• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.028 seconds

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Quality Evaluation for Usability of Internet Shopping Mall (인터넷 쇼핑몰 사용성에 대한 품질평가)

  • Lee, Myung-Sook;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.59-68
    • /
    • 2007
  • The purpose of this paper is to evaluate usability quality through investigating the factors of usability for internet shopping mall websites. For this study, previous studies were investigated and experts' discussions were held. In result, six characters of usability were chosen such as content satisfaction. customer attraction satisfaction, price information satisfaction, public security satisfaction, user interface satisfaction. and process of transaction satisfaction that affect usability of shopping mall websites and the evaluation models of 72 detailed measure factors were established. Since these 72 sub-factors inc)ode the key words of HTML, XML, JSP, and ASP from the target websites. 33 measurable sub-factors in the information were measured through usability evaluation experiment. In addition, a questionnaire about usability measure factors was executed after preferable websites and not preferable websites are selected. After that, we verified the reasonability of usability measure model factors comparing the results of the evaluation experiment with the result of the questionnaire. The time it takes to measure the usability of shopping mall websites can be reduced by using this measurement supporting tool. Also, this tool may be used to estimate the usability during the development of a shopping mall website.

  • PDF

Comparison on the Time series of Housing Viewpoint of University Student (대학생 주거관의 시계열적 비교)

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

A study on the navigation message contents of the future Korean navigation satellite (미래 한국형 항법위성을 위한 위성항법메세지에 대한 연구)

  • Jo, Jung-Hyun;Lee, Woo-Kyoung;Choe, Nam-Mi;Baek, Jeong-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.108-115
    • /
    • 2012
  • Many studies relating the satellite navigation has been done by a relatively small research community in Korea. Most of domestic research has been focused on the application of the satellite navigation technology, but recently the topics of the next generation satellite navigation system are emphasized for its importance. Even opinions suggesting a future Korea's own satellite navigation system are not that uncommon. Due to the geographic, economic, and technological reasons, it is not widely discussed yet. However, a development technical roadmap regarding the Korea's own navigation satellite was established on the Korea Space Development Plan in general term. Currently four global navigation satellite systems are operating or being deployed. Several regional navigation satellite systems are in planning and development phase. Particularly in Asia, China has launched several satellites to complete their own global navigation satellite system, COMPASS until 2020. Japan launched one satellite and has planned to launch rest of set until 2013. It is proper time to develop Korea's own navigation satellite system to acquire the domestic space development technology and the security of navigational infrastructure. In this study, the validity or the feasibility of the Korea's own satellite navigation system is not discussed; rather the possibility and suitability of the additional information to the current operational navigation message is main target. For the first payload of the future Korea's satellite navigation satellite, a regional augmented system is more likely. This study also is focused on that aspect.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

A Study on the Application of Welfare Service Type on the Basis of the Tenants Needs and Locational Characteristics in Each Housing (단지별 거주자의 요구 및 입지특성에 따른 복지 서비스 유형 적용에 관한 연구)

  • Roh, Sang-Youn;Yoon, Young-Ho;Cho, Young-Tae;Lee, Ji-Eun;Cho, Yong-Kyung
    • Land and Housing Review
    • /
    • v.3 no.2
    • /
    • pp.137-146
    • /
    • 2012
  • Within twenty years, Permanent Affordable Housing provided for people's security of housing in late 1980's yields the principles of equity with tenant's in new one supplied, thus being confronted by the requirements that existing welfare service for tenants should be improved. Reflecting on these, this study means to prepare the basic data for the welfare policy as applying welfare service types on basis of housing locational characteristics, tenants tier compared with welfare service needs of permanent affordable housing tenants. For achieving this aim, the range and mixed use mechanism of welfare service are investigated as reviewing the related research and findings. Based on this investigation, 7 types of welfare service(Independence, Half-support, Child care, Juvenile, Self-support, Social-mix, and Single household) are established. On the analysis of survey, the welfare service needs are investigated as grouping with locational characteristics and survey target. In addition, the welfare service types are reorganized by analysis of tenant's demographic and locational characteristic on each housing and are compared with tenants needs. Although, the demographic of permanent affordable housing generally shows that the tenants are constituted with aged people, the housing with high ratio of children and juvenile can be applied with Child Care type and Juvenile type. As a result of comparison, the ratio of independence type, juvenile type, and single household type are more on the large housing and housing on metropolitan area, and the ratio of half-support type and child care type are more on the small housing and housing on small city area.

The Problems in Digital Watermarking into Intra-Frames of H.264/AVC (H.264-기반 인트라 프레임의 디지털 워터마킹 문제)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.233-242
    • /
    • 2009
  • This paper intend to show the affect of the intra-prediction on the typical digital watermarking method and the fact that the watermarking method has very low effectiveness when it is performed for the intra-frames of H.264. The target watermarking method was the one for imperceptibility and robustness and was assumed to be performed during the intra-compression process by the H.264 technique. Also this method was assumed to insert watermark data and to extract it for certification if needed. The problem is that the resulting data from the re-engineering of the watermark insertion process to extract the watermark data is different from the one before. We experimentally showed that it stems from the intra-prediction itself. That is, we showed that the resulting image data from only compression without watermarking changes if it is re-compressed by the same conditions as the first compression and it is because the intra-prediction modes as well as the coefficient values change. Also, we applied one blind and one semi-blind watermarking methods to show that the typical attacks after watermarking makes this problem much more serious and lowers the effectiveness of the watermarking method dramatically. Therefore we concluded by considering the experimental data that a typical watermarking method which has been researched so far cannot guarantee the effectiveness of intra-frame watermarking and it is highly required to developed a new kind of methodologies.

A Review of Change Detection Techniques using Multi-temporal Synthetic Aperture Radar Images (다중시기 위성 레이더 영상을 활용한 변화탐지 기술 리뷰)

  • Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_1
    • /
    • pp.737-750
    • /
    • 2019
  • Information of target changes in inaccessible areas is very important in terms of national security. Fast and accurate change detection of targets is very important to respond quickly. Spaceborne synthetic aperture radar can acquire images with high accuracy regardless of weather conditions and solar altitude. With the recent increase in the number of SAR satellites, it is possible to acquire images with less than one day temporal resolution for the same area. This advantage greatly increases the availability of change detection for inaccessible areas. Commonly available information in satellite SAR is amplitude and phase information, and change detection techniques have been developed based on each technology. Those are amplitude Change Detection (ACD), Coherence Change Detection (CCD). Each algorithm differs in the preprocessing process for accurate automatic classification technique according to the difference of information characteristics and the final detection result of each algorithm. Therefore, by analyzing the academic research trends for ACD and CCD, each technologies can be complemented. The goal of this paper is identifying current issues of SAR change detection techniques by collecting research papers. This study would help to find the prerequisites for SAR change detection and use it to conduct periodic detection research on inaccessible areas.