• Title/Summary/Keyword: 어플리케이션 프로파일

Search Result 78, Processing Time 0.032 seconds

Normal Behavior Profiling based on Bayesian Network for Anomaly Intrusion Detection (이상 침입 탐지를 위한 베이지안 네트워크 기반의 정상행위 프로파일링)

  • 차병래;박경우;서재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.103-113
    • /
    • 2003
  • Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles. and detectes anomaly intrusions effectively. Anomaly detections using system calls are detected only anomaly processes. But this has a Problem that doesn't detect affected various Part by anomaly processes. To improve this problem, the relation among system calls of processes is represented by bayesian probability values. Application behavior profiling by Bayesian Network supports anomaly intrusion informations . This paper overcomes the Problems of various intrusion detection models we Propose effective intrusion detection technique using Bayesian Networks. we have profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions we had simulation by proposed normal behavior profiling technique using UNM data.

  • PDF

Study of Web Services Interoperabiliy for Multiple Applications (다중 Application을 위한 Web Services 상호 운용성에 관한 연구)

  • 유윤식;송종철;최일선;임산송;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.217-220
    • /
    • 2004
  • According as utilization for web increases rapidly, it is demanded that model about support interaction between web-based applications systematically and solutions can integrate new distributed platforms and existing environment effectively, accordingly, Web Services appeared by solution in reply. These days, a lot of software and hardware companies try to adoption of Web Services to their market, attenpt to construct their applications associationing components from various Web Services providers. However, to execute Web Services completely. it must have interoperability and need the standardization work that avoid thing which is subject to platform, application as well as service and programming language from other companies. WS-I (Web Services Interoperability organization) have established Basic Profile 1.0 based on XML, UDDI, WSDL and SOAP for web services interoperability and developed usage scenario Profile to apply Web Services in practice. In this paper, to verify suitability Web Services interoperability between heterogeneous two applications, have design and implements the Book Information Web Services that based on the Web Services Client of J2SE platform and the Web Services Server of .NET platform, so that analysis and verify the service by adaptation of WS-I Basic Profile.

  • PDF

SoFA: A Distributed File System for Search-Oriented Systems (SoFA: 검색 지향 시스템을 위한 분산 파일 시스템)

  • Choi, Eun-Mi;Tran, Doan Thanh;Upadhyaya, Bipin;Azimov, Fahriddin;Luu, Hoang Long;Truong, Phuong;Kim, Sang-Bum;Kim, Pil-Sung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • A Distributed File System (DFS) provides a mechanism in which a file can be stored across several physical computer nodes ensuring replication transparency and failure transparency. Applications that process large volumes of data (such as, search engines, grid computing applications, data mining applications, etc.) require a backend infrastructure for storing data. And the distributed file system is the central component for such storing data infrastructure. There have been many projects focused on network computing that have designed and implemented distributed file systems with a variety of architectures and functionalities. In this paper, we describe a complete distributed file system which can be used in large-scale search-oriented systems.

  • PDF

A Smart System for Product Recommendation Using NFS tags (NFC태그를 이용한 스마트 상품 추천 시스템)

  • Kim, Hyun-Chul;No, Hyun-Duck;Kim, Jea-Gu;Kim, Woo-Sung;Im, Dong-Hyuk;Park, Geun-Duk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.720-721
    • /
    • 2015
  • 본 논문에서는 스마트폰 NFC 기술을 이용하여 모바일 쿠폰 및 포인트 적립 등을 하며, 고객의 관심사를 프로파일화 하고 사용자가 찾아가 가게의 상품 데이터베이스와 온톨로지 데이터를 사용하여 유사 매칭을 시도하여 상품을 추천하는 어플리케이션을 개발하였다. 고객용 어플리케이션과 가게용 어플리케이션을 각각 따로 개발하여 데이터를 따로 보관하게 구현 하였으며, 고객의 데이터는 우리가 규정한 데이터로 확인하여 가게에서는 고객의 성함과 관심 품목만 나타나게 구현하였다.

A Research on Personal Environment Services for a Smart Home Network (스마트 홈 네트워크를 위한 개인환경서비스 연구)

  • Ro, Kwang-Hyun;Kim, Seung-Cheon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.46-55
    • /
    • 2012
  • Recently, the concept of PES(Personal Environment Service) is being widely discussed on various standardization organizations such as ITU-R, ETSI, 3GPP, TTA and etc. The purpose of PES is to introduce the services which can dynamically, automatically and intelligently reconfigures the electronic, electrical, and mechanical equipment surrounding the user according to the user preferences included in a user's profile by using a smartphone embedding WPAN radio technologies such as bluetooth and WiFi. This research introduces an Android Platform-based PES system which consists of a PES app, PES devices and a PES server. A smartphone platform is Android 2.2(Froyo) version and 4 simulated PES devices were implemented by using Galaxy Tab. It has shown that the PES would be a killer application of M2M(Machine-to-Machine) or D2D(Device-to-Device) in the future and it would need to study how to update a user's profile based on analyzing user's behaviour for enhancing the PES user's satisfaction.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

