• 제목/요약/키워드: Security Behavior

검색결과 898건 처리시간 0.027초

Host-Based Malware Variants Detection Method Using Logs

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.851-865
    • /
    • 2021
  • Enterprise networks in the PyeongChang Winter Olympics were hacked in February 2018. According to a domestic security company's analysis report, attackers destroyed approximately 300 hosts with the aim of interfering with the Olympics. Enterprise have no choice but to rely on digital vaccines since it is overwhelming to analyze all programs executed in the host used by ordinary users. However, traditional vaccines cannot protect the host against variant or new malware because they cannot detect intrusions without signatures for malwares. To overcome this limitation of signature-based detection, there has been much research conducted on the behavior analysis of malwares. However, since most of them rely on a sandbox where only analysis target program is running, we cannot detect malwares intruding the host where many normal programs are running. Therefore, this study proposes a method to detect malware variants in the host through logs rather than the sandbox. The proposed method extracts common behaviors from variants group and finds characteristic behaviors optimized for querying. Through experimentation on 1,584,363 logs, generated by executing 6,430 malware samples, we prove that there exist the common behaviors that variants share and we demonstrate that these behaviors can be used to detect variants.

디지털 엑스선 기술과 응용 (Digital X-Ray Technology and Applications)

  • 정진우;강준태;김재우;박소라;이명래;송윤호
    • 전자통신동향분석
    • /
    • 제34권5호
    • /
    • pp.1-13
    • /
    • 2019
  • In modern times, X-ray imaging has become a necessary tool for early diagnosis, quality control, nondestructive testing, and security screening. X-ray imaging equipment generally comprises an X-ray generator and an image sensor. Most commercially available X-ray generators employ filament-thermionic electron-based X-ray tubes, thus demonstrating typical analog behavior, such as slow response and large stray X-rays. Furthermore, digital X-ray sources, which have been studied extensively using field electron emitters manufactured from nanometer-scale materials, provide fast and accurately controlled ultra-shot X-rays. This could usher in a new era of X-ray imaging in medical diagnosis and nondestructive inspections. Specifically, digital X-ray sources, with reduced X-ray dose, can significantly improve the temporal and spatial resolution of fluoroscopy and computed tomography. Recently, digital X-ray tube technologies based on carbon nanotubes, developed by Electronics and Telecommunications Research Institute, have been transferred to several companies and commercialized for dental imaging for the first time.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

공동주택 거주자의 공유공간 인식에 대한 조사 연구 (A Study on the Resident Recognition of Common Space in Apartment)

  • 한민승;황희준
    • 대한건축학회논문집:계획계
    • /
    • 제35권4호
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

Analysis methodology of local damage to dry storage facility structure subjected to aircraft engine crash

  • Almomani, Belal;Kim, Tae-Yong;Chang, Yoon-Suk
    • Nuclear Engineering and Technology
    • /
    • 제54권4호
    • /
    • pp.1394-1405
    • /
    • 2022
  • The importance of ensuring the inherent safety and security has been more emphasized in recent years to demonstrate the integrity of nuclear facilities under external human-induced events (e.g. aircraft crashes). This work suggests a simulation methodology to effectively evaluate the impact of a commercial aircraft engine onto a dry storage facility. A full-scale engine model was developed and verified by Riera force-time history analysis. A reinforced concrete (RC) structure of a dry storage facility was also developed and material behavior of concrete was incorporated using three constitutive models namely: Continuous Surface Cap, Winfrith, and Karagozian & Case for comparison. Strain-based erosion limits for concrete were suitably defined and the local responses were then compared and analyzed with empirical formulas according to variations in impact velocity. The proposed methodology reasonably predicted such local damage modes of RC structure from the engine missile, and the analysis results agreed well with the calculations of empirical formulas. This research is expected to be helpful in reviewing the dry storage facility design and in the probabilistic risk assessment considering diverse impact scenarios.

The Effect of Design Quality on Hedonic Search, Utilitarian Search and Impulse Buying in Distribution Market

  • BUDIMAN, Santi;PALUPI, Majang;HARYONO, Tulus;UDIN, Udin
    • 유통과학연구
    • /
    • 제20권5호
    • /
    • pp.49-64
    • /
    • 2022
  • Purpose: This research aims to determine the quality of online store designs that make consumers who use online market board applications have the urge to make impulse buying. This research was conducted because impulse buying is the most common buying behavior. Research design, data and methodology: This research used non-probability sampling. The sample size was 195 respondents from the distribution and service industries by applying a purposive sampling technique. The data collection technique employed a questionnaire distributed online according to predetermined criteria: mobile device users who accessed the online market board application and made at least one purchase in the last six months. The data analysis method utilized was structural equation modeling (SEM). Results: The findings revealed that usability, functionality, and sociability factors affected hedonic and utilitarian search. Furthermore, these findings proved that hedonic search affected impulse buying drives. In contrast, the utilitarian search did not affect impulse buying drives. Conclusions: The usability, functionality, and sociability factors supported hedonic and utilitarian searches. Consumer information security increased consumer confidence in an online store because it was considered to protect matters related to their privacy. The hedonic search also increased impulse buying drives. Consumers prefer to use their spare time to search through online market board applications, which provide many attractive promos.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

