메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

백용진 (경상대학교, 慶尙大學校)

지도교수
金相福
발행연도
2019
저작권
경상대학교 논문은 저작권에 의해 보호받습니다.

이용수3

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (2)

초록· 키워드

오류제보하기
The rapid development of information and communication technology has dramatically increased the number of users based on various networks. The process of sharing information is done through informat -ion services that are generally accessible to the public, although there are various methods. In addition, the information sharing process based on the portal service can promptly reflect various opinions because users can collect opinions on the information in real time. However, this sharing of information based on portal services creates stakeholders for specific service information, and they do not hesitate to illegally conduct social information that is favorable to them. Macro based attacks to gain distorted public opinion and gain illegal profits quickly create distorted public opinion on mutual information, and therefore there is an urgent need for countermeasure -s. Unauthorized users attempting a macro attack quickly obtain a large number of user accounts or different access information in order to manipulate the public opinion, and try to manipulate public opinion on the contents of a specific web page. In this paper, we deal with macro attacks in real time. For this purpose, it is possible to detect multiple accesses of a specific service requester based on traceback information.
In addition, if the access information of the specific accessor and the traceback information of the mutual sharing information occur more than once, it is determined that it is a macro attack. Also, by comparing the access path information of the accessors and the threshold count value, it is possible to cope with macros attacks that can occur collectively in a specific network in real time.

목차

1. 서 론 3
2. 관련연구 5
2.1 매크로의 기능 5
2.2 OCR의 특징 7
2.3 CAPTCHA의 기능 8
2.4 트레이스 백의 개념 10
3. 제안 모델 설계 11
4. 실험 및 평가 14
5. 결론 20
참고 문헌 21

최근 본 자료

전체보기

댓글(0)

0