• Title/Summary/Keyword: anti-virus system

Search Result 99, Processing Time 0.03 seconds

A Review on Korean Traditional Medicine Research against Cervical Dysplasia - Focused on Studies of Cervical Cancer and Cervical Dysplasia- (자궁경부 이형증과 관련한 한의약 연구 고찰 - 자궁경부암 및 자궁경부 이형증 논문을 중심으로 -)

  • Yoo, Jeong-Eun;Lee, Ji-Yeon;Yoon, Young-Jin
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.26 no.4
    • /
    • pp.191-203
    • /
    • 2013
  • Purpose: This review is to figure out evidence that suggest effectiveness of Korean Medicine treatments against cervical dysplasia. Methods: Studies on cervical cancer and cervical dysplasia were searched through 6 databases: Korean Studies Information Service System(KISS), National Discovery for Science Leaders (NDSL), Korea Institute of Science and Technology Information (Korean TK), Oriental Medicine Advanced Searching Integrated System (OASIS), the Journal of Korean Medicine, and the Journal of Korean Obstetrics & Gynecology. After that, the articles were extracted with reference point of Korean Traditional Medicine. Results: 37 articles were included lastly according to selection criteria. 3 of them were case reports on cervical dysplasia, and 34 were in-vitro studies on Human Papilloma Virus (HPV) positive cancer cell. In case reports, acupuncture, moxibustion, medical herbs and pharmacoacupuncture were used for treatments of cervical dysplasia with about 3 months. Experimental studies on cervical cancer cell showed that several herbs function with clear heat, eliminate stasis (淸熱解毒, 化瘀消腫) have anti-cancer effects inducing apoptosis. Conclusions: The results of articles are not enough to use in practice. Therefore, we indicates more advanced research methodology as follows: development of Korean Medicine treatment protocol with oral and external, in-vivo experimental study, and evaluation immunity index.

Expression of Inflammatory Cytokines by Beta-glucan in Macrophage Cell Line (대식세포주에서 베타-글루칸에 의한 염증성 사이토카인의 발현)

  • Kim, Mi-Jeong;Ryu, Han-Wook;Cho, Gye-Hyung;Kim, Ha-Won
    • YAKHAK HOEJI
    • /
    • v.52 no.1
    • /
    • pp.73-78
    • /
    • 2008
  • Immune system can protect host attacking from a variety of microorganism and virus through innate and adaptive immunities. The innate immune system can be activated by recognition of conserved carbohydrates on the cell surface of pathogen resulting in protection, immunity regulation and inflammation. Immunostimulating and anti-tumor ${\beta}$-glucan, major cell wall component of many fungi, could be recognized as pathogen associated molecular pattern (PAMP) by C-type lectin such as pathogen recognition receptor (PRR) of host innate immunity cells. In spite of many studies of basidiomycetes ${\beta}$-glucan on immunostimulation, little is known about the precise mechanism as molecular-level. Among C-type lectins, dectin-1 was cloned and reported as a ${\beta}$-glucan receptor. In this report, we demonstrated induction of cytokine gene transcription by Ganoderma lucidum ${\beta}$-glucan in the absence or presence of lipopolysaccharide (LPS) by RT-PCR analysis. The expression of murine dectin-1 (MD-1) on RAW264.7 macrophage by RT-PCR showing both the full length, 757 bp $(MD-1{\alpha})$ and alternative spliced form, 620 bp $(MD-1{\beta})$. Both $MD-1{\alpha}$ and $MD-1{\beta}$ mRNAs were induced by ${\beta $-glucan both in the absence and presence of LPS. To explore expression of inflammatory cytokines by ${\beta}$-glucan, RAW264.7 cells were treated with ${\beta}$-glucan for 12 hours. As a result, the expressions of IL-1 IL-6, IL-l0 and $TNF-{\alpha}$ were increased by ${\beta}$-glucan treatment in a dose-dependent fashion. From these results, ${\beta}$-glucan induced transcriptions of dectin-1 and immune activating cytokine genes, indicating induction of immune allertness by expressing dectin-1 and secreting inflammatory cytokines.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

Purification and Characterization of HCV RNA-dependent RNA Polymerase from Korean Genotype 1b Isolate: Implications for Discovery of HCV Polymerase Inhibitors

  • Kim, Jeong-Min;Lee, Mi-Kyoung;Kim, Yong-Zu
    • Bulletin of the Korean Chemical Society
    • /
    • v.26 no.2
    • /
    • pp.285-291
    • /
    • 2005
  • The nonstructural protein 5B (NS5B) of hepatitis C virus (HCV) is the viral RNA-dependent RNA polymerase (RdRp), which is the essential catalytic enzyme for the viral replication and is an appealing target for the development of new therapeutic agents against HCV infection. A small amount of serum from a single patient with hepatitis C was used to get the genome of a Korean HCV isolate. Sequence analysis of NS5B 1701 nucleotides showed the genotype of a Korean isolate to be subtype 1b. The soluble recombinant HCV NS5B polymerase lacking the C-terminal 24 amino acids was expressed and purified to homogeneity. With the highly purified NS5B protein, we established in vitro systems for RdRp activity to identify potential polymerase inhibitors. The rhodanine family compounds were found to be potent and specific inhibitors of NS5B from high throughput screening (HTS) assay utilizing the scintillation proximity assay (SPA) system. The binding mode of an inhibitor was analyzed by measuring various kinetic parameters. Lineweaver-Burk plots of the inhibitor suggested it binds not to the active site of NS5B polymerase, but to an allosteric site of the enzyme. The activity of NS5B in in vitro polymerase reactions with homopolymeric RNA requires interaction with multiple substrates that include a template/primer and ribonucleotide triphosphate. Steady-state kinetic parameter, such as Km, was determined for the ribonucleotide triphosphate. One of compounds found interacts directly with the viral polymerase and inhibits RNA synthesis in a manner noncompetitively with respect to UTP. Furthermore, we also investigated the ability of the compound to inhibit NS5B-directed viral RNA replication using the Huh7 cell-based HCV replicon system. The investigation is potentially very useful for the utility of such compounds as anti-hepatitic agents.