TadGAN 기반 시계열 이상 탐지를 활용한 전처리 프로세스 연구 (A Pre-processing Process Using TadGAN-based Time-series Anomaly Detection)

  • 이승훈;김용수
    • 품질경영학회지
    • /
    • 제50권3호
    • /
    • pp.459-471
    • /
    • 2022
  • Purpose: The purpose of this study was to increase prediction accuracy for an anomaly interval identified using an artificial intelligence-based time series anomaly detection technique by establishing a pre-processing process. Methods: Significant variables were extracted by applying feature selection techniques, and anomalies were derived using the TadGAN time series anomaly detection algorithm. After applying machine learning and deep learning methodologies using normal section data (excluding anomaly sections), the explanatory power of the anomaly sections was demonstrated through performance comparison. Results: The results of the machine learning methodology, the performance was the best when SHAP and TadGAN were applied, and the results in the deep learning, the performance was excellent when Chi-square Test and TadGAN were applied. Comparing each performance with the papers applied with a Conventional methodology using the same data, it can be seen that the performance of the MLR was significantly improved to 15%, Random Forest to 24%, XGBoost to 30%, Lasso Regression to 73%, LSTM to 17% and GRU to 19%. Conclusion: Based on the proposed process, when detecting unsupervised learning anomalies of data that are not actually labeled in various fields such as cyber security, financial sector, behavior pattern field, SNS. It is expected to prove the accuracy and explanation of the anomaly detection section and improve the performance of the model.

Qualitative Content Analysis: Solutions for Tourism Industry to Overcome the Crisis in a Post-Covid 19 era

  • LEE, Soo-Hee
    • 산경연구논집
    • /
    • 제13권9호
    • /
    • pp.27-36
    • /
    • 2022
  • Purpose: The coronavirus pandemic has affected the tourism industry in a big way. The travel industry suffered intense damage from the pandemic and procedures acquainted to containing its spread because the pandemic outbreak has led to a decline in the number of tourists and a change in their behavior. At this point, this research is to investigate adequate solutions for tourism industry to overcome the crisis in a post-Covid 19 era. Research design, data and methodology: The current author gathered data from each included study to analyze and summarize the evidence when conducting a literature analysis. This stage involves gathering and reviewing intricate texts databases for the meta-analysis. Results: The current author found total five solutions from numerous literature contents, suggesting how to overcome the crisis in a post-Covid era for tourism industry. Solutions as follows, (1) Drawing beginning illustrations, (2) Introducing Government Backing Programs, (3) Increasing Promotion of Tourism Destinations, (4) Enhancing Safety and Security Measures, and (5) Improving Infrastructure and Facilities. Conclusions: This research suggests that although the global economic recession leads to reduced demand and intense competition from other sectors, the tourism industry will be well positioned to weather these challenges if practitioners of tourism organizations follow five solutions of this research.

Blockchain Framework for Occupant-centered Indoor Environment Control Using IoT Sensors

  • Jeoung, Jaewon;Hong, Taehoon;Jung, Seunghoon;Kang, Hyuna;Kim, Hakpyeong;Kong, Minjin;Choi, Jinwoo
    • 국제학술발표논문집
    • /
    • The 9th International Conference on Construction Engineering and Project Management
    • /
    • pp.385-392
    • /
    • 2022
  • As energy-saving techniques based on human behavior patterns have recently become an issue, the occupant-centered control system is adopted for estimating personal preference of indoor environment and optimizing environmental comfort and energy consumption. Accordingly, IoT devices have been used to collect indoor environmental quality (IEQ) data and personal data. However, the need to safely collect and manage data has been emerged due to cybersecurity issues. Therefore, this paper aims to present a framework that can safely transmit occupant-centered data collected from IoT to a private blockchain server using Hyperledger fabric. In the case study, the minimum value product of the mobile application and smartwatch application was developed to evaluate the usability of the proposed blockchain-based occupant-centered data collection framework. The results showed that the proposed framework could collect data safely and hassle-free in the daily life of occupants. In addition, the performance of the blockchain server was evaluated in terms of latency and throughput when ten people in a single office participated in the proposed data collection framework. Future works will further apply the proposed data collection framework to the building management system to automatically collect occupant data and be used in the HVAC system to reduce building energy consumption without security issues.

  • PDF