• Title/Summary/Keyword: zombies

Search Result 13, Processing Time 0.026 seconds

A Study on the 'Zombie Narrative' in Modern Korean Novels (한국 현대 소설에 나타난 '좀비 서사'에 관한 고찰)

  • Kim, So-Ryun
    • Journal of Popular Narrative
    • /
    • v.27 no.2
    • /
    • pp.79-104
    • /
    • 2021
  • The content that is actively consumed in popular culture today is definitely the 'Zombie Narrative'. 'Zombie' is soon positioned as a unique character that reveals the times in which we live in conjunction with the uniqueness of Korean society. Zombies, however, are rarely narrated in traditional Korean modern novels though science-fiction novels constructively deal with them. This paper focuses on the existence of 'zombie', which seldom appears in modern novels. The paper also aims to illuminate the literary value of the 'zombie narrative' that is explosively consumed in modern society. In the main part, I talk about the horrors of 'ignorance' appearing in the existence of zombies in relation to those of the problem concerning "unknown". As one of the crucial characteristics of the zombies, moreover, the "absence" of the "thinking" was considered in terms of "ignorance" in relation to the concept of "Banality of evil" raised by Hannah Arendt. This paper also pays attention to the possibility of a new solidarity between zombies and humans depicted in novels. This possibility can be seen as a search for solidarity between humans and zombies, beyond the solidarity between humans who survived from zombies. The paper enlightens a new relationship between a captor and a captive that dichotomous scale impossibly explains and presents a possible new story. As discussed above, as this study searches for the existence of 'zombies' that seldom appear in contemporary Korean novels, it clearly signifies the literary value of 'zombies' and further possible narratives concerning 'zombies'. Furthermore, this study appreciates the extension of the existing 'zombie narrative' researches, which has been mainly focused on films.

Zombie, the Subject Ex Nihilo and the Ethics of Infection (좀비, 엑스 니힐로의 주체와 감염의 윤리)

  • Seo, Dong-Soo
    • Journal of Popular Narrative
    • /
    • v.25 no.3
    • /
    • pp.181-209
    • /
    • 2019
  • The purpose of this article is to compare zombie narratives in relation to the Other. In previous research, the view of zombies as post-capitalist soulless consumers or workers has been frequently expressed. But in this article, I wanted to look at zombies as the main cause of the collapse of the world and a new future. First, zombies do not only mean the representation of the consumer in the late capitalist era. Rather, it is an awakening subject desiring the outside of the system. As you can see from the Uncanny's point of view, zombies are something that we should oppress as freaks and monsters that threatened the Other. To be a zombie in this way is to meet one's other self, the "Fundamentals of Humanity," and it is the moment when everything becomes the subject ex nihilo, the new beginning. Second, the concept of infection shows a new ethic. Zombie cannibalism is different from the selfish love of a vampire who sucks a worker's blood. Zombie cannibalism is an infection, which is a model of Christian love for one's neighbor. It is a moment of awakening and the beginning of solidarity. It is on the waiting for the solidarity that the zombie hangs in such a way, and the attack on the human being is an active illusion. Third, the situation of the end of a zombie narrative is another event for newness. The anger of a zombie serves not just to show monsters, but acts as a catalyst that accelerates the world's catastrophes. The anger of zombies is the messianic violence that stops the false world, and presents a new way. The emergence of zombies and the popular response to them embody a desire for the possibility of a new subject and world.

Spider Invasion Across the Galaxy

  • Hui, Chung-Yue
    • Journal of Astronomy and Space Sciences
    • /
    • v.31 no.2
    • /
    • pp.101-120
    • /
    • 2014
  • The nature of the exotic stellar corpses which reincarnate by consuming their companion is reviewed. Apart from sucking life from their partners, they are actually eating the doomed companions away by their deadly and powerful particle/radiation beams. Such situation resembles that a female "black widow" spider that eats its mate after mating. These celestial zombies are called - Millisecond pulsars (MSPs). In this review article, I will focus on the effort of Fermi Asian Network (FAN) in exploring these intricating objects over the last five years. Two special classes of MSPs are particularly striking. Since Fermi Gamma-ray Space Telescope has started surveying the gamma-ray sky, the population of "black widows" has been boosted. Another dramatic class is so-called "redbacks" (Australian cousin of "black widows") which has just emerged in the last few years. These MSPs provide us with a long-sought missing link in understanding the transition between accretion-powered and rotation-powered systems. The strategy of hunting MSPs through mulitwavelength observations of the unidentified Fermi objects is also reviewed.

