• Title/Summary/Keyword: Cyber Target

Search Result 162, Processing Time 0.029 seconds

A Collision detection from division space for performance improvement of MMORPG game engine (MMORPG 게임엔진의 성능개선을 위한 분할공간에서의 충돌검출)

  • Lee, Sung-Ug
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.567-574
    • /
    • 2003
  • Application field of third dimension graphic is becoming diversification by the fast development of hardware recently. Various theory of details technology necessary to design game such as 3D MMORPG (Massive Multi-play Online Role Flaying Game) that do with third dimension. Cyber city should be absorbed. It is the detection speed that this treatise is necessary in game engine design. 3D MMORPG game engine has much factor that influence to speed as well as rendering processing because it express huge third dimension city´s grate many building and individual fast effectively by real time. This treatise nay get concept about the collision in 3D MMORPG and detection speed elevation of game engine through improved detection method. Space division is need to process fast dynamically wide outside that is 3D MMORPG´s main detection target. 3D is constructed with tree construct individual that need collision using processing geometry dataset that is given through new graph. We may search individual that need in collision detection and improve the collision detection speed as using hierarchical bounding box that use it with detection volume. Octree that will use by division octree is used mainly to express rightly static object but this paper use limited OSP by limited space division structure to use this in dynamic environment. Limited OSP space use limited space with method that divide square to classify typically complicated 3D space´s object. Through this detection, this paper propose follow contents, first, this detection may judge collision detection at early time without doing all polygon´s collision examination. Second, this paper may improve detection efficiency of game engine through and then reduce detection time because detection time of bounding box´s collision detection.

Rare Malware Classification Using Memory Augmented Neural Networks (메모리 추가 신경망을 이용한 희소 악성코드 분류)

  • Kang, Min Chul;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.847-857
    • /
    • 2018
  • As the number of malicious code increases steeply, cyber attack victims targeting corporations, public institutions, financial institutions, hospitals are also increasing. Accordingly, academia and security industry are conducting various researches on malicious code detection. In recent years, there have been a lot of researches using machine learning techniques including deep learning. In the case of research using Convolutional Neural Network, ResNet, etc. for classification of malicious code, it can be confirmed that the performance improvement is higher than the existing classification method. However, one of the characteristics of the target attack is that it is custom malicious code that makes it operate only for a specific company, so it is not a form spreading widely to a large number of users. Since there are not many malicious codes of this kind, it is difficult to apply the previously studied machine learning or deep learning techniques. In this paper, we propose a method to classify malicious codes when the amount of samples is insufficient such as targeting type malicious code. As a result of the study, we confirmed that the accuracy of 97% can be achieved even with a small amount of data by applying the Memory Augmented Neural Networks model.

An Analysis of Response as Bystanders of Middle School Girls in a Simulated Cyberbullying Situation: Influences of Peer Bullying/Victimization and Anger Experiences (유사 사이버 괴롭힘 상황에서 여중생의 주변인으로서 반응 분석: 또래 괴롭힘 가·피해 및 분노 경험의 영향)

  • Jeong, Ah Hye;Choi, Yun Kyeung
    • Korean Journal of Culture and Social Issue
    • /
    • v.26 no.1
    • /
    • pp.1-23
    • /
    • 2020
  • The purpose of this study was to analyze responses as bystanders of middle school girls in a simulated cyberbullying situation. This study also aimed to examine effects of bullying, victimization, anger-out, and state-anger on responses from girls as bystanders. The participants were composed of 2nd or 3rd grade middle school girls(N=59). Responses were classified into 7 categories(using explicit language, attacking, pass, changing topic, comforting victims, others, and conformity). Of these, attackings were classified according to the target(bully, victim, both, and ambiguous object). It was again classified as 'attacking response' and 'helping response' and was scored and summed according to the strength of the response and used as a dependent variable. Collected data were analyzed by correlation analysis and multiple regression analysis. The results of this study are as follows: First, the most frequent response was 'the others'(41.69%) followed by 'using explicit language'(20.34%), 'passing'(13.56%), 'attacking bully'(8.81%), 'conformity'(8.64%), 'changing topic'(6.61%), and 'comforting victim'(0.34%). Second, responses of attacking victim were positively influenced by the previous bullying experiences and acting anger-out, and were negatively influenced by the previous victimization experience. State-anger has a positively influenced on responses of the attacking bully and the helping victim. None of the variables were significant influenced on responses of the attacking both and ambiguous object. These results will be useful data to help middle school girls as bystanders properly intervene in cyberbullying situation. Finally, the limitations of this study were discussed along with suggestions for further research.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Research on Basic Concept Design for Digital Twin Ship Platform (디지털트윈 선박 플랫폼 설계를 위한 연구)