Photoaffinity Labelling of the Human Erythrocyte Glucose Transporters Expressed in Spodoptera frugiperda Clone 9 (Sf9) Cells

  • Lee, Chong-Kee
    • Biomedical Science Letters
    • /
    • v.8 no.4
    • /
    • pp.211-215
    • /
    • 2002
  • The baculovirus/Sf9 cell expression can be employed as a powerful system for producing large amounts of the human erythrocyte glucose transporter, GLUT1 heterologously In order to exploit the system further, it is necessary to develop a convenient method for demonstrating that the transporter expressed in insect cells is biologically active. To achieve this, we have expressed the human CLUT1 in insect cells and photolabelled the expressed protein with [$^3$H] cytochalasin B, a potent inhibitor of the human erythrocyte glucose transporter. Subsequently, the labelled proteins were analysed by SDS-polyacrylamide gel electrophoresis (SDS-PAGE). Membranes labelled with [$^3$H] cytochalasln B in the presence of L-Glucose yielded a single sharp peak of labelling of apparent $M_r$ 45,000 on SDS/polyacrylamide gels. The mobility of this peak corresponded exactly to that of the band detected by anti-glucose transporter antibodies on Western blots of membranes prepared from insect cells infected with recombinant virus. In addition, the sharpness of the radioactive peak provides further evidence for the conclusion that the expressed protein is much less heavily and heterogeneously glycosylated than its erythrocyte counterpart. No peak of labelling was seen with the membranes prepared from non-infected Sf9 cells. Furthermore, the incorporation of label into this peak was completely inhibited by the presence of 500 mM-D-Glucose during tile photolabelling procedure, showing the stereoselectivity of the labelling. These evidences clearly show that human glucose transporter expressed in insect cells exhibits native-like biological activity, and that photolabelling with [$^3$H] cytochalasin B can be a convenient means for analysing the biological activity of the transport protein expressed in insect cells.

  • PDF

Classification of Malicious Web Pages by Using SVM (SVM을 활용한 악성 웹 페이지 분류)

  • Hwang, Young-Sup;Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.77-83
    • /
    • 2012
  • As web pages provide various services, the distribution of malware via the web pages is being also increased. Malware can make personal information leak, system mal-function and system be zombie. To protect this damages, we should block the malicious web pages. Because the malicious codes embedded in web pages are obfuscated or transformed, it is difficult to detect them using signature-based approaches which are used by current anti-virus software. To overcome this problem, we extracted features to classify malicious web pages and benign ones by analyzing web pages. And we propose a classification method using SVM which is widely used in machine learning. Experimental results show that the proposed method is better than other methods. The proposed method could classify malicious web pages correctly and be helpful to block the distribution of malicious codes.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti (윈도우즈 라이브러리로 위장한 Proxy DLL 악성코드 탐지기법에 대한 연구 : Winnti 사례를 중심으로)

  • Koo, JunSeok;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1385-1397
    • /
    • 2015
  • The Proxy DLL is a mechanism using a normal characteristics of Windows. Specific malware is executed via this mechanism after intrusion into a system which is targeted. If a intrusion of malware is successful, malware should be executed at least once. For execution, malware is disguised as a Windows Library. The malware of Winnti group is a good case for this. Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab. Winnti group activities was negatively over the years to target the online video game industry, in this process by making a number of malware infected the online gaming company. In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case. The experiments that are undertaken to target real malware of Winnti show reliability of detection techniques.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

Keywords Network Analysis of Articles in the North Korean Journal of Preventive Medicine $1997{\sim}2006$ (북한예방의학회지 ($1997{\sim}2006$) 게재논문의 핵심어 네트워크 분석)

  • Jung, Min-Soo;Chung, Dong-Jun;Choi, Man-Kyu
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.6
    • /
    • pp.365-372
    • /
    • 2008
  • Objectives : There are very few researches on North Korea's academic activities. Furthermore, it is doubtful that the available data are reliable. This study investigated research activities and knowledge structure in the field of Preventive Medicine in North Korea with a network analysis using co-authors and keywords. Methods : The data was composed of the North Korean Journal of preventive medicine ranged from Vol. 1 of 1997 to Vol. 4 of 2006. It was the matrix of 1,172 articles by 1,567 co-authors. We applied R procedure for keywords abstraction, and then sought for the outcome of network forms by spring-KK and shrinking network. Results : To comprehend the whole networks explicitly demonstrated that the academic activities in North Korea s preventive medicine were predisposed to centralization as similar as South Korea's, but on the other aspect they were prone to one-off intermittent segmentation. The principal co-author networks were formulated around some outstanding medical universities seemingly in addition to possible intervention by major researchers. The knowledge structure of network was based on experimentation judging from keywords such as drug, immunity, virus detection, infection, bacteria, anti-inflammation, etc. Conclusions : Though North Korea is a socialist regime, there were network of academic activities, which were deemed the existence of inducive mechanism affordable for free research. Article keywords has laid greater emphasis on experiment-based bacterial defection, sustainable immune system and prevention of infection. The kind of trend was a consistent characteristic in preventive medicine of North Korea haying close correlation with Koryo medical science.