• Title/Summary/Keyword: Cyber-space

Search Result 474, Processing Time 0.029 seconds

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.

An Extended I-O Modeling Methodology based on FSM (유한상태기계에 기반한 확장된 I-O 모델링 방법론)

  • Oh, Soo-Yeon;Wang, Gi-Nam;Kim, Ki-Hyung;Kim, Kangseok
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Recently manufacturing companies have used PLC control programs popularly for their automated production systems. Since the life cycle of production process is not so long, the change of the production lines occur frequently. Most of changes happen with modification of the position information and control process of the equipment. PLC control program is also modified based on the fundamental process. Therefore, to verify new PLC program by configuring virtual space according to real environment is needed. In this paper we show a logical modeling method, based on Timed-FSA useful for sequence control and dead-lock prevention. There is a problem wasting user's labor and time when defining a variety of states in a device. To overcome this problem, we propose an extended I-O model based on existing methods by adding a token concept of Petri Nets. Also we will show the usability of the extended I-O modeling through user study.

Experimental Implementation of Digital Twin Simulation for Physical System Optimization (물리시스템 최적화를 위한 디지털 트윈 시뮬레이션의 실험적 구현)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2021
  • This study proposes a digital twin implementation method through simulation so that the manufacturing process can be optimized in a manual manufacturing site. The scope of the proposal is a knowledge management mechanism that collects manual motion with a sensor and optimizes the manufacturing process with repetitive experimental data for motion recognition. In order to achieve the research purpose, a simulation of the distribution site was conducted, and a plan to create an optimized digital twin was prepared by repeatedly experiencing the work simulation based on the basic knowledge expressed by the worker's experience. As a result of the experiment, it was found that it is possible to continuously improve the manufacturing process by transmitting the result of configuring the optimized resources to the physical system by generating the characteristics of the work space configuration and working step within a faster time with the simulation that creates the digital twin.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Direction of Designer-makers Business Activation through Strategic Design Support Policy-Focusing on 'Young man's Creative Work & Startup Support Project' (전략적 디자인 지원정책을 통한 디자이너-메이커스 비즈니스 활성화 방향 -청년 창의인력 취·창업지원사업을 중심으로-)

  • Park, Jun-Hong;Jeon, Young-Ok
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.291-298
    • /
    • 2019
  • This study discusses the core contents and implications of the design support policy of government in the creation of the designer-makers' business ecosystem through the analysis of 'Young man's Creative Work & Startup Support Project'. This case, which aims to cultivate a design brand based on maker technology and to create jobs for young people, suggests the role of government as a creative culture creator so that designer-makers are able to create creative activities in a more free and creative atmosphere. Furthermore, this study emphasizes the importance of efficient integration and reorganization of similar maker support policies implemented by each government department, the necessity of a roadmap for realizing this, and the support for quality improvement. As a result, the design support policy of government for the designer-makers' business activation should evolve into the qualitative development of intellectual property based on a mature shared culture and the discovery of a new production paradigm model of the manufacturing industry based on the open manufacturers beyond the economic and numerical goals of creating new jobs.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

The effect of smart learning based class on students with low academic achievement level: focusing on 3D application and AR of smart application (스마트러닝기반의 수업이 학업성취수준이 낮은 학생들에게 미치는 효과성 분석: 스마트앱의 3D와 AR 활용을 중심으로)

  • Hong, Ye-Yoon;Im, Yeon-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to investigate the impact and analyze the effect of smart learning based class to on the students with low academic achievement level. The study performed in G University in 2018 among students taking calculus II class. It includes 16 students with low academic achievement level, whose grades were under C in the previous calculus I class. They belonged to special class consisted of very low academic achievement level and had to pass calculus II. 3D and AR were actively used in the class. The result shows that they got visual understanding of space, which revealed through analyzing SNS, mid-term and final examination, lecture evaluation. Also, smart learning based mathematics class utilizing smartphone's application elevated academic achievement level and influenced positively on the interest and attitude toward mathematics regardless of previous academic achievement level.

A Study on the Actual Situation of Domestic Violence and the Problems of Victims of Domestic Violence and Preventive Measures (가정폭력의 실태 및 피해 가정 문제와 예방대책에 관한 연구)

  • Bae, Na Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.187-193
    • /
    • 2022
  • Domestic violence in our society is where the abuser and the abuser live in the same space. Problems are left unresolved in families where abuse is reproducing. Domestic violence can be viewed as a crime that violates and tramples human rights. They rely solely on family support networks for solutions to domestic violence. The physical, emotional, and psychological pain and wounds that victims of domestic violence must endure are too deep. In order to help victims of domestic violence, case management services that can provide long-term and attentive help in the neighborhood or community are needed. For this, prevention and treatment of domestic violence should be considered together. And the interest and professional role of the community must follow.

Comparison of Internet Ethics between Gifted and General Students (영재학생과 일반학생의 인터넷 윤리의식 비교)

  • Lee, Jaeho;Lee, Kangmin
    • Journal of Creative Information Culture
    • /
    • v.5 no.1
    • /
    • pp.71-80
    • /
    • 2019
  • With the spread of smart phones, the Internet became a major 'space' of students' daily life and, at the same time, negative aspects of the internet are affecting their life. However, it doesn't seem that there is enough research on this subject. This study was conducted on 278 students in Gyeonggi. The results were as follows. First, gifted students' information and communication ethics index was higher than general students. Second, there was no statistically significant difference according to the gender of information and communication ethics index. Urban districts showed lower index in the upper grades than the lower grades. Third, about 10% of the students had experience of contact with harmful content, and about 1% of students had experienced cyber-wrongdoing. Through the results of this study, systematic education of IT ethics at the elementary school grade level can be expected to prevent school violence, improve information and communication culture, and serve as a future work ethic.