  • Yoon, Kyoungkuk;Kim, Jongsu;Jeon, Hyeonmin;Lim, Changkeun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1086-1091
    • /
    • 2022
  • The International Maritime Organization is establishing international agreements on maritime safety and security to prepare for the introduction of autonomous ships. In Korea, the industry is focusing on autonomous navigation system technology development, and to reduce accidents involving coastal ships, research on autonomous ship technology application plans for coastal ships is in progress. Interest in autonomously operated ships is increasing worldwide, and maritime demonstrations for verification of developed technologies are being pursued. In this study, a basic investigation was conducted on the design of a demonstration ship and an onshore platform (remote support center) using digital twin technology for application to coastal ships. To apply digital twin technology, an 8-m small battery-powered electric propulsion ship was selected as the target. The basic design of the twin-integrated platform was developed. The ship navigation and operation data were stored on a server system, and remote-control commands of the electric propulsion ship was achieved through communication between the ship and the onshore platform. Ship performance management, operation and operation optimization, and predictive control are possible using this digital twin technology. This safe and economical digital twin technology is applicable to ships responding to crisis scenarios.

An Experimental Study and Numerical Analysis on Load Transfer Characteristics of Drilled Shafts (현장타설말뚝의 하중전이 특성에 대한 실험 및 해석적 연구)

  • Eonsang Park;Seungdo Park
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2023
  • In this study, the load transfer characteristics of the base and skin of drilled shafts were analyzed and the load sharing ratio was calculated by performing a load transfer large-scale model test and three-dimensional numerical analysis considering the similarity of drilled shafts, which is the design target. From the linear behavior of drilled shafts shown in the large-scale model test and 3D numerical analysis results, the skin load transition curve for the design conditions of this study was proposed by Baquelin et al., and the base load transition curve was proposed by Baquelin et al. For the horizontal load transition curve, the formula proposed by Reese et al. was confirmed to be appropriate. The test value was slightly larger than the numerical analysis value for the axial load at the rock socketing, but the load sharing ratio at the rock socketing increased, on average, about 27.8% as the vertical load increased. The analysis value of the vertical settlement of the pile head under the vertical load was evaluated to be slightly smaller than the test value, and the maximum vertical settlement of the pile head in the model test and analysis maximum vertical load was 10.6 mm in the test value and 10.0 mm in the analysis value, and the maximum vertical settlement value at the base of the pile was found to be a test value of 2.0 mm and an analysis value of 1.9 mm. The horizontal displacement at the head of the column (ground surface) and the head of the pile during the horizontal load was found to agree relatively well with the test value and the analysis value. As a result of the model soil test, the horizontal load measured at the maximum horizontal displacement of 38.0 mm was evaluated to be 24,713 kN, and the horizontal load in the numerical analysis was evaluated to be 26,073 kN.

Effect of Social Network Service (SNS) Users' Object Relations Factors on User Satisfaction through Pleasure and Self-efficacy (소셜네트워크서비스(SNS) 이용자의 대상관계 요인이 즐거움과 자기효능감을 통해 이용자 만족에 미치는 영향)

  • Chae, Su-in;Choi, Hyo-geun;Kwon, Do-Soon;Park, Dong-cheol
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-16
    • /
    • 2022
  • Social network service (SNS) using mobile or web is growing rapidly, and the emergence of various platform services is causing innovative changes in social network service (SNS). This study is to identify the target relation factors of social network users and to empirically study the causal relationship of how much these factors affect user satisfaction through pleasure and self-efficacy. To present an effective and efficient development plan in. In order to empirically verify the research model of this study, a survey was conducted with the general public who had experience using social network services (SNS). Path analysis was performed. As a result, it was possible to verify the correlation of the object relational factors on user satisfaction through pleasure and self-efficacy.First, non-excluded had a significant effect on pleasure, but did not significantly affect self-efficacy. Second, stability attachment did not significantly affect both enjoyment and self-efficacy. Third, social ability did not significantly affect both enjoyment and self-efficacy. Fourth, self-centeredness did not have a significant effect on both enjoyment and self-efficacy. Fifth, pleasure had a significant effect on both self-efficacy and user satisfaction. Sixth, self-efficacy had a significant effect on user satisfaction.