A Study on Feature Extraction of Zombie Smartphone (좀비 스마트폰 특징 추출에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.222-223
    • /
    • 2015
  • Malicious network attacks such as DDoS is no clear preparedness, the damage is also a bar. In particular, when a smartphone is infected to the zombies, the damage such as communication fee billing and leakage of personal information with numerous network failures are expected. In this study, with reference of the features that appear in a zombie PC we extract the zombie smartphone's phenomena and features that appear while the zombie service is running.

  • PDF

Research for The cognitive Properties of Zombie Game Character (게임상의 Zombie Character 인지속성에 관한 연구)

  • LI, JinJun;Cho, Dong-Min
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.5
    • /
    • pp.717-726
    • /
    • 2021
  • The zombies in AVG games are not divided into different game occupations. To address this issue, this paper starts by selecting those popular zombie games as the research object. Then, a number of samples will be collected from the roles of zombie and these different roles of zombie will be classified by profession depending on the characteristics of these roles. On this basis, the roles will be given a new title to describe their profession. Then, semantic analysis will be conducted to search for the words that can be used to describe the roles of zombie. Besides, there will be 10 experts in design and 10 professional zombie game players invited to choose from the collected adjectives. The most selected words will be used in this study to conduct cognition assessment, before the making of questionnaire. Then, the questionnaire data will be collected and converted into a statistical model form for indicating the value of ability by group and profession.

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

A New Defense against DDoS Attacks using Reputation (평판을 이용한 새로운 DDoS 공격 대응 방안 연구)

  • Shin, Jung-Hwa;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1720-1726
    • /
    • 2011
  • The DDoS attacks which are increasing recently must have many zombie PCs before attacking targeted systems by attacker. A zombie PC is infected by attacker's malignant code and may be operated by the his/her special malicious purposes. But most users generally don't know that their PCs are infected and used as zombies by illegal activities covertly. In this paper, we propose a new scheme that decreases vulnerable PCs and isolates them from Internet before being zombie PCs. The proposed scheme point the reputations of connected PCs and decide whether their Internet connections are keeping continuously or not. Also We show the figures how to infect susceptable PCs to zombie PCs, and analyze the decrease effects of DDoS attacks adapted by the proposed scheme with various experiments.

Feature Selection with PCA based on DNS Query for Malicious Domain Classification (비정상도메인 분류를 위한 DNS 쿼리 기반의 주성분 분석을 이용한 성분추출)

  • Lim, Sun-Hee;Cho, Jaeik;Kim, Jong-Hyun;Lee, Byung Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 2012
  • Recent botnets are widely using the DNS services at the connection of C&C server in order to evade botnet's detection. It is necessary to study on DNS analysis in order to counteract anomaly-based technique using the DNS. This paper studies collection of DNS traffic for experimental data and supervised learning for DNS traffic-based malicious domain classification such as query of domain name corresponding to C&C server from zombies. Especially, this paper would aim to determine significant features of DNS-based classification system for malicious domain extraction by the Principal Component Analysis(PCA).

Looking through Others' Eyes: A Double Perspective in Literary and Film Studies

  • Kim, Seong-Kon
    • Journal of English Language & Literature
    • /
    • v.60 no.2
    • /
    • pp.249-267
    • /
    • 2014
  • An outsider's perspective is often illuminating and enlightening, as he or she perceives the world differently from us, and sees things that insiders tend to miss. While an outsider's views are fresh and penetrating, an insider's vision is often banal and myopic. Although outsiders' perspectives may not be quite right at times, they always shed light and provide insight, allowing us to reevaluate the conventional interpretations of our literature and folktales. In order to prevent our own understanding and knowledge from growing stale and narrow-minded, we should endeavor to consider outsiders' opinions and view all things from multiple angles. When reading literary or cultural texts, therefore, we need to read through others' eyes because it provides alternative perspectives. And we should learn to co-exist with others and see things from others' eyes. In his celebrated novel, My Name Is Red, Orhan Pamuk, the Turkish Nobel Laureate, explores the themes of clashes between the East and the West, the young and the old, and conservatism and radicalism. The confrontation between the stubborn defenders of tradition and the self-righteous innovators ultimately results in bigotry, hatred and murder. As Pamuk aptly perceives in his novel, the inevitable outcome of such uncompromising conflict is degradation of humanity and annihilation of human civilization. That is precisely why we need to embrace others who are different from us and learn to look through others' eyes. Sometimes, we fear other voices and different perspectives. As the movie "The Others" suggests, however, there is no reason for us to be afraid of others.

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.