• Title/Summary/Keyword: 식별 시스템

Search Result 2,521, Processing Time 0.031 seconds

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Collaboration and Node Migration Method of Multi-Agent Using Metadata of Naming-Agent (네이밍 에이전트의 메타데이터를 이용한 멀티 에이전트의 협력 및 노드 이주 기법)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.105-114
    • /
    • 2004
  • In this paper, we propose a collaboration method of diverse agents each others in multi-agent model and describe a node migration algorithm of Mobile-Agent (MA) using by the metadata of Naming-Agent (NA). Collaboration work of multi-agent assures stability of agent system and provides reliability of information retrieval on the distributed environment. NA, an important part of multi-agent, identifies each agents and series the unique name of each agents, and each agent references the specified object using by its name. Also, NA integrates and manages naming service by agents classification such as Client-Push-Agent (CPA), Server-Push-Agent (SPA), and System-Monitoring-Agent (SMA) based on its characteristic. And, NA provides the location list of mobile nodes to specified MA. Therefore, when MA does move through the nodes, it is needed to improve the efficiency of node migration by specified priority according to hit_count, hit_ratio, node processing and network traffic time. Therefore, in this paper, for the integrated naming service, we design Naming Agent and show the structure of metadata which constructed with fields such as hit_count, hit_ratio, total_count of documents, and so on. And, this paper presents the flow of creation and updating of metadata and the method of node migration with hit_count through the collaboration of multi-agent.

The Study on the Metadata Elements to Develop KORMARC Datafield for Archives (기록물용 KORMARC 데이터필드 개발을 위한 메타데이터 요소에 관한 연구)

  • Park, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.3 s.57
    • /
    • pp.351-378
    • /
    • 2005
  • The study intended to develop KORMARC for archives in order to integrate archives with library materials. The results of the study can be summarized as follows; (1) 2 areas for conservation and physical description are added to the existing 7 areas of ISAD(G)2. The study has also proved that the existing 26 elements of ISAD(G)2 are not fully enough to satisfy the information demands' of institutions and its users as well. (2) For the use of domestic archives in particular, the study has added the description elements of archives that appeared in the Government Regulations of Office Management and those forms of documents that are specified by law for the sake of computerization. The study has added the possible release and grade, release dates, release range, conservation periods, conservation periods, conservation value, the status description of archives elements that are specified in Public Record Management Law. (3) The study has developed the following data fields to be added into KORMARC. 512 creation dates note, 555 finding aids note, 583 action note and 584 accumulation note. Also it reorganizes and adds the indicators of the 245 title statement, 300 physical description 306 playing time, 506 restriction on access note, 534 original version note, 535 location of originals/duplicates note, 540 terms governing use and reproduction notes, 541 immediate source of acquisition note, 545 biographical or historical note, 581 publication note, 850 holding institution data fields.

A Study for Optimization of Armed Flight Test Ammunition Requirement for the Development of Attack Helicopter (공격헬기 개발을 위한 무장 비행시험 탄약발수 최적화 연구)

  • Lee, Myeong-Seok;Hur, Jang-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.147-153
    • /
    • 2020
  • Developments in aircraft require safety verification through flight testing for many hours with prototype design and production. The test evaluation step of performing flight tests was an important process that determines the success in the development of the system. In particular, safety development through flight tests in the armed flight test is important for the development of attack helicopters. In the development of attack helicopters, the evaluation period and cost related to the armed flight test are closely related to the required ammunition requirement. Therefore, this paper presents the amount of ammunition required for the military flight test between attack helicopter developments through an analysis of the AH-1 helicopter in a similar case and ADS-44-HDBK of military specification. The AH-1 can be used to calculate the ammunition demand by considering the exclusion of redundant firing tests and configuration differences. In the case of the machine gun-equipped configuration, approximately 10,500R was required, and approximately 324R was required in the case of a rocket-mounted configuration. In addition, if the armed integrated bench is used properly, it is expected to promote efficiently the flight test in the armed flight by identifying the possible risk factors with armed flight tests and excluding them.

An Adaptive Multi-Level Thresholding and Dynamic Matching Unit Selection for IC Package Marking Inspection (IC 패키지 마킹검사를 위한 적응적 다단계 이진화와 정합단위의 동적 선택)

  • Kim, Min-Ki
    • The KIPS Transactions:PartB
    • /
    • v.9B no.2
    • /
    • pp.245-254
    • /
    • 2002
  • IC package marking inspection system using machine vision locates and identifies the target elements from input image, and decides the quality of marking by comparing the extracted target elements with the standard patterns. This paper proposes an adaptive multi-level thresholding (AMLT) method which is suitable for a series of operations such as locating the target IC package, extracting the characters, and detecting the Pinl dimple. It also proposes a dynamic matching unit selection (DMUS) method which is robust to noises as well as effective to catch out the local marking errors. The main idea of the AMLT method is to restrict the inputs of Otsu's thresholding algorithm within a specified area and a partial range of gray values. Doing so, it can adapt to the specific domain. The DMUS method dynamically selects the matching unit according to the result of character extraction and layout analysis. Therefore, in spite of the various erroneous situation occurred in the process of character extraction and layout analysis, it can select minimal matching unit in any environment. In an experiment with 280 IC package images of eight types, the correct extracting rate of IC package and Pinl dimple was 100% and the correct decision rate of marking quality was 98.8%. This result shows that the proposed methods are effective to IC package marking inspection.

