• Title/Summary/Keyword: Dynamic Security

Search Result 747, Processing Time 0.034 seconds

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

Multicentered-Growth of Office Activities in the City of Seoul (서울시 오피스기능의 다중심화 현상에 관한 연구)

  • Jung, Hyun-Joo
    • Journal of the Korean Geographical Society
    • /
    • v.33 no.1
    • /
    • pp.75-91
    • /
    • 1998
  • The purpose of this paper is to investigate office location dynamic in Seoul and to analyze comparatively the office activities of emerging office centers. Since mid 1980s, the expansion of office employment and spatial differentiation of the office-type jobs have changed the employment and spatial structure of Seoul. The major employment centers are CBD, Kangnam district and Youido. Among these, CBD and Kangnam have developed as the two leading centers of Seoul. Youido, the typical office-oriented center, shares CBD functions especially specializing security business. Selective decentralization of offices made qualitative differences among the centers. In spite of vigorous office decentralization, CBD has kept the principal offices of finance and insurance, travel agencies, advertising agencies, management consulting firms, major public institutions and headquarters of upper 100 companies in Korea. But the offices of producer services such as law, architects, engineering and computer consulting and real estates and headquarters of upper 5000 companies in Korea have been decentralized dominantly to Kangnam.

  • PDF

A Comparative Study of Outsourcing Culinary Part of Foodservice Industry Development. (외식사업발전을 위한 조리분야 아웃소싱 전략에 관한 연구 (평가측정치 개발절차를 중심으로))

  • 김기영
    • Culinary science and hospitality research
    • /
    • v.7 no.3
    • /
    • pp.13-34
    • /
    • 2001
  • The case which it contracts with the dynamic result measurement system when actual outsourcing evaluation measurement is composed and then one result standard between the service supplier and the user is set, which owns jointly the expense which is reduced from that or the benefit which is created from that is increasing In the conclusion, for outsourcing management strategy of domestic foodservice industry in order to succeed, first it is accurate and examined that for what and how outsourcing should be introduced and as a result, what kind of result can be raised from that result\ulcorner Food service industry should be outsourced if you want to make more many investment in better humane resources, food & beverage-goods-security and education to provide eating-out service out of various business in food industry. When considering the actuality of the domestic foodservice industry that time it is appropriate, it sees. The foreign-brand goods which is introduced in the country are being executing in the 1ink of part management strategy. One of the most influential factor of domestic foodservice industry's management pressure is overspent management expenses, Does the namely expenses preparation effect reach which degree\ulcorner what kind of method can most decrease these expenses\ulcorner Doing grows the success and failure of the Korean foodservice industry controls result with the fact that it will operate with a big variable sees. The background which the domestic foodservice industry should introduce inevitably the outsiurcing system is to develop continuously nation foodservice industry in the way of cost curtailment of food-material, a labor cost curtailment with efficient application and synergic effect like specialty manpower utilization. The kindred competitive enterprises gradually concentrate management resource to the point ability from the present point of view which is increasing and a strategy position they secure, to prepare a competitive power, what sees it is important national industry must prepare a new paradigm. It is important to measure the result based on sales accomplishment in operation system dimension, and it is more important to appropriately apply regard of the evaluation measurement

  • PDF

Efficient Group Management Mechanism and Architecture for Secure Multicast (안전한 멀티캐스트 서비스 제공을 위한 효율적인 그룹 관리 메커니즘 및 구조)

  • Eun, Sang-A;Jo, Tae-Nam;Chae, Gi-Jun;Lee, Sang-Ho;Park, Won-Ju;Na, Jae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.323-330
    • /
    • 2002
  • Multicast services are gradually diversified and used widely. Proportionately, they become the center of attackers' attention and there are growing possibilities of an intelligence leak. Therefore, research related to secure multicast should be required to provide multicast service efficiently. This paper presents the architecture for secure multicast which provides efficient group management mechanism in group consists using member's dynamic join and leave. This architecture can provide secure multicast services to many users with regard to security aspects in one-to-many communication. The simulation results show that the proposed architecture achieves an efficient group management and a secure data transmission with low latency compared with the other existing secure multicast architecture.

