• Title/Summary/Keyword: Misuse Service

Search Result 51, Processing Time 0.023 seconds

Consideration on Role and Functions of Game Rating Board (게임물등급위원회의 발전방향 모색)

  • Kim, Chan-Soo;Park, Tae-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.114-122
    • /
    • 2007
  • Recently, Game Rating Board has been established. It is to follow worldwide trend in building up publicity, autonomy and professionalism under the framework to assure freedom of expression. This article analyzed major nation's game rating system, and showed some points to need improvement which are to have more detailed classification in game rating, to modify contents descriptor, to appoint committee members with expertise on game, to revise articles to be capable of misuse, and to become a nongovernmental organization.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

Threat Management System for Anomaly Intrusion Detection in Internet Environment (인터넷 환경에서의 비정상행위 공격 탐지를 위한 위협관리 시스템)

  • Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.157-164
    • /
    • 2006
  • The Recently, most of Internet attacks are zero-day types of the unknown attacks by Malware. Using already known Misuse Detection Technology is hard to cope with these attacks. Also, the existing information security technology reached the limits because of various attack's patterns over the Internet, as web based service became more affordable, web service exposed to the internet becomes main target of attack. This paper classifies the traffic type over the internet and suggests the Threat Management System(TMS) including the anomaly intrusion detection technologies which can detect and analyze the anomaly sign for each traffic type.

  • PDF

Lessons from Using Opioid to the Treatment of Chronic Pain: Focus on Experiences with the Organization for Economic Cooperation and Development Countries (통증완화를 위한 오피오이드 사용의 교훈: 경제협력개발기구 회원국의 경험을 중심으로)

  • IM, Jeehye;Cho, Jae Young
    • Health Policy and Management
    • /
    • v.31 no.4
    • /
    • pp.409-422
    • /
    • 2021
  • The growing use of prescription analgesic opioids has rapidly escalated the treatment of chronic pain since the 1990s; however, it is also highly needed to control opioid-related issues, including opioids misuse, abuse, and addiction. In 2018, Organization for Economic Cooperation and Development (OECD) secretariat administered the survey on opioids use and policies to OECD countries and presented it at the Health Committee meeting of December 2018. This study aimed to review the opioids use in OECD countries and their policies to prevent and reduce associated harms, also seek the available policy lessons from OECD countries. More recently, opioids prescribing rate have been increased 14.7% between 2011-2013 and 2014-2016 and steadily focused on the main substance misused and abused in Korea. In addition, policy efforts have contributed to developing a guideline for prescribing opioids to steer the appropriate use of prescription analgesic opioids since 2000 in Korea, so it is not enough to control opioids compared with other OECD countries. Therefore, taking a people-centered and public health perspective, it will consider the health system policies and interventions at a national level to improve their preparation and approach to control opioid-related issues.

Youth and Their Parents' Experiences of Young Consumers' Problem in Mobile Phone Service and Related Variables (청소년과 부모가 경험한 청소년의 이동전화 서비스 소비자문제와 관련요인)

  • Yang, Deok-Soon;Song, In-Sook
    • Korean Journal of Human Ecology
    • /
    • v.19 no.2
    • /
    • pp.325-341
    • /
    • 2010
  • A study on what kind of problems young consumers experience in buying and using mobile phone services with a comprehensive and consumers oriented perspective is needed. Through this acknowledgement, we investigated (i) the degree of consumer problems that young consumers experience in purchasing and using mobile phone services, and (ii) the related variables that affect experiences of this consumer problem. The parents of the teenagers were also included in the survey because they experience the same problems young consumers' experience in buying and using mobile phone services. Data were gathered through an internet survey (www.embrain.com) and a total of 699 samples from 350 parents and 349 youths using mobile phone services were analysed. The results are as follows. First, the teenagers and parents' experience level of young consumers' problems were generally high experiencing similar kinds of problems. Second, parents experienced more young consumers' problems than the teenagers in buying and using mobile phone services, especially in misuse and abuse of the phones. Third, among the teenagers, the monthly usage fee music or game usage, the number of changes in mobile phone service operators, the number of replacement mobile phones and the gender had a significant effect on consumers' problems of mobile phone services. Among the parents, the monthly usage fee, music or game usage, confirmation of the bill, and the gender of their child were significant consumer problems. Based on results of our survey the direction of consumer policy and education was suggested for teenagers and their parents.

Exploration of Direction for Platform Business Application for Development of Private Security Guard service (민간경호경비업의 발전을 위한 플랫폼 비즈니스 적용의 방향성 탐색)

  • Jeong, Kwi Young;Kim, Doo Han
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.99-106
    • /
    • 2015
  • The purpose of this study was to explore the direction in applying platform business model to the site to facilitate the growth of a private security guard service according to the development phase of economy, The directions of platform business application to be suggested through the study method are as follows. First, ensuring publicness. It should be able to integrate the government's and private sector's ability to collect and impart information. Second, securing self-regulation. Self-regulation should be guaranteed in the limit not to abuse or misuse others' information in re-producing and using information on private safe management and public order. Third, ensuring access. Past safety management has been controlled by public order power such as nation, military and police power, but access should be made to be convenient between suppliers and demanders. Fourth, securing profitability. In conclusion, those supplying and consuming private security guard service should be able to get their wanted value and share economic profits.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Suggestion and Evaluation on Information Services in Viewpoint of Visualization Attributes (시각화 속성을 고려한 정보 서비스 평가 및 제안)

  • Kim, Tea-Hong;Lee, Jin-Hee;Lee, Mi-Kyoung;Jung, Han-Min;Kim, Do-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.489-499
    • /
    • 2011
  • While lots of information service providers utilize the information visualization to deliver information clearly and efficiently, the misuse of information visualization can occur many problems. We evaluated and analyzed visualization elements mainly applied to the representative information services. To find out the relation between attributes of visualization elements and efficiency of information service, we had analyzed attributes of target elements before we have evaluated. Through this study we revealed that Information visualization on information service has to be applied with considering the characteristics of information and each visualization element, and its elements can be optimized and support users to obtain intuitive insight when they are complementally combined and offer sufficient attributes additionally. We expect that the result of this study will be a guide for utilizing information visualization and developing visualization elements.

An Analysis of the Contents of Medication Education in Health Textbooks for Children and Adolescents (초·중·고등학교 보건 교과서의 의약품 교육 내용 분석)

  • Kim, Kwon Ha;Kang, Eun Jeong;Park, Hye Kyung;Lee, Eui-Kyung
    • Korean Journal of Health Education and Promotion
    • /
    • v.31 no.2
    • /
    • pp.41-53
    • /
    • 2014
  • Objectives: The purpose of this study was to evaluate the education contents on safe use of medications in healthcare textbooks for elementary, middle and high schools. Methods: We examined 6 textbooks for the $5^{th}$ grade, 4 textbooks for middle school, 3 textbooks for high school, and 5 education materials published by the Korea Food and Drug Administration, National Health Insurance Service, and Seoul City Government. To evaluate the contents in health textbooks, we developed the 30 evaluation items. Results: Middle school textbooks had the most educational contents followed by high school and elementary school textbooks. Public education materials for the teenagers included more educational contents than those for children. The education material published by National Health Insurance Service had the highest score and the rest of the books earned under 15. And there were no core contents in medication education. Conclusions: Medication education through health textbooks should be strengthened to raise the level of medication awareness, to use medications safely, to prevent the drug abuse and misuse, and to establish the responsible judgment of medication information in the mass media. The current contents were found to be insufficient to meet these goals of medication education.

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF