• Title/Summary/Keyword: 좀비

Search Result 46, Processing Time 0.023 seconds

Zombie, the Subject Ex Nihilo and the Ethics of Infection (좀비, 엑스 니힐로의 주체와 감염의 윤리)

  • Seo, Dong-Soo
    • Journal of Popular Narrative
    • /
    • v.25 no.3
    • /
    • pp.181-209
    • /
    • 2019
  • The purpose of this article is to compare zombie narratives in relation to the Other. In previous research, the view of zombies as post-capitalist soulless consumers or workers has been frequently expressed. But in this article, I wanted to look at zombies as the main cause of the collapse of the world and a new future. First, zombies do not only mean the representation of the consumer in the late capitalist era. Rather, it is an awakening subject desiring the outside of the system. As you can see from the Uncanny's point of view, zombies are something that we should oppress as freaks and monsters that threatened the Other. To be a zombie in this way is to meet one's other self, the "Fundamentals of Humanity," and it is the moment when everything becomes the subject ex nihilo, the new beginning. Second, the concept of infection shows a new ethic. Zombie cannibalism is different from the selfish love of a vampire who sucks a worker's blood. Zombie cannibalism is an infection, which is a model of Christian love for one's neighbor. It is a moment of awakening and the beginning of solidarity. It is on the waiting for the solidarity that the zombie hangs in such a way, and the attack on the human being is an active illusion. Third, the situation of the end of a zombie narrative is another event for newness. The anger of a zombie serves not just to show monsters, but acts as a catalyst that accelerates the world's catastrophes. The anger of zombies is the messianic violence that stops the false world, and presents a new way. The emergence of zombies and the popular response to them embody a desire for the possibility of a new subject and world.

A Study on the 'Zombie Narrative' in Modern Korean Novels (한국 현대 소설에 나타난 '좀비 서사'에 관한 고찰)

  • Kim, So-Ryun
    • Journal of Popular Narrative
    • /
    • v.27 no.2
    • /
    • pp.79-104
    • /
    • 2021
  • The content that is actively consumed in popular culture today is definitely the 'Zombie Narrative'. 'Zombie' is soon positioned as a unique character that reveals the times in which we live in conjunction with the uniqueness of Korean society. Zombies, however, are rarely narrated in traditional Korean modern novels though science-fiction novels constructively deal with them. This paper focuses on the existence of 'zombie', which seldom appears in modern novels. The paper also aims to illuminate the literary value of the 'zombie narrative' that is explosively consumed in modern society. In the main part, I talk about the horrors of 'ignorance' appearing in the existence of zombies in relation to those of the problem concerning "unknown". As one of the crucial characteristics of the zombies, moreover, the "absence" of the "thinking" was considered in terms of "ignorance" in relation to the concept of "Banality of evil" raised by Hannah Arendt. This paper also pays attention to the possibility of a new solidarity between zombies and humans depicted in novels. This possibility can be seen as a search for solidarity between humans and zombies, beyond the solidarity between humans who survived from zombies. The paper enlightens a new relationship between a captor and a captive that dichotomous scale impossibly explains and presents a possible new story. As discussed above, as this study searches for the existence of 'zombies' that seldom appear in contemporary Korean novels, it clearly signifies the literary value of 'zombies' and further possible narratives concerning 'zombies'. Furthermore, this study appreciates the extension of the existing 'zombie narrative' researches, which has been mainly focused on films.

Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap (이메일 스팸트랩을 이용한 좀비 PC 및 봇넷 추적 방안연구)

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.101-115
    • /
    • 2011
  • A botnet is a huge network of hacked zombie PCs. Recognizing the fact that the majority of email spam is sent out by botnets, a system that is capable of detecting botnets and zombie PCS will be designed in this study by analyzing email spam. In this study, spam data collected in "an email spam trail system", Korea's national spam collection system, were used for analysis. In this study, we classified the spam groups by the URLs or attached files, and we measured how much the group has the characteristics of botnet and how much the IPs have the characteristics of zombie PC. Through the simulation result in this study, we could extract 16,030 zombie suspected PCs for one hours and it was verified that email spam can provide considerably useful information in tracing zombie PCs.

A Study on Feature Extraction and Response Technology of Zombie Smartphone (좀비 스마트폰 특징 추출 및 대응기술 연구)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1374-1379
    • /
    • 2015
  • Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.

A Study on Feature Extraction of Zombie Smartphone (좀비 스마트폰 특징 추출에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.222-223
    • /
    • 2015
  • Malicious network attacks such as DDoS is no clear preparedness, the damage is also a bar. In particular, when a smartphone is infected to the zombies, the damage such as communication fee billing and leakage of personal information with numerous network failures are expected. In this study, with reference of the features that appear in a zombie PC we extract the zombie smartphone's phenomena and features that appear while the zombie service is running.

  • PDF

Imagination of Infection in SF and Zombie Narratives (SF와 좀비 서사의 감염 상상력)

  • Choi, Sung-Min
    • Journal of Popular Narrative
    • /
    • v.27 no.2
    • /
    • pp.45-77
    • /
    • 2021
  • The aftermath of the COVID-19 virus continues. There are two potential fears behind the various preventive and quarantine measures. : the fear that "I may be infected" and the fear that "someone may infect me". This subconscious is built on the 'imagination of infection'. This paper attempted to analyze science fiction(SF) narratives and zombie narratives that influenced our imagination of infection. And this paper attempts to examine how SF novels and movies understand and express "infection", and how zombie narratives reveal "infection" and its horror. Mary Shelley's novel "The Last Man" revealed the paradox that the fear of an infectious disease gave humanity an opportunity for reflection. The films and showed that fear and aversion to infectious diseases can lead to riots and conflict. Zombie narrative is a genre that most dramatically expresses the horror of infection. Director Yeon Sangho's zombie trilogy, including , reveals that people around you can turn into the most dangerous source of infection. Through SF and zombie narratives, we can realize that humanity must have a humble sense of solidarity, ethics, and empathy in the face of infectious diseases. Through this narrative texts, we can realize the importance of the imagination of infection. Imagination of infection is the basis for understanding the causes and consequences of the spread of infection, the process and future prospects.

Response Guide of Smart-Phone Malware Using PC (PC를 이용한 스마트폰 악성코드 대응)

  • Yoon, Poong-Sik;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1835-1841
    • /
    • 2013
  • With the increase in smartphone users, attacks targeting smartphone malware, zombie smartphone, such as smart phones is increasing. Security of smart phones is more vulnerable than PC security, for a zombie smartphone and generates a serious problem than the zombie PC attack on the smartphone every day is diversification. In this paper, the comparative analysis of malicious code and smartphone DDoS attacks and DDoS attacks from the PC, When using a service by connecting to the data network, proposes a method for users to confirm the packet smartphone direct a method for detecting by using the PC malware Smart PC Phone. Propose the measures of malicious code and smartphone DDoS attacks.

Development of virtual reality zombie shooting game contents (가상현실을 이용한 일인칭시점 좀비 슈팅게임)

  • Yun, Tae-Jin;Jeon, Han-Gyeol;Park, Jun-Chul;Ji, Jun-Hwan;Kim, Doo-Hwan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.147-148
    • /
    • 2020
  • 본 논문에서는 가상현실(Virtual Reality)을 구현할 수 있는 개발도구인 Unreal Engine4를 사용하여 객체지향 설계도구인 블루 프린트(Blue Print)로 좀비 슈팅 게임을 개발하였다. 본 게임콘텐츠는 1인칭 시점의 주인공 캐릭터가 게임 인공지능으로 공격하는 좀비로부터 공격을 당하지 않고 무사히 살아남는 생존을 목표로 하는 콘텐츠이다. 게임 조작 방법은 컨트롤러(Controller)로 가상 슈팅 무기를 이용하여 제한시간 동안 공격하는 좀비들을 물리치고 가상공간에서 생존해야 한다.

  • PDF

Detection System Model of Zombie PC using Live Forensics Techniques (활성 포렌식 기술을 이용한 좀비 PC 탐지시스템 모델)

  • Hong, Jun-Suk;Park, Neo;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.117-128
    • /
    • 2012
  • There was a large scale of DDoS(Distributed Denial of Service) attacks mostly targeted at Korean government web sites and cooperations's on March 4, 2010(3.4 DDoS attack) after 7.7 DDoS on July 7, 2009. In these days, anyone can create zombie PCs to attack someone's website with malware development toolkits and farther more improve their knowledge of hacking skills as well as toolkits because it has become easier to obtain these toolkits on line, For that trend, it has been difficult for computer security specialists to counteract DDoS attacks. In this paper, we will introduce an essential control list to prevent malware infection with live forensics techniques after analysis of monitoring network systems and PCs. Hopefully our suggestion of how to coordinate a security monitoring system in this paper will give a good guideline for cooperations who try to build their new systems or to secure their existing systems.

A Study on Unknown Malware Detection using Digital Forensic Techniques (디지털 포렌식 기법을 활용한 알려지지 않은 악성코드 탐지에 관한 연구)

  • Lee, Jaeho;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.107-122
    • /
    • 2014
  • The DDoS attacks and the APT attacks occurred by the zombie computers simultaneously attack target systems at a fixed time, caused social confusion. These attacks require many zombie computers running attacker's commands, and unknown malware that can bypass detecion of the anti-virus products is being executed in those computers. A that time, many methods have been proposed for the detection of unknown malware against the anti-virus products that are detected using the signature. This paper proposes a method of unknown malware detection using digital forensic techniques and describes the results of experiments carried out on various samples of malware and normal files.