• Title/Summary/Keyword: Computer Virus Vaccine

Search Result 23, Processing Time 0.021 seconds

A Detecting Method of Polymorphic Virus Using Advanced Virtual Emulator (개선된 가상 에뮬레이터를 이용한 다형성 바이러스 탐지 방법)

  • Kim, Du-Hyeon;Baek, Dong-Hyeon;Kim, Pan-Gu
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.149-156
    • /
    • 2002
  • Current vaccine program which scans virus code patterns has a difficult to detect the encrypted viruses or polymorphic viruses. The decryption part of polymorphic virus appears to be different every time it replicates. We must monitor the behavior of the decryption code which decrypts the body of the virus in order to detect these kinds of viruses. Specialty, it is not easy for the existing methods to detect the virus if the virus writer has modified the loop count of execution intentionally. In this paper, we propose an advanced emulator using a new algorithm so as to detect various kinds of polymorphic viruses. As a result of experiment using advanced emulator, we found that our proposed method has improved the virus detecting rate about 2%. In addition, our proposed system has a merit that it runs on not only MS-Windows but also Linux, and Unix-like Platform.

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

The Performance Analysis of Vaccine Programs According to Computer Virus Classes (컴퓨터 바이러스 유형에 따른 백신 프로그램의 성능분석)

  • Park, Deuk-Bae;Jang, In-Tae;Song, Young-Jun;Ahn, Jae-Hyeong
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.938-940
    • /
    • 2011
  • 본 논문은 초고속 인터넷 시대에 자주 출몰하는 컴퓨터 바이러스 및 악성코드의 특징을 분석하고, 이에 대응하는 국내외 사용 백신 프로그램들의 성능을 비교 분석하여 미래에 출현할 악성 바이러스에 대한 최상의 대처법을 제안하였다. 국내외에서 가장 많이 사용되는 상용 백신 프로그램의 특정 바이러스 및 악성코드를 침투시켜 대응 여부를 조사하고, 백신 프로그램의 DB(데이터베이스) 업데이트 주기, 대응 바이러스 목록 분석 등을 시행하여 특정 바이러스 및 악성코드에 대한 효율적인 대응책을 제시하였다.

Sentiment Analysis for COVID-19 Vaccine Popularity

  • Muhammad Saeed;Naeem Ahmed;Abid Mehmood;Muhammad Aftab;Rashid Amin;Shahid Kamal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1377-1393
    • /
    • 2023
  • Social media is used for various purposes including entertainment, communication, information search, and voicing their thoughts and concerns about a service, product, or issue. The social media data can be used for information mining and getting insights from it. The World Health Organization has listed COVID-19 as a global epidemic since 2020. People from every aspect of life as well as the entire health system have been severely impacted by this pandemic. Even now, after almost three years of the pandemic declaration, the fear caused by the COVID-19 virus leading to higher depression, stress, and anxiety levels has not been fully overcome. This has also triggered numerous kinds of discussions covering various aspects of the pandemic on the social media platforms. Among these aspects is the part focused on vaccines developed by different countries, their features and the advantages and disadvantages associated with each vaccine. Social media users often share their thoughts about vaccinations and vaccines. This data can be used to determine the popularity levels of vaccines, which can provide the producers with some insight for future decision making about their product. In this article, we used Twitter data for the vaccine popularity detection. We gathered data by scraping tweets about various vaccines from different countries. After that, various machine learning and deep learning models, i.e., naive bayes, decision tree, support vector machines, k-nearest neighbor, and deep neural network are used for sentiment analysis to determine the popularity of each vaccine. The results of experiments show that the proposed deep neural network model outperforms the other models by achieving 97.87% accuracy.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Development of Safe and Effective rec-OPV Using Poliovirus Sabin 1-derived Mucosal Vaccine Vector