Late-Join and repair schemes in multicasting files by the FLUTE protocol (FLUTE를 이용한 멀티캐스트 파일 전송에서 Late-Join과 파일 복구 방안)

  • Kim Young-Jun;Seong Baek-Dong;Hong Jin-Pyo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.262-264
    • /
    • 2006
  • 최근 wired 및 wireless 환경에서 멀티미디어 데이터 전송에 대한 수요가 증가하고 있다. 또한 네트워크의 대역폭 효율성을 위해 멀티캐스트 전송이 요구되었고, 신뢰적인 멀티캐스트 전송 프로토콜인 RMT 프로토콜이 등장하게 되었다. FLUTE는 ALC 기반의 어플리케이션으로 LAN 환경 및 3GPP 및 DVB-H에서 멀티캐스트 콘텐츠 전송을 위해 사용하고 있다. FLUTE는 동일한 멀티캐스트 세션에서 FDT 인스턴스를 전송한 후에 콘텐츠를 전송한다. 그러나 FDT 인스턴스를 수신하지 못하면 콘텐츠를 수신할 수 없기 때문에, FDT 인스턴스 전송 이전에 멀티캐스트 세션에 Join해야 하는 문제가 발생한다. 본 논문에서는 이러한 문제를 해결하는 FLUTE을 이용한 멀티캐스트 콘텐츠 전송에서 Late-Join과 Late-Join 시 파일 복구 방안을 제안하였다.

  • PDF

P2P File Sharing Network based on Network Identifie (네트워크 식별자 기반 P2P 파일 공유 네트워크)

  • 박찬모;이정기;배일호;정성옥;이준
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.762-765
    • /
    • 2003
  • 최근 수 년간 클라이언트/서버 모델에서 발생하는 문제인 서버 병목 현상, DoS(Denial of service) 공격, 그리고 시스템의 확장성에 따르는 비용 증가 등의 문제를 해결하기 위한 방법으로 P2P (Peer-to-Peer) 방식이 활발히 연구되고 있다. P2P 방식을 사용하는 모델은 기존의 클라이언트/서버 모델이 적용되었던 절러 분야에 이용되고 있다. 그 중 사용자간 파일 공유하는 분야에 적용된 P2P가 가장 널리 알려져 있다. 본 연구는 P2P 파일 공유 어플리케이션을 위한 효율적인 네트워크 생성 및 검색 프로토콜을 제안한다. 이것은 동일 네트워크 식별자를 통한 그룹화로 전체 논리 노드 수를 감소시킴으로써 물리적인 네트워크의 라우팅에 근접해 가도록 한다.

  • PDF

Collective I/O with Process grouping (프로세스 그룹화를 이용한 집합 I/O)

  • 차광호;홍정우;이지수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.442-444
    • /
    • 2003
  • 병렬 처리를 요구하는 계산 과학 분야의 문제들 중에는 대용량 데이터 처리를 필요로 하는 경우가 많다. 그러나 기존의 파일 시스템을 그대로 병렬처리 환경에 적용하기에는 많은 문제가 따른다. 이를 위해서 병렬처리를 지원하는 파일 시스템에 대한 연구와 개발이 진행되어 오고 있다. 이와 같은 연구 중 하나인 집합 I/O(Collective I/O)를 본 논문에서 다루고자 한다. 이 집합 I/O는 여러 프로세스의 파일 I/O 요청을 효과적으로 처리하는 방법으로 MPl2의 MPI-10에도 포함되어 있다. 본 논문에서는 어플리케이션 프로그램 측면에서 MPI-10의 집합 I/O를 효과적으로 사용하기 위한 방안을 제시하며, 보편적으로 사용되는 NFS를 이용한 클러스터 시스템에서의 실험 결과를 분석한다.

  • PDF

An Adaptive Grid Resource Selection Method Using Statistical Analysis of Job History (작업 이력의 통계 분석을 통한 적응형 그리드 자원 선택 기법)

  • Hur, Cin-Young;Kim, Yoon-Hee
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.3
    • /
    • pp.127-137
    • /
    • 2010
  • As large-scale computational applications in various scientific domains have been utilized over many integrated sets of grid computing resources, the difficulty of their execution management and control has been increased. It is beneficial to refer job history generated from many application executions, in order to identify application‘s characteristics and to decide selection policies of grid resource meaningfully. In this paper, we apply a statistical technique, Plackett-Burman design with fold-over (PBDF), for analyzing grid environments and execution history of applications. PBDF design identifies main factors in grid environments and applications, ranks based on how much they affect to their execution time. The effective factors are used for selecting reference job profiles and then preferable resource based on the reference profiles is chosen. An application is performed on the selected resource and its execution result is added to job history. Factor's credit is adjusted according to the actual execution time. For a proof-of-concept, we analyzed job history from an aerospace research grid system to get characteristics of grid resource and applications. We built JARS algorithm and simulated the algorithm with the analyzed job history. The simulation result shows good reliability and considerable performance in grid environment with frequently crashed resources.