• Title/Summary/Keyword: Cyber space

Search Result 479, Processing Time 0.021 seconds

Open API as a solution for the unification and fragmentation in online social network (온라인 소셜 네트워크의 문제점와 공개 API 를 통한 해결 방안 연구)

  • Kim, Yong-Geun;Byun, Jae-Bum;Yoon, Joon-Sung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.656-661
    • /
    • 2008
  • There are many sociological methodology for the study on cyber community. Especially for the online social network which is constructed by the notion of the social network, the social network analysis can be a superior methodology for the understanding of the general phenomenon and the solutions for the problematic issues. As pointed by Manuel Castells, the problem of the unification and the fragmentation, which is came after the participation and the openness, is prevailed in cyber community by its characteristics. However, computational properties that exceed the limitation of the time and space can bestow other alternatives. The Open API in the social network services that is more popular in these days is the one of those alternatives. Therefore, the purpose of this study is to investigate the problematic phenomenon of online social network and to search the solutions for those problems with the acceptance of Open API technology.

  • PDF

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks

  • Pan, Hongyu;Fang, Yong;Huang, Cheng;Guo, Wenbo;Wan, Xuelin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4008-4023
    • /
    • 2022
  • Since machine learning was introduced into cross-site scripting (XSS) attack detection, many researchers have conducted related studies and achieved significant results, such as saving time and labor costs by not maintaining a rule database, which is required by traditional XSS attack detection methods. However, this topic came across some problems, such as poor generalization ability, significant false negative rate (FNR) and false positive rate (FPR). Moreover, the automatic clustering property of graph convolutional networks (GCN) has attracted the attention of researchers. In the field of natural language process (NLP), the results of graph embedding based on GCN are automatically clustered in space without any training, which means that text data can be classified just by the embedding process based on GCN. Previously, other methods required training with the help of labeled data after embedding to complete data classification. With the help of the GCN auto-clustering feature and labeled data, this research proposes an approach to detect XSS attacks (called GCNXSS) to mine the dependencies between the units that constitute an XSS payload. First, GCNXSS transforms a URL into a word homogeneous graph based on word co-occurrence relationships. Then, GCNXSS inputs the graph into the GCN model for graph embedding and gets the classification results. Experimental results show that GCNXSS achieved successful results with accuracy, precision, recall, F1-score, FNR, FPR, and predicted time scores of 99.97%, 99.75%, 99.97%, 99.86%, 0.03%, 0.03%, and 0.0461ms. Compared with existing methods, GCNXSS has a lower FNR and FPR with stronger generalization ability.

Analyzing the Major Issues of the 4th Industrial Revolution

  • Jeon, Jeonghwan;Suh, Yongyoon
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.3
    • /
    • pp.262-273
    • /
    • 2017
  • Recently, the attention to the $4^{th}$ Industrial Revolution has been increasing. In the $4^{th}$ Industrial Revolution era, the boundaries between physical space, digital space, and biological space are becoming blurred because of the active convergence between various fields. There are many issues about the $4^{th}$ Industrial Revolution such as artificial intelligence, Internet of things, big data, and cyber physical system. To cope with the $4^{th}$ Industrial Revolution, an accurate analysis and technology planning need to be undertaken from a broad point of view. However, there is little research on the analysis of the major issues about the 4th Industrial Revolution. Accordingly, this study aims to analyse these major issues. Data mining such as topic modelling method is used for this analysis. This study is expected to be helpful for the researcher and policy maker of the 4th Industrial Revolution.

토픽모델링을 활용한 4차 산업혁명의 주요 이슈 분석

  • Jeon, Jeong-Hwan;Seo, Yong-Yun
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.1321-1321
    • /
    • 2017
  • Recently the attention to the 4th industrial revolution has been increasing. In the 4th industrial revolution era, the boundaries of physical space, digital space, and biological space are becoming blurred since the active convergence between various fields There are a lot of issues on the 4th industrial revolution such as artificial intelligence, internet of thing, big data, and cyber physical system. Accordingly, this study aims to analyse the main issues of the 4th industrial revolution. Data mining such as topic modelling method is used for the analysis. This study is expected to be helpful for the researcher and policy maker of the 4th industrial revolution.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.

3D Product digital camera Model on the Web and study about developing 3D shopping mall (Web 상에서 3차원 디지털카메라제품모델과 3차원 쇼핑몰 개발에 관한 연구)

  • 조진희;이규옥
    • Archives of design research
    • /
    • v.14 no.1
    • /
    • pp.63-70
    • /
    • 2001
  • Thanks to the inter-connection of information servers throughout the world based on the internet technology, the new sphere which actual transaction can be made like in the visible market has become conspicuous as the virtual space. The movement to realize the new business through the cyber space has been actively ongoing. In the domestic market, a lot of corporations knowing the needs of internet shopping malls have entered into this e-business but they have not made a big success comparing with internet's potentials. And, it can be attributed to the simple planes and the limitations of information provided by the cyber malls, which means that the needs of better information transfer we apparent Accordingly, in this thesis, the research on the 3-D based products and shopping malls has been made through the inter-complementary composition between the 2-D shopping malls and 3-B ones. This research consists of 3 parts. Firstly, through the research on references and existing data, it presents the analysis on consumer's characteristics and sales limits of the internet shopping mall's products. Secondly, the background of 3-D shopping mall's advent and the virtual reality technology data are put together. Finally, it presents how the development of 3-D based product modeling and shopping malls can increase the consumer's purchase power and furthermore the directions of shopping malls to go.

  • PDF

A Study on the Utilization Measures of Internet Marketing (인터넷 마케팅의 활용방안에 관한 연구)

  • Kim, Hee-Chul
    • International Commerce and Information Review
    • /
    • v.1 no.2
    • /
    • pp.25-48
    • /
    • 1999
  • A rapid diffusion of internet provides Korean companies with both business opportunities and challenges. Internet is becoming more and more important as an environment factor to industry in general. This paper investigated the present situation of internet marketing utilization in companies. And based on the research result, this paper suggests the efficient utilization measures of internet marketing in Korean companies.

  • PDF