• Title/Summary/Keyword: 대응행위

Search Result 509, Processing Time 0.035 seconds

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

A Study on procedure of Criminal Cases related to the Security (안보형사법제도의 바람직한 개선방향 제시 - 안보사례분석을 중심으로 -)

  • Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.231-257
    • /
    • 2015
  • Today, the international community make every effort to suppress security crimes, to provide numerous institutional strategies and to prevent security crimes such as the terrorism and spy. Particularly, developed countries in the field of security are strengthening related legislation under new-security conditions. Things work a little differently about security crimes because the nation's benefit and protection of the law is the basis of individual benefit and protection of the law under investigation procedure of the security crimes. Therefore they have policy that permits major investigative agency under the arrest and detention procedure(e.g. security and communication monitoring ${\ldots}$). Criminal procedure's improvement and reinforcement are very important for events related security. But, The investigation procedure between criminal offense and security crimes makes no odds in the Korea. Continuance of such a national mood will accuse of not responding appropriately in preparation for new-security conditions recently. To revise with international best security legislation, We should institute a proper registration system in Korea's situation. This study have been discussing how to improve related legislation under new-security conditions through the cases analysis of the arrest and detention procedure in Korea.

  • PDF

An Anti-Trojan Horse Mechanism with Attached Data from Developers (개발자 첨부 자료에 의한 트로이 목마 대응 기법)

  • Cho, Eun-Sun;Yeh, Hong-Jin;Oh, Se-Chang;Hong, Sun-Ho;Hong, Man-Pyo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.220-231
    • /
    • 2002
  • Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on their possible accesses to resources, and based on this information users determine whether the code is malicious or not. Even in the case a code is accepted by users due to its non-malicious appearance, its runtime behaviors are monitored and halted whenever any attempts to malicious operations are detected. By hiring such runtime monitoring system, this mechanism enables detecting unknown Trojan horses and reduces the decision-making overhead being compared to the previous monitoring-based approaches. We describe the mechanism in a formal way to show the advantages and the limitations of the security this mechanism provides.

The Relationship between Cyberbullying Victimized Experience and Emotional Behavior of Middle School Students (중학생의 사이버불링 피해 경험과 정서행동과의 관계)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.207-215
    • /
    • 2013
  • The general opinion about the notion of cyberbullying hasn't existed yet, but in related laws it is defined as the entire behavior causing the counterpart to suffer the pain by continuously and repeatedly psychologic offending toward specific students with information and telecommunication products such as the Internet and mobile phones, and spreading the private information or false facts related with specific students. Recently a number of accidents related with abuse of cyberbullying are being broadcast on a variety of mass media, and the argument about the severity and countermeasures against cyberbullying is moving onward. This study has a purpose as suggesting the practical alternatives to prevent cyberbullying victim of middle school students by arguing cyberbullying of middle school students and analyzing the relationship between the general features such as victimized experience and frequency and the emotional behaviors according to victimized experience. As the result of this study, cyberbullying victimized experience has a significant effect on the emotional behavior such as depression, aggression, and academic stress. As political implication, this study suggests the practical alternatives to prevent cyberbullying of middle school students based on the analysis result.

A Practical Design and Implementation of Android App Cache Manipulation Attacks (안드로이드 앱 캐시 변조 공격의 설계 및 구현)

  • Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.205-214
    • /
    • 2019
  • Android uses app cache files to improve app execution performance. However, this optimization technique may raise security issues that need to be examined. In this paper, we present a practical design of "Android app cache manipulation attack" to intentionally modify the cache files of a target app, which can be misused for stealing personal information and performing malicious activities on target apps. Even though the Android framework uses a checksum-based integrity check to protect app cache files, we found that attackers can effectively bypass such checks via the modification of checksum of the target cache files. To demonstrate the feasibility of our attack design, we implemented an attack tool, and performed experiments with real-world Android apps. The experiment results show that 25 apps (86.2%) out of 29 are vulnerable to our attacks. To mitigate app cache manipulation attacks, we suggest two possible defense mechanisms: (1) checking the integrity of app cache files; and (2) applying anti-decompilation techniques.

The Impact of Technology Dependence and Technological Characteristics on the Transformation of Multiplex Ties (기술 의존성과 기술 특성이 다차원 관계 전환에 미치는 영향)

  • Kim, Byung Eun;Bae, Sung Joo
    • Journal of Korea Technology Innovation Society
    • /
    • v.22 no.3
    • /
    • pp.307-339
    • /
    • 2019
  • This study investigates factors that affect the transformation of multiplex tie into one specific type of relationship - competitive relationship. In particular, this study argues that the lower technological distance or gap of technological competency, the higher the chances are for the multiplex tie to become a competitive tie. In addition, technological characteristics of the firms are also found to affect the multiplex tie's transformation into the competitive tie. To study this phenomena, this study uses both quantitative analysis and case study method. This study is an exploratory attempt to find factors relevant to change multiplex ties into competition, contributing to the literature of multiplex ties by identifying technological variables that affect the transformation of such ties. This study also contributes to practices by providing the guidance on what strategies firms should implement in complex situations such as multiplex ties.

Smart Space based on Platform using Big Data for Efficient Decision-making (효율적 의사결정을 위한 빅데이터 활용 스마트 스페이스 플랫폼 연구)

  • Lee, Jin-Kyung
    • Informatization Policy
    • /
    • v.25 no.4
    • /
    • pp.108-120
    • /
    • 2018
  • With the rise of the Fourth Industrial Revolution and I-Korea 4.0, both of which pursue strategies for industrial innovation and for the solution to social problems, the real estate industry needs to change in order to make effective use of available space in smart environments. The implementation of smart spaces is a promising solution for this. The smart space is defined as a good use of space, whether it be a home, office, or retail store, within a smart environment. To enhance the use of smart spaces, efficient decision-making and well-timed and accurate interaction are required. This paper proposes a smart space based on platform which takes advantage of emerging technologies for the efficient storage, processing, analysis, and utilization of big data. The platform is composed of six layers - collection, transfer, storage, service, application, and management - and offers three service frameworks: activity-based, market-based, and policy-based. Based on these smart space services, decision-makers, consumers, clients, and social network participants can make better decisions, respond more quickly, exhibit greater innovation, and develop stronger competitive advantages.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.

Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots (사용되지 않는 포트를 이용하여 해커를 허니팟으로 리다이렉트하는 시스템 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.15-24
    • /
    • 2006
  • Many computer security systems use the signatures of well-known attacks to respond to hackers. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible. For this reason, honeypots and honeypot farms have been actively researched. However, they can only collect a small amount of information because hackers have a strong tendency to directly attack servers of which IP addresses are allocated. In this paper, we propose an unused ports-based decoy system to redirect hackers toward honeypots. This system opens unused ports to lure hackers. All interactions with the unused ports are considered as suspect, because the ports aren't those for real service. Accordingly, every request sent to the unused ports is redirected to a honeypot. Consequently, this system enables honeypots to collect information about hackers attacking real servers other than themselves.