• Title/Summary/Keyword: Reverse Social Engineering

Search Result 8, Processing Time 0.021 seconds

Unsupervised Scheme for Reverse Social Engineering Detection in Online Social Networks (온라인 소셜 네트워크에서 역 사회공학 탐지를 위한 비지도학습 기법)

  • Oh, Hayoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.129-134
    • /
    • 2015
  • Since automatic social engineering based spam attacks induce for users to click or receive the short message service (SMS), e-mail, site address and make a relationship with an unknown friend, it is very easy for them to active in online social networks. The previous spam detection schemes only apply manual filtering of the system managers or labeling classifications regardless of the features of social networks. In this paper, we propose the spam detection metric after reflecting on a couple of features of social networks followed by analysis of real social network data set, Twitter spam. In addition, we provide the online social networks based unsupervised scheme for automated social engineering spam with self organizing map (SOM). Through the performance evaluation, we show the detection accuracy up to 90% and the possibility of real time training for the spam detection without the manager.

A Novel Social Aware Reverse Relay Selection Scheme for Underlaying Multi- Hop D2D Communications

  • Liang Li;Xinjie Yang;Yuanjie Zheng;Jiazhi Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2732-2749
    • /
    • 2023
  • Device-to-Device (D2D) communication has received increasing attention and been studied extensively thanks to its advantages in improving spectral efficiency and energy efficiency of cellular networks. This paper proposes a novel relay selection algorithm for multi-hop full-duplex D2D communications underlaying cellular networks. By selecting the relay of each hop in a reverse manner, the proposed algorithm reduces the heavy signaling overhead that traditional relay selection algorithms introduce. In addition, the social domain information of mobile terminals is taken into consideration and its influence on the performance of D2D communications studied, which is found significant enough not to be overlooked. Moreover, simulations show that the proposed algorithm, in absence of social relationship information, improves data throughput by around 70% and 7% and energy efficiency by 64% and 6%, compared with two benchmark algorithms, when D2D distance is 260 meters. In a more practical implementation considering social relationship information, although the proposed algorithm naturally achieves less throughput, it substantially increases the energy efficiency than the benchmarks.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Seismic Imaging of Ocean-bottom Seismic Data for Finding a Carbon Capture and Storage Site: Two-dimensional Reverse-time Migration of Ocean-bottom Seismic Data Acquired in the Pohang Basin, South Korea (이산화탄소 지중저장 부지 선정을 위한 해저면 탄성파 탐사자료의 영상화: 포항 영일만 해저면 탐사자료의 2차원 역시간 구조보정)

  • Park, Sea-Eun;Li, Xiangyue;Kim, Byoung Yeop;Oh, Ju-Won;Min, Dong-Joo;Kim, Hyoung-Soo
    • Geophysics and Geophysical Exploration
    • /
    • v.24 no.3
    • /
    • pp.78-88
    • /
    • 2021
  • Owing to the abnormal weather conditions due to global warming, carbon capture and storage (CCS) technology has attracted global attention as a countermeasure to reduce CO2 emissions. In the Pohang CCS demonstration project in South Korea, 100 tons of CO2 were successfully injected into the subsurface CO2 storage in early 2017. However, after the 2017 Pohang earthquake, the Pohang CCS demonstration project was suspended due to an increase in social concerns about the safety of the CCS project. In this study, to reconfirm the structural suitability of the CO2 storage site in the Pohang Basin, we employed seismic imaging based on reverse-time migration (RTM) to analyze small-scale ocean-bottom seismic data, which have not been utilized in previous studies. Compared with seismic images using marine streamer data, the continuity of subsurface layers in the RTM image using the ocean-bottom seismic data is improved. Based on the obtained subsurface image, we discuss the structural suitability of the Pohang CO2 storage site.

