• Title/Summary/Keyword: Social Threat

Search Result 246, Processing Time 0.026 seconds

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

Methodology of Extraction of Crime Vulnerable Areas Through Grid-based Analysis (격자망분석을 통한 범죄발생 취약지역 추출 기법)

  • Park, Jin Yi;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.4
    • /
    • pp.221-229
    • /
    • 2015
  • The urban crimes that threat individual's safety are parts of the serious social problems. However. the information of crime in Korea has only been provided by forms of hot spots around place of crime, or forms of crime statistics without positional information. Those could not provide enough information to users in identifying the vulnerable areas for substantive crimes. Therefore, this study suggested a methodology of extraction in criminal vulnerable areas by using the spatial information, the statistical information and the public sector information. The crime vulnerable areas were extracted through the grid-based spatial analysis and the overlapping analysis from each of the information. In fact, the extracted areas were able to provide detailed vulnerability information than the traditional hot spot-based crime information. Following the study, the extracted results in crime vulnerable areas have displayed highly coincide with Korea safety map, provided by national disaster management institute, which regards to be able to provide crime risk rating in terms of administrative business in future.

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

VPN-Filter Malware Techniques and Countermeasures in IoT Environment (사물인터넷 환경에서의 VPN-Filter malware 기술과 대응방법)

  • Kim, Seung-Ho;Lee, Keun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.231-236
    • /
    • 2018
  • Recently, a wide variety of IoT environment is being created due to the rapid development of information and communication technology. And accordingly in a variety of network structures, a countless number of attack techniques and new types of vulnerabilities are producing a social disturbance. In May of 2018, Talos Intelligence, the Cisco threat intelligence team has newly discovered 'VPN-Filter', which constitutes a large-scale IoT-based botnet, is infecting consumer routers in over 54 countries around the world. In this paper, types of IoT-based botnets and the attack techniques utilizing botnet will be examined and the countermeasure technique through EXIF metadata removal method which is the cause of connection method of C & C Server will be proposed by examining the characteristics of attack vulnerabilities and attack scenarios of VPN-Filter.

A Survey of Parents Perceptions of Home Exercise Program for Children with Disabilities Caused by COVID-19 (COVID-19로 인한 장애 아동의 가정운동 프로그램에 관한 부모들의 인식 조사)

  • Park, Cheol-Man;Kim, Myung-Chul
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.9 no.4
    • /
    • pp.225-235
    • /
    • 2021
  • Purpose: Since coronavirus disease 2019 (COVID-19) spread around the world, non-face-to-face services have emerged as the new normal. The functioning of children with developmental disabilities and cerebral palsy improves when parents, therapists, and institutions cooperate. We aimed to investigate the difficult environment of pediatric physical therapy caused by COVID-19, and grasp parents' perceptions of home exercise programs. We intend to design home exercise programs for pediatric treatment in the future and create a non-face-to-face pediatric rehabilitation service system based on our findings. Methods: The first survey was conducted on 30 parents who had children with cerebral palsy and developmental disabilities. It was produced after consultation with relevant experts and discussion with the research team, based on a survey conducted in a previous study. The second survey was produced by revising and supplementing the opinions of parents who completed the first survey and consulting experts. Thereafter, an online survey was conducted on 118 parents who had children with cerebral palsy and developmental disabilities. Results: 61.01 % of the parents reported that they were anxious or afraid for their children to be treated for infectious diseases. 83.90 % of the parents reported that the role of parents had increased. 50.00 % of the parents complained of a lack of skill. 85.59 % of the parents reported that they needed a home exercise program provided by the organization. As a non-face-to-face exercise management method, 35.59 % of the parents wanted a real-time video recording electronically mailed to them, and 34.75 % wanted real-time education using video conferencing programs such as zoom. Conclusion: The threat of COVID-19 has further emphasized the importance of social cooperation and management, leading organizations to enter a new era of non-face-to-face rehabilitation services. It is necessary to collect and systematize related studies to reflect more diverse opinions and improve the perceptions of therapists and parents.

COVID-19 International Collaborative Research by the Health Insurance Review and Assessment Service Using Its Nationwide Real-world Data: Database, Outcomes, and Implications

  • Rho, Yeunsook;Cho, Do Yeon;Son, Yejin;Lee, Yu Jin;Kim, Ji Woo;Lee, Hye Jin;You, Seng Chan;Park, Rae Woong;Lee, Jin Yong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.8-16
    • /
    • 2021
  • This article aims to introduce the inception and operation of the COVID-19 International Collaborative Research Project, the world's first coronavirus disease 2019 (COVID-19) open data project for research, along with its dataset and research method, and to discuss relevant considerations for collaborative research using nationwide real-world data (RWD). COVID-19 has spread across the world since early 2020, becoming a serious global health threat to life, safety, and social and economic activities. However, insufficient RWD from patients was available to help clinicians efficiently diagnose and treat patients with COVID-19, or to provide necessary information to the government for policy-making. Countries that saw a rapid surge of infections had to focus on leveraging medical professionals to treat patients, and the circumstances made it even more difficult to promptly use COVID-19 RWD. Against this backdrop, the Health Insurance Review and Assessment Service (HIRA) of Korea decided to open its COVID-19 RWD collected through Korea's universal health insurance program, under the title of the COVID-19 International Collaborative Research Project. The dataset, consisting of 476 508 claim statements from 234 427 patients (7590 confirmed cases) and 18 691 318 claim statements of the same patients for the previous 3 years, was established and hosted on HIRA's in-house server. Researchers who applied to participate in the project uploaded analysis code on the platform prepared by HIRA, and HIRA conducted the analysis and provided outcome values. As of November 2020, analyses have been completed for 129 research projects, which have been published or are in the process of being published in prestigious journals.

South Korean State-Building, Nationalism and Christianity: A Case Study of Cold War International Conflict, National Partition and American Hegemony for the Post-Cold War Era

  • Benedict E. DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.277-296
    • /
    • 2023
  • The South Korean ethnic diaspora US lobby shows efficacy as an interest group in generating influence in American foreign and domestic public policy making. The persuasive portrayal of South Korea as a critical Cold War US ally reinforced US amenability to pro-South Korea lobbying. Also, the South Korean US diaspora is a comparatively recent immigrant group, thus its lingering resistance to assimilation facilitates its political mobilization to lobby the US government. One source of this influence includes the foundational legacy of proselytizing Western and particularly American religious social movement representatives in Korean religiosity and society. US protestant Christianity acquired a strong public association with emerging Korean nationalism in response to Japanese imperialism and occupation. Hostility towards Japanese colonialism followed by the threat from Soviet-sponsored, North Korean Communism meant Christianity did not readily become a cultural symbol of excessive external, US interference in South Korean society by South Korean public opinion. The post-Cold War shift in US foreign policy towards targeting so-called rogue state vestiges of the Cold War including North Korea enhanced further South Korea's influence in Washington. Due to essential differences in the perceived historical role of American influence, extrapolation of the South Korean development model is problematic. US hegemony in South Korea indicates that perceived alliance with national self-determination constitutes the core of soft power appeal. Civilizational appeal per se in the form of religious beliefs are not critically significant in promoting American polity influence in target polities in South Korea or, comparatively, in the Middle East. The United States is a perceived opponent of pan-Arab nationalism which has trended towards populist Islamic religious symbolism with the failure of secular nationalism. The pronounced component of evangelical Christianity in American core community nationalism which the Trump campaign exploited is a reflection of this orientation in the US.

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.