• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.03 seconds

Log Acquisition of the OpenStack Platform for Cloud Forensic (클라우드 포렌식을 위한 오픈스택 플랫폼에서 로그데이터 수집)

  • Han, Su bin;Lee, Byung-Do;Shim, Jongbo;Shin, Sang Uk
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.460-463
    • /
    • 2014
  • 클라우드 컴퓨팅의 많은 장점에도 불구하고 클라우드 컴퓨팅은 보안이슈는 줄어들지 않으며, 특히 디지털 포렌식은 실질적인 기능을 수행하기에 미비한 실정이다. 최근, 다양한 사이버 범죄가 증가하면서 클라우드 컴퓨팅 환경은 사이버 범죄에 노출되어 있으며 악의적인 공격의 위험을 가지고 있다. 클라우드 포렌식은 자원이 가상공간에 존재할 수 있고, 증거 데이터가 물리적으로 분산되어 있기 때문에 기존의 포렌식 수사와는 다르게 접근해야 한다. 또한, 클라우드 기반 포렌식에서 획득 가능한 증거 데이터에 대한 정의가 되어 있지 않아서 증거 데이터를 수집하는데 어려움을 겪는다. 이에 본 논문에서는 오픈스택 플랫폼을 이용한 클라우드 환경을 구축하고, 클라우드 플랫폼 기반 포렌식을 위해 획득 가능한 로그 데이터에 대해 정리하고, 실제 획득 가능한 로그를 수집 및 분석하고, 클라우드 컴퓨팅 플랫폼기반 포렌식의 한계점과 해결방안을 알아본다.

Practical Development and Application of a Korean Morphological Analyzer for Automatic Indexing (자동 색인을 위한 한국어 형태소 분석기의 실제적인 구현 및 적용)

  • Choi, Sung-Pil;Seo, Jerry;Chae, Young-Suk
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.689-700
    • /
    • 2002
  • In this paper, we developed Korean Morphological Analyzer for an automatic indexing that is essential for Information Retrieval. Since it is important to index large-scaled document set efficiently, we concentrated on maximizing the speed of word analysis, modularization and structuralization of the system without new concepts or ideas. In this respect, our system is characterized in terms of software engineering aspect to be used in real world rather than theoretical issues. First, a dictionary of words was structured. Then modules that analyze substantive words and inflected words were introduced. Furthermore numeral analyzer was developed. And we introduced an unknown word analyzer using the patterns of morpheme. This whole system was integrated into K-2000, an information retrieval system.

Procedure for the acquisition of digital evidence on a cloud computing platform (클라우드 컴퓨팅 플랫폼에서 디지털 증거 수집 절차)

  • Han, Su bin;Lee, Tae-Rim;Shin, Sang Uk
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.457-460
    • /
    • 2014
  • 클라우드 컴퓨팅은 IT 자원의 효율적인 관리와 비용 대비 양질의 서비스 제공을 위한 새로운 패러다임으로써, 국내외의 기업뿐만 아니라 많은 사용자들에게 주목 받고 있다. 하지만 관련 시장의 빠른 성장과 함께 다양한 사이버 범죄에 노출될 수 있는 위험이 높아졌음에도 불구하고, 클라우드 컴퓨팅에 대한 디지털 포렌식은 실질적인 역할을 수행하기에 아직 미비한 실정이다. 클라우드 컴퓨팅은 증거 데이터가 물리적으로 분산되어 있고, 자원이 가상공간에 존재할 수 있기 때문에 기존의 디지털 포렌식 수사와는 다르게 접근해야 한다. 이에, 본 논문에서는 추상화된 클라우드 계층에 따른 기존 포렌식 절차 상의 데이터 수집 방법에 관한 한계를 분석하고, 확보한 증거 데이터의 신뢰성 보장 및 다양한 클라우드 환경에 보다 유연하게 적용할 수 있는 디지털 증거 수집 절차를 제안한다. 해당 절차는 클라우드 구성 요소들 중 물리적인 자원들을 가상화하여 논리적으로 구성할 수 있도록 하며, 가상화된 자원들을 서비스 목적에 따라 폭넓게 활용할 수 있도록 관리 체계를 제공해주는 클라우드 플랫폼을 기반으로 한다.