The Impact of M&As with a Start-up on Shareholder Wealth (상장기업과 스타트업과의 인수합병이 주주의 부(富)에 미치는 영향에 관한 연구)

  • Cho, Sung-woo;Song, Hyunju;Jung, Jin-young
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.6
    • /
    • pp.1-9
    • /
    • 2016
  • In this study, we investigate the announcement effects of M&As with a start-up as a target firm on shareholder wealth of an acquiring firm. We use M&A events in KOSPI or KOSDAQ market between 2002 and 2014 after the financial crisis. Among the total 1436 mergers and acquisitions that took place domestically during this period, 1383 cases were selected as cases to be studied, excluding 53 cases where acquiring firms were unlisted firms. The results of the analysis are as follows: First, as a result of a comparison between the acquiring firms' CARs of the whole sample group(n=1383) occurred during the (-2, +1), (-5, +2), (-10, +5) periods of M&A announcement date(t=0) and the sub-sample group(n=468) where the target firms are start-ups which were established within five years, the acquiring firms of the whole sample group do not show significat CARs, while the acquiring firms of the sub-sample group show the significantly positive CARs. This suggests that M&A with start-ups have a positive effect on firm value of acquiring firms. Second, when merging unlisted start-ups, the acquiring firms show positive CARs, showing that there exists a listing effect in the merger of start-up. Third, merging the start-ups belonging to the high-tech industry shows the higher CARs than the case of merging the start-ups belonging to the non-high-tech industry. This study has great significance as the first in Korea to investigate the effect of M&A announcement with a start-up.

  • PDF

Comparison of Three- and Four-dimensional Robotic Radiotherapy Treatment Plans for Lung Cancers (폐암환자의 종양추적 정위방사선치료를 위한 삼차원 및 사차원 방사선치료계획의 비교)

  • Chai, Gyu-Young;Lim, Young-Kyung;Kang, Ki-Mun;Jeong, Bae-Gwon;Ha, In-Bong;Park, Kyung-Bum;Jung, Jin-Myung;Kim, Dong-Wook
    • Radiation Oncology Journal
    • /
    • v.28 no.4
    • /
    • pp.238-248
    • /
    • 2010
  • Purpose: To compare the dose distributions between three-dimensional (3D) and four-dimensional (4D) radiation treatment plans calculated by Ray-tracing or the Monte Carlo algorithm, and to highlight the difference of dose calculation between two algorithms for lung heterogeneity correction in lung cancers. Materials and Methods: Prospectively gated 4D CTs in seven patients were obtained with a Brilliance CT64-Channel scanner along with a respiratory bellows gating device. After 4D treatment planning with the Ray Tracing algorithm in Multiplan 3.5.1, a CyberKnife stereotactic radiotherapy planning system, 3D Ray Tracing, 3D and 4D Monte Carlo dose calculations were performed under the same beam conditions (same number, directions, monitor units of beams). The 3D plan was performed in a primary CT image setting corresponding to middle phase expiration (50%). Relative dose coverage, D95 of gross tumor volume and planning target volume, maximum doses of tumor, and the spinal cord were compared for each plan, taking into consideration the tumor location. Results: According to the Monte Carlo calculations, mean tumor volume coverage of the 4D plans was 4.4% higher than the 3D plans when tumors were located in the lower lobes of the lung, but were 4.6% lower when tumors were located in the upper lobes of the lung. Similarly, the D95 of 4D plans was 4.8% higher than 3D plans when tumors were located in the lower lobes of lung, but was 1.7% lower when tumors were located in the upper lobes of lung. This tendency was also observed at the maximum dose of the spinal cord. Lastly, a 30% reduction in the PTV volume coverage was observed for the Monte Carlo calculation compared with the Ray-tracing calculation. Conclusion: 3D and 4D robotic radiotherapy treatment plans for lung cancers were compared according to a dosimetric viewpoint for a tumor and the spinal cord. The difference of tumor dose distributions between 3D and 4D treatment plans was only significant when large tumor movement and deformation was suspected. Therefore, 4D treatment planning is only necessary for large tumor motion and deformation. However, a Monte Carlo calculation is always necessary, independent of tumor motion in the lung.