An Exploratory Study on Consumer Perspectives on Food Delivery Services (외식 배달 서비스에 대한 소비자 관점 탐색적 연구)

  • JaeHoon Choi;Pansoo Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.79-85
    • /
    • 2022
  • Various non-face-to-face services are being activated due to the influence of the Corona 19 virus around the world. However, unlike the rapid development of delivery services, social awareness of delivery services is causing many problems. Therefore, in this study, we analyze the quality attributes of delivery services from the consumer's point of view, and based on the results, we try to derive a direction for service improvement. In this study, quality factors were established through interviews and surveys with actual consumers, and quality attributes were classified through the Kano model and Timko's customer satisfaction coefficient. "Attractive" is ('Ease of ordering, Accurate delivery to the designated place'), "One Dimensional" is ('Variety of payment methods, Accurate delivery on time, Accurate delivery of ordered food, Degree of non-deformation of packaging conditions, etc., Convenience of use time'), "Must be" is ('Kindness of the delivery person'), "Reverse" is ('provision of services, service response to order discrepancies'). This study has academic significance in that it compensated for the disadvantage of not being able to interpret the mathematical meaning of the Kano model with Teamco's customer satisfaction coefficient. It also has practical implications in that it provides an indirect clue to future improvement directions.

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

Development of an Analytical Method for the Determination of Dexamethasone in Bovine Milk Using Liquid Chromatography Coupled to Tandem Mass Spectrometry (LC-MS/MS를 이용한 우유 중 덱사메타손의 잔류 분석법 개발)

  • Cha, Chun-Nam;Park, Eun-Kee;Yoo, Chang-Yeul;Lee, Sung Joong;Son, Song-Ee;Kim, Suk;Lee, Hu-Jang
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.5
    • /
    • pp.418-423
    • /
    • 2017
  • An analytical method for the determination of dexamethasone (DM) in bovine milk samples was developed and validated using liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS). Milk samples were extracted by the liquid-liquid extraction based on acetonitrile. The chromatographic separation was achieved on a reverse phase $C_{18}$ column with gradient elution using a mobile phase of 0.1% formic acid in 95% acetonitrile. The procedure was validated according to the Ministry of Food and Drug Safety guideline determining accuracy, precision, limit of detection (LOD), and limit of quantification (LOQ). Mean recoveries of DM from spiked milk samples (25, 125, and 1,250 ng/mL) were 98.9-109.6%, and the relative standard deviation was between 1.7 and 4.4%. Linearity in concentration range of 12.5-1,250 ng/mL was obtained with the correlation coefficient ($r^2$) of 0.9997. LOD and LOQ for the investigated DM were 0.15 and 0.5 ng/mL depending on milk samples, respectively. This method was reliable, sensitive, economical and suitable for routine monitoring of DM residues in bovine milk.

A Study on the Combustion Flow Characteristics of a Exhaust Gas Recirculation Burner with the Change of Outlet Opening Position (배기가스 재순환 버너에서 연소가스 출구 위치에 따른 연소 유동 특성에 관한 연구)

  • Ha, Ji-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.8-13
    • /
    • 2018
  • Nitrogen oxides (NOx) have recently been very influential in the generation of ultrafine dust, which is of great social interest in terms of improving the atmospheric environment. Nitrogen oxides are generated mainly by the reaction of nitrogen and oxygen in air in a combustion gas atmosphere of high temperature in a combustion apparatus such as thermal power generation. Recently, research has been conducted on the combustion that recirculates the exhaust gas to the cylindrical burner by using a piping using a Coanda nozzle. In this study, three types of burners were carried out through computational fluid analysis. Case 1 burner with the outlet of the combustion gas to the right, Case 2 burner with both sides as gas exit, Case 3 burner with left side gas exit. The pressure, flow, temperature, combustion reaction rate and distribution characteristics of nitrogen oxides were compared and analyzed. The combustion reaction occurred in Case 1 and Case 2 burner in the right direction with combustion gas recirculation inlet and Case 3 burner in the vicinity of mixed gas inlet. The temperature at the outlet was about $100^{\circ}C$ lower than that of the other burners as the Case 2 burner was exhausted to both sides. The NOx concentration of Case 1 burner at the exit was about 20 times larger than that of the other burners. From the present study, it could be seen that it is effective for the NOx reduction to exhaust the exhaust gas to both side gas exits or to exhaust the exhaust gas to the opposite direction of inlet of recirculation gas.