• Title/Summary/Keyword: illegal

Search Result 1,448, Processing Time 0.022 seconds

A Study of Bitcoin Transaction Tracking Method through Illegal Community (불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구)

  • Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.717-727
    • /
    • 2018
  • When illegal transactions are made with bitcoin, it's not easy to track all the bitcoins used in the transaction and seize them. Especially, if criminals distribute illegal transactions by spreading them to several bitcoin addresses, it's difficult to track hidden bitcoins other than confiscated bitcoins even if some bitcoins are confiscated. This paper proposes a method for tracking and monitoring all bitcoin transactions suspected of illegal transactions. This method estimates bitcoin addresses that are highly relevant to crime among all bitcoin addresses that dealing with the address based on the bitcoin address list of the alleged crime, and keeps track of addresses that are relevant to crime and help to investigate illegal bitcoin transaction.

The Survey and the Proposal of Inspection Method for Illegal Program Reproduction (프로그램 불법 복제 감정에 대한 고찰 및 발전방안의 제시)

  • 조동욱;한길성;전병태
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1439-1444
    • /
    • 2001
  • Inspection of program products illegal reproduction is a significant field in deciding illegal recopy of program duplication, reproduction, plagiarization and electronic information by expertized programmer or specialist using computer science knowledge and technical methods. This is important for propelling the S/W industry in the high value creating industry. In particular, social demands are increasing the conflicts of the program products illegal recopy because of knowledge property problems. Therefore, legal and structural methods have been inspection of the program products illegal copy and usage. This article describes the existing problems of the inspecting of the program products illegal recopy and discusses the future directions and developing methods for propelling and setting the knowledge property industry field such as S/W industry.

  • PDF

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Analysis of the Effects on Soil Erosion and Suspended Sediment Reduction by Alpine Unauthorized and Illegal Agricultural Fields Restoration Scenarios (고랭지 임의·불법 경작지 복구 시나리오에 따른 토양유실 및 부유사량 저감 효과 분석)

  • Lee, Seoro;Lee, Gwanjae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.2
    • /
    • pp.53-62
    • /
    • 2024
  • This study assessed the efficiency of reducing soil erosion and suspended sediment through the restoration of alpine unauthorized and illegally cultivated fields, using the SWAT (Soil and Water Assessment Tool) model in the Mandae District. The results showed that in Scenario 5, which involved restoring unauthorized and illegal fields within forests, along rivers (banks), and in ditch areas were restored to their original land categories, achieved the highest efficiency in reducing average annual soil erosion and suspended sediment, with reductions of 8.1% and 4.5%, respectively. In particular, it was confirmed that the restoration of unauthorized and illegal fields within forested areas has a significant impact. This demonstrated that the restoration of unauthorized and illegal agricultural fields can substantially reduce the soil erosion and suspended sediment attributable to non-point source pollution. Our findings highlight the importance of managing these unauthorized and illegal agricultural activities in developing sustainable strategies within non-point source pollution management areas. This study is expected to provide important basic data to effectively establish water quality improvement strategies in the region of non-point source pollution management.

An Effective Method for Blocking Illegal Sports Gambling Ads on Social Media

  • Kim, Ji-A;Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.201-207
    • /
    • 2019
  • In this paper, we propose an effective method to block illegal gambling advertisement on social media. With the increase of smartphone and internet usage, users can easily access various information while sharing information such as text and video with a large number of others. In addition, illegal sports gambling advertisements are also continue to be transmitted on SNS. To avoid most surveillance networks, users are easily exposed to illegal sports gambling advertisement images by including phrases in the images that indicate illegal sports gambling advertisements. In order to cope with these problems, we proposed a method to actively block illegal sports gambling advertisements in a way different from the conventional passive methods. In this paper, we select words frequently used for illegal sports gambling, classifies them into three groups according to their importance, calculate WF for each word using weighted formula by degree of relevance and frequency, and then sum the WF of the words in the image. Blocking, warning, and passing were determined by cv, the total of WF. Experimenting with the proposed method, 193 out of 200 experimental images were correctly judged with 96.5% accuracy, and even though 7 images were illegal sports gambling advertisements. Further research is needed to block 3.5% of illegal sports betting ads that cannot be blocked in the future.

A Classification Model for Illegal Debt Collection Using Rule and Machine Learning Based Methods

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.93-103
    • /
    • 2021
  • Despite the efforts of financial authorities in conducting the direct management and supervision of collection agents and bond-collecting guideline, the illegal and unfair collection of debts still exist. To effectively prevent such illegal and unfair debt collection activities, we need a method for strengthening the monitoring of illegal collection activities even with little manpower using technologies such as unstructured data machine learning. In this study, we propose a classification model for illegal debt collection that combine machine learning such as Support Vector Machine (SVM) with a rule-based technique that obtains the collection transcript of loan companies and converts them into text data to identify illegal activities. Moreover, the study also compares how accurate identification was made in accordance with the machine learning algorithm. The study shows that a case of using the combination of the rule-based illegal rules and machine learning for classification has higher accuracy than the classification model of the previous study that applied only machine learning. This study is the first attempt to classify illegalities by combining rule-based illegal detection rules with machine learning. If further research will be conducted to improve the model's completeness, it will greatly contribute in preventing consumer damage from illegal debt collection activities.

A Study on the Law Enforcement of Korea Coast Guard against the Illegal Chinese Fishing Vessels (불법조업 중국어선에 대한 해양경찰의 단속에 관한 고찰)

  • Lim, Chae-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.49-58
    • /
    • 2014
  • The illegal fishery act committed Chinese fishing vessels have not been stopped and Korea Coast Guard(KCG) has been injured or killed by chinese fishing forces, even though the Korean Government has been trying to control the illegal fishery and repeated violent act committed by Chinese fishing vessels in our Exclusive Economic Zone. Moreover, some problems in relation to the control process of KCG to suppress the illegal foreign fishing vessels has been exposed in spite of extensive efforts of Korean Government. Improper law enforcement of KCG in relation to foreign fishing vessels would cause international dispute between related states, although the control process to the illegal fishing vessels at sea is in a way of due law enforcement process forming a State's power. To this end, this paper examines the problems raised during the control process which is including the visit and inspection of illegal Chinese fishing vessels and law enforcement process exercised by KCG and presents practical solutions through analyzing the related materials, professional's opinion and recent cases.

A Study on the Protection Plan of Fisheries Resources against Illegal Fishing of Chinese Fishing Vessel (중국 어선의 불법조업에 대한 우리나라 수산자원의 보호방안)

  • JUNG, Bong-Kyu
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1549-1560
    • /
    • 2016
  • Today, all the countries of the world newly recognize importance of sea, which are focused on efforts for security of marine territory and fishes resources. Many of the coastal state, to strengthen the rights of their own country EEZ, marine survey and continental shelf development, travels through such maritime jurisdiction in the territorial sovereignty and the EEZ overlaps, deepening complex interests between neighboring countries cooperation activities of the fierce competition, the domestic and foreign been has been carried out. Under such circumstances, is devastated coastal of China, our territorial waters and EEZ has been violated more and more, in spite of the powerful crackdown maritime public power, illegal fishing more resistance intensified. They tend to be gradually organization, collectivization and atrocities. Currently, illegal fishing of Chinese fishing boats in the West Sea of Korea, including the waters near Yeonpyeong Island is prevalent as operating in the coast of the country. Furthermore regrettable one is illegal on a scale and the situation where South Korea of scale of damage caused by it have not been accurately grasp of the operation, but that there is damage of Korea official duty enforcement to crack down the increase to illegal operations year after year have occurred. Violent, illegal fishing of Chinese fishing boats, in order to eradicate the operations of insane at our sea, we investigated to the infringement situations of fisheries resources by multiple fields. each of problems presenting a specific preservation plan in accordance with the function and role of the maritime enforcement organization and other government organization the point. at the same time we will try to seek measures such as a scheme that it is possible to increase the capacity.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.