The implementation of cable path and overfill visualization based on cable occupancy rate in the Shipbuilding CAD (조선 CAD에서 선박의 Cable 점유율을 기반으로 Cable 경로 및 Overfill 가시화 구현)

  • Kim, Hyeon-Jae;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.740-745
    • /
    • 2016
  • Cables are installed for tens of thousands of connections between various pieces of equipment to operate and control a commercial ship. The correct shortest-route data is necessary since these are complicated cable installations. Therefore, an overfill interval commonly exists in the shortest paths for cables as estimated by Dijkstra's algorithm, even if this algorithm is generally used. It is difficult for an electrical engineer to find the overfill interval in 3D cable models because the occupancy rate data exist in a data sheet unlinked to three-dimensional (3D) computer-aided design (CAD). The purpose of this study is to suggest a visualization method that displays the cable path and overfill interval in 3D CAD. This method also provides various color visualizations for different overfill ranges to easily determine the overfill interval. This method can reduce cable-installation man-hours from 7,000 to 5,600 thanks to a decreased re-installation rate, because the cable length calculation's accuracy is raised through fast and accurate reviews based on 3D cable visualization. As a result, material costs can also be reduced.

Dependency Label based Causing Inconsistency Axiom Detection for Ontology Debugging (온톨로지 디버깅을 위한 종속 부호 기반 비논리적 공리 탐지)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.764-773
    • /
    • 2008
  • The web ontology language(OWL) has become a W3C recommendation to publish and share ontologies on the semantic web. In order to check the satisfiablity of concepts in OWL ontology, OWL reasoners have been introduced. But most reasoners simply report check results without providing a justification for any arbitrary entailment of unsatisfiable concept in OWL ontologies. In this paper, we propose dependency label based causing inconsistency axiom (CIA) detection for debugging unsatisfiable concepts in ontology. CIA is a set of axioms to occur unsatisfiable concepts. In order to detect CIA, we need to find axiom to cause inconsistency in ontology. If precise CIA is gave to ontology building tools, these ontology tools display CIA to debug unsatisfiable concepts as suitable presentation format. Our work focuses on two key aspects. First, when a inconsistency ontology is given, it detect axioms to occur unsatisfiable and identify the root of them. Second, when particular unsatisfiable concepts in an ontology are detected, it extracts them and presents to ontology designers. Therefore we introduce a tableau-based decision procedure and propose an improved method which is dependency label based causing inconsistency axiom detection. Our results are applicable to the very expressive logic SHOIN that is the basis of the Web Ontology Language.

Storage characteristics of milled rice according to milling system types (백미 제조방식에 따른 저장특성)

  • Kim, Oui-Woung;Kim, Hoon;Han, Jae-Woong;Lee, Hyo-Jai
    • Food Science and Preservation
    • /
    • v.21 no.3
    • /
    • pp.308-314
    • /
    • 2014
  • The storage characteristics of milled rice produced using the dry-type (DT), semi-dry-type (SDT), and wet-type (WT) systems were studied. Immediately after rice was milled with these systems, storage experiments on the milled rice were conducted for 12 weeks at three temperatures (10, 20, and $30^{\circ}C$). As the storage period increased, the color (b value) and the fat acidity slowly increased, and the whiteness, moisture content, turbidity, solid matter, and number of total bacteria decreased. The effects of the storage temperature on the moisture content, total number of bacteria, and fat acidity were greater than those of the milling system type. The high storage temperature showed greater potential for increasing the moisture content and the fat acidity and decreasing the total number of bacteria. The initial moisture content of the sample produced using the WT milling system was higher than that of the other samples. Also, the initial turbidity and solid matter of the WT system sample were lower than those of the other samples, but the degree of the decrease was similar to that of the others as the storage period passed. These results showed that the system type and the storage temperature are important factors in the safe storage of wash-free rice. Specifically, the wet type milling system affected the initial quality properties, which made its safe storage period shorter than in the other types.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff (AI 참모 구축을 위한 의사결심조건의 데이터 모델링 방안)

  • Han, Changhee;Shin, Kyuyong;Choi, Sunghun;Moon, Sangwoo;Lee, Chihoon;Lee, Jong-kwan
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.237-246
    • /
    • 2020
  • this paper, a data modeling method based on decision-making conditions is proposed for making combat and battlefield management systems to be intelligent, which are also a decision-making support system. A picture of a robot seeing and perceiving like humans and arriving a point it wanted can be understood and be felt in body. However, we can't find an example of implementing a decision-making which is the most important element in human cognitive action. Although the agent arrives at a designated office instead of human, it doesn't support a decision of whether raising the market price is appropriate or doing a counter-attack is smart. After we reviewed a current situation and problem in control & command of military, in order to collect a big data for making a machine staff's advice to be possible, we propose a data modeling prototype based on decision-making conditions as a method to change a current control & command system. In addition, a decision-making tree method is applied as an example of the decision making that the reformed control & command system equipped with the proposed data modeling will do. This paper can contribute in giving us an insight of how a future AI decision-making staff approaches to us.