A Literature Study on Digital Currency and Historical Developments of Money: Dynamic Pattern in Currency, Central Bank Digital Currency and Libra (디지털화폐와 화폐 변천과정에 관한 문헌적 연구: 동적패턴, CBDC, 리브라를 중심으로)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.109-126
    • /
    • 2020
  • This study attempts to find out the characteristics of digital currency and currency transformation through the analytical descriptions of the literature. In the early days of the emergence of new currency, market-oriented autonomous monetary adjustment was made along with various attempts by the private sector, and then government-centered central currency management and coordination were made for the national monopoly of profits and power. Digital currency can be seen as the emergence of a new form of money that will bring about paradigm changes. CBDC can be divided into direct and indirect types. CBDC is expected to require a strategic approach by the government or firm as it will bring about changes in the ecosystem of related industries. Libra is a stablecoin designed to minimize price fluctuations, and if it succeeds in commercializing it, it is expected to bring about revolutionary changes in the financial industry around the world.

Propagation Models for Structural Parameters in Online Social Networks (온라인 소셜 네트워크에서 구조적 파라미터를 위한 확산 모델)

  • Kong, Jong-Hwan;Kim, Ik Kyun;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.125-134
    • /
    • 2014
  • As the social media which was simple communication media is activated on account of twitter and facebook, it's usability and importance are growing recently. Although many companies are making full use of its the capacity of information diffusion for marketing, the adverse effects of this capacity are growing. Because social network is formed and communicates based on friendships and relationships, the spreading speed of the spam and mal-ware is very swift. In this paper, we draw parameters affecting malicious data diffusion in social network environment, and compare and analyze the diffusion capacity of each parameters by propagation experiment with XSS Worm and Koobface Worm. In addition, we discuss the structural characteristics of social network environment and then proposed malicious data propagation model based on parameters affecting information diffusion. n this paper, we made up BA and HK models based on SI model, dynamic model, to conduct the experiments, and as a result of the experiments it was proved that parameters which effect on propagation of XSS Worm and Koobface Worm are clustering coefficient and closeness centrality.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

A Study of Clothing Design in the Digital Age (디지털 시대의 의상 디자인 개발에 관한 연구)

  • 배리사;이인성
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.4
    • /
    • pp.63-74
    • /
    • 2004
  • This study shows that clothes to be just the same as the real thing can be Produced through the third dimension computer graphics, and then presents that not only the area of fashion design can be expanded in the virtual reality field by doing the simulation of the fashion show, but also the information can be made the real time public ownership and the communication can be fulfilled smoothly. In this study, analyzing the third dimension computer graphic programs to be used much at present, Alias Wavefront Company's Maya software which was the most effective in the clothes simulation and the clothes CAD SGS OptiTex 8.7 which went well substitutive for it were used of them. The conclusions of this study that got through the work manufacture are as follows: The first, if the file manufacturing in the clothes CAD by using the computer was stored, the pattern used 3D simulation was available because it could be summoned in 3D software. The second, if the data of DXF form in Maya program was summoned, they could not be applied by Maya Cloth supported in Nurbs only because they were recognized as the DXF_layer. So the curve along the outer lines of the pattern was drawn and Maya Cloth was applied to be possible to get the natural silhouette of clothes. The third, when the clothes were manufactured by 3D, if the draping character was applied according to the textile special quality, not only the control of textile's thickness, weight, quality feeling, and silhouette was available, but also the clothes were available to graft the special textile materials. The fourth, the natural motion of model was produced by capturing the actual model's walking action In order to produce the fashion show motion and also the dynamic fashion show was available by the angle of camera, the establishment of lighting, and etc. in the final rendering. The clothes manufactured by 3D are available to change the design by changing the materials, or by adding the details, or by utilizing the special materials on clothes. Therefore, the trial and error following at the clothes manufacture can be reduced. But the elevation of the rendering speed, the price down, the strengthening of personal security, and etc. are required.