  • Bae Yong-Soo
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2002.10a
    • /
    • pp.121-124
    • /
    • 2002
  • This work was initiated to develope a recombinant oral poliovaccine (OPV), which is highly advanced in safety (minimizing VAPP) by introducing Type 2,3 poliovirus epitopes into our RPS-Vax system. We have introduced several potential vaccine epitopes of poliovirus Type 2, and 3 into RPS-Vax system, resulting in production of recombinant polioviruses. Any of these chimeric viruses, however, were not detected for their foreign gene expression by serotype-specific mouse antiserum. We have designed several folding units to stabilize the introduced vaccine protein and attached short epitope-concatamer or epitope-multimer to them, followed by production of chimeric viruses. Only those who have an HIV-1 Tat-mediated folding unit were nicely detected for the introduced foreign proteins by anti-Tat antiserum and type-specific peptide-induced antisera. Nevertheless, introduced epitopes were not detected in Western blot experiment with each serotype-specific antiserum. None of the mice inoculated with these chimeric viruses showed preventative immunity when challenged with Lansing and Leon wildtype 2 and 3 poliovirus, and the antiserum did not show neutralizing capacity in vitro. Conformational epitope covering B/C loop region of type 2 and 3 were newly designed by computer modeling, and introduced into the RPS-Vax vector system, followed by production of chimeric viruses. Introduced epitope regions were nicely detected by anti-Tag23 mAb or peptide antibody, but still not detected by poliovirus antiserum. Nevertheless, neutralizing antibody was detected in the Tg-PVR mice even when inoculated once with these chimeric viruses. Also, the immunized mice showed perfect preventative immunity against the wild Type poliovirus Lancing or Leon. When boosted appropriately, those chimeric virus-inoculated Tg-PVR mice produced equivalent amounts of neutralizing antibody to those in Sabin 2/3-immunized mice. These data strongly suggest that our recombinant poliovirus (RPS-PV2 and RPS-PV3) can be used as a safe and effective rec-OPV instead of any preexisting poliovaccine.

  • PDF

A study on the efficient method of constrained iterative regular expression pattern matching (제약 반복적인 정규표현식 패턴 매칭의 효율적인 방법에 관한 연구)

  • Seo, Byung-Suk
    • Design & Manufacturing
    • /
    • v.16 no.3
    • /
    • pp.34-38
    • /
    • 2022
  • Regular expression pattern matching is widely used in applications such as computer virus vaccine, NIDS and DNA sequencing analysis. Hardware-based pattern matching is used when high-performance processing is required due to time constraints. ReCPU, SMPU, and REMP, which are processor-based regular expression matching processors, have been proposed to solve the problem of the hardware-based method that requires resynthesis whenever a pattern is updated. However, these processor-based regular expression matching processors inefficiently handle repetitive operations of regular expressions. In this paper, we propose a new instruction set to improve the inefficient repetitive operations of ReCPU and SMPU. We propose REMPi, a regular expression matching processor that enables efficient iterative operations based on the REMP instruction set. REMPi improves the inefficient method of processing a particularly short sub-pattern as a repeat operation OR, and enables processing with a single instruction. In addition, by using a down counter and a counter stack, nested iterative operations are also efficiently processed. REMPi was described with Verilog and synthesized on Intel Stratix IV FPGA.

A Study on Modus Operandi of Serial Killer -Centering on Ryu Young Chul's case- (연쇄살인범 MO(Modus Operandi)에 대한 고찰 -유영철 사건을 중심으로-)

  • Oh, Yoon-Sung
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.177-200
    • /
    • 2005
  • 2004 summer, most of Korean were shocked from serial killer Ryo young chul's criminal behavior. He had kept anger to society and selected the victim randomly. He killed many females and senior persons. Korean National Police's investigation method to homicide depend on traditional homicide investigative methods. But serial killer's criminal behaviour is evolving frequently. Therefore traditional investigative method is no effective to serial homicide anymore. If traditional investigative method is old version virus vaccine, serial killer's criminal behaviour is newly appeared computer virus. Fortunately all of criminal has modus operandi independently. Any person comes into contact with an object or another persons, a cross-transfer of physical evidence happens. In the future it is impossible to escape from confrontation with serial killer. It can be prospect that more severe copycat serial killer will appear in Korean society. Based on the Ryo young chul's criminal behavior. I'll try to analyse the serial killer's modus operandi through various aspects.

  • PDF

A Bio-Edutainment System to Virus-Vaccine Discovery based on Collaborative Molecular in Real-Time with VR

  • Park, Sung-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.109-117
    • /
    • 2020
  • An edutainment system aims to help learners to recognize problems effectively, grasp and classify important information needed to solve the problems and convey the contents of what they have learned. Edutainment contents can be usefully applied to education and training in the both scientific and industrial areas. Our present work proposes an edutainment system that can be applied to a drug discovery process including virtual screening by using intuitive multi-modal interfaces. In this system, a stereoscopic monitor is used to make three-dimensional (3D) macro-molecular images, with supporting multi-modal interfaces to manipulate 3D models of molecular structures effectively. In this paper, our system can easily solve a docking simulation function, which is one of important virtual drug screening methods, by applying gaming factors. The level-up concept is implemented to realize a bio-game approach, in which the gaming factor depends on number of objects and users. The quality of the proposed system is evaluated with performance comparison in terms of a finishing time of a drug docking process to screen new inhibitors against target proteins of human immunodeficiency virus (HIV) in an e-drug discovery process.