A Research on the Spoken Language in Korean Voices from Berlin: Focusing on Phonological and Morphological Features (20세기 초 베를린 한인 음원의 음운과 형태)

  • Cha, Jaeeun;Hong, Jongseon
    • Korean Linguistics
    • /
    • v.72
    • /
    • pp.257-282
    • /
    • 2016
  • The aim of this paper is to research phonological and morphological features in Korean Voices from Berlin. The Korean Voices from Berlin was recorded in 1917 at Berlin by 5 Korean prisoners engaged in World War I, some of them came from North Hamgyeong Province, the others came from Pyeongan Province, therefore these data show a North Korean regional dialect. The data are composed of three materials, counting numbers, reciting scriptures and singing folksongs. The results of this research are as follows. 1) The consonant system of Korean voices is similar to standard Korean. The 19 consonants are classified according to 5 manners of articulations and 5 points of articulations. 2) The liquid /l/ has three allophones, [ɾ] appeared in an onset position, [l] in a word medial coda position or preceded by [l], [ɹ] in a word final coda position. 3) The vowel system of Korean voices is similar to early 20th Korean's. It has 8 monophthongs, /a, ʌ, o, u, ɯ, i, e, ${\varepsilon}$/. 4) The 1 to 10 numbers in Korean voices are similar to Middle-Korean numerals. 5) The genitive particle '/ɯi/의' is pronounced [i], [ɯ], [${\varepsilon}$], especially [ɯ] is appeared in Sino Korean. 6) The /l/-deletion of conjugations are similar to Middle-Korean, /l/ deletion always occurred, if [+cor] consonants are followed.

A Study of Applicable Strategies on the Open Source Tool in Digital Forensics (디지털 포렌식 관점에서의 오픈소스 도구 적용 방안 연구)

  • Yoon, Su-jin;Kim, Jong-bae;Shin, Yong-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.271-272
    • /
    • 2014
  • As E-discovery in criminal investigation is increasing, the importance of Forensic Tools which can legally extract data with high effectiveness is getting higher. Digital products are growing fast. Therefore, Forensic Tools should be implemented readily to suit users and events well. Although forensic industry and governments use expensive forensic tools, some have suggested limitations to its use, such as memory limitations and the limits of post-audit. We need to develop open source forensic tools that can implement a variety of forensic tool fast. This research studies digital forensics technical skills which are commercialized currently and suggests applicable strategies of the open digital forensics to help overcome these limitations.

  • PDF

On the Transfer of Classified Records of the Special Records Center (특수기록관 비공개기록의 이관에 관한 연구)

  • Kwak, Kun-Hong
    • The Korean Journal of Archival Studies
    • /
    • no.42
    • /
    • pp.327-361
    • /
    • 2014
  • 'Special Records' means the records created by the government power authorities like security, investigation, intelligence agencies. Even after the enactment of the Public Records Act, these kinds of records were out of the control of the National Archives of Korea. The reason was certainly complex including the loss of control power caused by the National Archives' low status, limitation of the legislation and lack of positive measures for the transfer of classified records. But core records of the government power authorities should be transferred to the National Archives for the righteous records culture in the democracy. This paper investigates the problems concerned with the transfer of classified records of the special records center, looking for a practical alternative.

Heterogeneous Face Recognition Using Texture feature descriptors (텍스처 기술자들을 이용한 이질적 얼굴 인식 시스템)

  • Bae, Han Byeol;Lee, Sangyoun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.208-214
    • /
    • 2021
  • Recently, much of the intelligent security scenario and criminal investigation demands for matching photo and non-photo. Existing face recognition system can not sufficiently guarantee these needs. In this paper, we propose an algorithm to improve the performance of heterogeneous face recognition systems by reducing the different modality between sketches and photos of the same person. The proposed algorithm extracts each image's texture features through texture descriptors (gray level co-occurrence matrix, multiscale local binary pattern), and based on this, generates a transformation matrix through eigenfeature regularization and extraction techniques. The score value calculated between the vectors generated in this way finally recognizes the identity of the sketch image through the score normalization methods.

Timestamp Analysis of Windows File Systems by File Manipulation Operations (파일 조작에 따른 파일 시간 변화 분석)

  • Bang, Je-Wan;Yoo, Byeong-Yeong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.79-91
    • /
    • 2010
  • In digital forensics, the creation time, last modified time, and last accessed time of a file or folder are important factors that can indicate events that have affected a computer system. The form of the time information varies with the file system, depending on the user's actions such as copy, transfer, or network transport of files. Specific changes of the time information may be of considerable help in analyzing the user's actions in the computer system. This paper analyzes changes in the time information of files and folders for different operations of the NTFS and attempts to reconstruct the user's actions.

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.

Acquiring Credential and Analyzing Artifacts of Wire Messenger on Windows (Windows에서의 Wire 크리덴셜 획득 및 아티팩트 분석)

  • Shin, Sumin;Kim, Soram;Youn, Byungchul;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.61-71
    • /
    • 2021
  • Instant messengers are a means of communication for modern people and can be used with smartphones and PCs respectively or connected with each other. Messengers, which provide various functions such as message, call, and file sharing, contain user behavior information regarded as important evidence in forensic investigation. However, it is difficult to analyze as well as acquire smartphone data because of the security of smartphones or apps. However, messenger data can be extracted through PC when the messenger is used on PC. In this paper, we obtained the credential data of Wire messenger in Windows 10, and showed that it is possible to log-in from another PC without authentication. In addition, we identified and classified major artifacts generated based on user behavior.