• Title/Summary/Keyword: OpenURL

Search Result 25, Processing Time 0.023 seconds

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

The French Underground Research Laboratory in Bure: An Essential Tool for the Development and Preparation of the French Deep Geological Disposal Facility Cigéo

  • Pascal Claude LEVERD
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.21 no.4
    • /
    • pp.489-502
    • /
    • 2023
  • This article presents the crucial role played by the French underground research laboratory (URL) in initiating the deep geological repository project Cigéo. In January 2023, Andra finalized the license application for the initial construction of Cigéo. Depending on Government's decision, the construction of Cigéo may be authorized around 2027. Cigéo is the result of a National program, launched in 1991, aiming to safely manage high-level and intermediate level long-lived radioactive wastes. This National program is based on four principles: 1) excellent science and technical knowledge, 2) safety and security as primary goals for waste management, 3) high requirements for environment protection, 4) transparent and open-public exchanges preceding the democratic decisions and orientations by the Parliament. The research and development (R&D) activities carried out in the URL supported the design and the safety demonstration of the Cigéo project. Moreover, running the URL has provided an opportunity to gain practical experience with regard to the security of underground operations, assessment of environmental impacts, and involvement of the public in the preparation of decisions. The practices implemented have helped gradually build confidence in the Cigéo project.

A Study of M2M Platform Technologies based on REST (REST 기반 M2M 플랫폼 기술 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4153-4159
    • /
    • 2011
  • M2M can provide the bi-directional services between applications and objects which have the attached telecommunication module. It consists of the objects, platform, and (web based) applications. M2M can realize In-Transit Visibility and Asset Visibility combined with GIS. Although many applications of M2M, such as metering, monitoring, controlling, tracking et al., are being serviced, the interoperability among the M2Ms is not considered. In this paper, we described the interoperability. Specially, ROA, which is the state of art technology in mash-up, more than SOA, and URN, which is based on Open API in RESTful service, more than URL are studied. As the message protocol between platform and applications, MPM was defined.

Design and Implementation of a Web Map Server based on GML (GML 기반의 Web Map Server의 설계 및 구현)

  • 강재호;백인구;한기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.88-90
    • /
    • 2001
  • 최근 웹 확산에 따른 일반인들의 인터넷 이용이 급증하였고 이에 따른 정보 기술도 빠르게 변화하고 있다. GIS 분야에서도 시대의 흐름에 맞춰 지리정보 데이타를 웹상에서 제공하는 웹 GIS 분야가 등장하게 되었다. 그러나, 상호 이질적인 지리정보 데이타를 웹 기반 분산 환경에서 서비스하기 위해 표준 인터페이스와 각각의 웹 서비스 모델을 정의한 통합 시스템이 요구되고 있다. OGC(OpenGIS Consortium)에서는 기존 OpenGIS(Open Geodata Interoperabillty Specification)의 상호운용성을 웹 환경에서 지원하고, 또한 상호이질석인 지리정보의 접근을 위해 새로운 웹 맵 서버인터페이스 구현 명세(Web Map Server Interface Implementation Specification)를 제안하였다. 웹 맵 서버 인터페이스 구현 명세는 웹상에서 공간 질의를 처리하기 위안 URL 컴포넌트를 정의하고 있으며, URL 형식의 클라이언트 질의를 수행한 결과를 웹 브라우저에서 이미지 포맷으로 지리정보를 제공한다. 본 논문에서는 OGC가 최근 제안한 XML(eXtendible Markup Language)기반의 표준 공간 데이터 포맷인 GML(Geography Markup Language)과 웹 맵 서버 인터페이스를 이용해 분산된 지리정보 데이터를 웹 브라우서를 통하여 서비스할 수 있는 웹 맵 서버를 설계 및 구현하였다. 따라서 클라이언트는 본 논문에서 개발한 웹 맵 서버를 통하여 별도의 응용 프로그램을 개발하지 않고도 다양한 GIS 시버들의 종류와 위치에 관계없이 표준 인터페이스를 통해 이를 GIS 서버들로부터 공간 데이터를 접근할 수 있다.

  • PDF

Data Transformation through Mapping between XML and Relation Database (XML과 관계형 데이타베이스 매핑을 통한 자료의 변환)

  • Kim Gil-Choon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.5-12
    • /
    • 2004
  • The data transformation between XML and Relation Database is made through the Principle of mapping bewtween them. There are two ways to access SQL Server, one is to assign SQL query to URL and the other is to use template file. MS-SQL server takes advantage of OpenXML function to transform the results of executing SQL query into XML documents. That is, OpenXML first makes node tree and then transforms row set data of XML documents into XML data of relation type. In order to insert XML data into database data. data is extracted from parsing XML documents using sp_xml_preparedocument procedure, and then the document structure is mapped into tree structure and stored in a table of database. Consequently, Data transformation between XML and Relation Database is made through mapping bewtween them. This article proposes the principle of mapping between XML and Relation Database and then shows the implementation of transformation between them so that it introduces the possibilty of bringing the extension and efficiency of data and various effects.

  • PDF

A Study on the Development of DOI Lookup API (DOI 수집 API 개발에 관한 연구)

  • Kim, Sun-Tae;Yae, Yong-Hee
    • Journal of Information Management
    • /
    • v.39 no.1
    • /
    • pp.221-237
    • /
    • 2008
  • CrossRef provides a various queries(OpenAPIs) which can be used for DOI & meta data lookup. CrossRef encourages publishers and library societies to develop diverse system by using the queries. In this thesis, CrossRef's queries are analyzed and DOI Lookup API which could automatically lookup the DOI by various methods was developed. I proposed that how institutions having their own meta data can use the developed API.

A Study on the expansion of the Z39.88 KEVFormat:Sch-Svc for Scientific Data (과학데이터 관련 Z39.88 KEVFormat:Sch-Svc 확장 연구)

  • Kim, sun-tae;Lee, tae-young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.41-42
    • /
    • 2011
  • DataCite 메타데이터 요소를 분석하여 OpenURL 학술 서비스 유형을 기술하기 위한 메타태그를 Key/Encoded-Value (KEV) 형식으로 확장 제안하였다. 학술 서비스 유형 분석을 위해 Scopus와 Web of Science, NDSL 서비스를 비교 검토하여 8개의 학술서비스 유형을 도출하였다. 또한 과학데이터 기술을 위한 DataCite 컨소시엄의 메타데이터 요소를 집중적으로 분석하여 9개의 대표속성을 도출 하였다.

  • PDF

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

A Plagiarism Detection System for Newspaper Articles by using Web Search (웹 검색을 활용한 기사 표절 탐지 시스템)

  • Cho, Jung-Hyun;Kim, Yu-Seop
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.420-424
    • /
    • 2008
  • 최근 문서 저작권에 대한 관심과 중요도가 높아지고 있고 문서 표절에 관한 연구도 지속적으로 이루어지고 있다. 최근 기사의 표절 또는 무단도용 문제가 적지 않게 발생하고 있다. 현재까지의 문서 표절 연구는 실시간 특성이 매우 강한 신문 기사의 표절 문제에 적용하기 어려웠다. 따라서 현재는 이러한 표절 기사를 가려내기 위해 수 많은 신문사에서 하루 수천 건씩 올라오는 기사들을 눈으로 일일이 가려내는 상황이다. 본 논문에서는 이러한 시간과 비용의 문제를 줄이기 위해 네이버와 다음에서 제공하는 웹 검색 OpenAPI를 활용해 표절 가능성이 있는 기사들을 자동으로 탐지해 내는 시스템을 제안한다. 제안하는 시스템은 하나의 원본 기사에서 5개의 문장을 랜덤으로 추출하고 각각의 문장을 검색어(query)로 사용해 연동된 OpenAPI를 사용하여 웹에서 기사를 검색한다. 또한 5번의 검색에서 추출되는 URL의 검색 빈도를 계산하여 해당 기사의 표절 가능성을 사용자가 쉽게 예측 할 수 있도록 하였다.

  • PDF