• Title/Summary/Keyword: 직접 피공격

Search Result 4, Processing Time 0.021 seconds

A Study on the Variables Affecting Overt Form of Peer Victimization and Covert Form of Peer Victimization in Middle School Students (중학생의 또래 직접 피공격과 간접 피공격에 영향을 미치는 변인에 관한 연구)

  • Kim, Jin-Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.77-89
    • /
    • 2008
  • The purposes of this study were to measure the degree of middle school students' victimization and to identify the variables to affect it. The study were investigated 338 middle school students aged from 13 to 15 years old. The questionnaire consisted of victimization and affecting variables it; expression of anger, social skills, and aggressiveness. Multiple regression analysis showed that the overt form of peer victimization was explained by the control expression of anger, cooperation, sympathy, and enmity. The results also showed that the covert form of peer victimization was explained by the control expression of anger, sympathy, and enmity. In conclusion, sympathy of social skill was the most significant factor that affected the overt form of peer victimization and the covert form of peer victimization. Social skill will serve as the basic element to develop education programs to solve the problems of those who are victimization.

  • PDF

A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device (걸음걸이 비디오를 활용한 웨어러블 기기 사용자 걸음걸이 가속도 신호 추정)

  • Lee, Duhyeong;Choi, Wonsuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1405-1417
    • /
    • 2017
  • Researches that apply the acceleration signal due to user's gait measured at the wearable device to the authentication technology are being introduced recently. The gait acceleration signal based authentication technologies introduced so far have assumed that an attacker can obtain a user's gait acceleration signal only by attaching accelerometer directly to user's body. And the practical attack method for gait acceleration signal based authentication technology is mimic attack and it uses a person whose physical condition is similar to the victim or identifies the gait characteristics through the video of the gait of the victim. However, mimic attack is not effective and attack success rate is also very low, so it is not considered a serious threat. In this paper, we propose Video Gait attack as a new attack method for gait acceleration signal based authentication technology. It is possible to know the position of the wearable device from the user's gait video signal and generate a signal that is very similar to the accelerometer's signal using dynamic equation. We compare the user's gait acceleration signal and the signal that is calculated from video of user's gait and dynamic equation with experiment data collected from eight subjects.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

A Moral Education Development of Security Martial Arts (경호무도 수련의 도덕교육 발전방안)

  • Oh, Se-Kwang;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.65-86
    • /
    • 2010
  • The conclusion for this paper is as following as to plan for advancing security. First, Depending on situation, security martial arts technique is necessary in security work, but the case that the client need to be covered by security guards to avoid the danger often happens. If there is no self-sacrifice and loyalty to the clients, the meaningful security work is not completed in this situation. Therefore, the basic views on education of security leaders need to be defensive than aggressive, and be spirit-equipped than technical feature. Second, more time has to be taken training mentality along with focusing on technical education of security martial arts. To escape from danger spreaded around, security guards must be strong mentally and physically, then they are able to finish the situation. If someone is chosen as a security guard, one's physical strength is already approved. This means that the rest part for the perfect accomplishment is strict discipline on mental one's mind, and basically physical training has to be continued. In conclusion, The elements that the instructor has to acquire are not only extensive theoretical knowledge of the security martial arts and real experiences through techniques but also personality cultivation which maximize the morality training. Accordingly, this could bring the client personally change in perception of the security guard, furthermore greatly expand the academic and professional security work of security department.

  • PDF