Hye-Kyung;Yang, Joo-Sung;Kim, Gyu-Hyun;Kong, Won-Sik;Yoo, Young-Bok;Kim, Dae-Hyun;Kim, Dong-Giun;Lee, Suk-Chan
    • The Plant Pathology Journal
    • /
    • v.22 no.1
    • /
    • pp.68-74
    • /
    • 2006
  • A new virus with a dsRNA genome was isolated and characterized from the Suhan-:neutari strain (ASI 2504) of Pleurotus ostreatus, which was characterized as long and slightly bent with small caps on the stipe of fruit body. Thirty nm isometric viruses with three dsRNA segments (approximately 2.0, 1.84 and 1.82 kb in sizes) were isolated by ultracentrifugation in sucrose gradients. Western analysis of protein extracted purified viruses with anti-virus polyclonal antibody confirmed that viruses have two specific proteins (36 and 68 kDa). Computer analysis of 2.0 kb segment shows that high. sequence identity with RNA-dependent RNA polymerase (RdRp) of partitiviruses, respectively. When compared to other dsRNA mycoviruses in a phylogenetic analysis, OMDV was most related to Pleurotus ostreatus virus 1.