• Title/Summary/Keyword: 융합규칙

Search Result 246, Processing Time 0.022 seconds

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Metamodeling Construction for Generating Test Case via Decision Table Based on Korean Requirement Specifications (한글 요구사항 기반 결정 테이블로부터 테스트 케이스 생성을 위한 메타모델링 구축화)

  • Woo Sung Jang;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.381-386
    • /
    • 2023
  • Many existing test case generation researchers extract test cases from models. However, research on generating test cases from natural language requirements is required in practice. For this purpose, the combination of natural language analysis and requirements engineering is very necessary. However, Requirements analysis written in Korean is difficult due to the diverse meaning of sentence expressions. We research test case generation through natural language requirement definition analysis, C3Tree model, cause-effect graph, and decision table steps as one of the test case generation methods from Korean natural requirements. As an intermediate step, this paper generates test cases from C3Tree model-based decision tables using meta-modeling. This method has the advantage of being able to easily maintain the model-to-model and model-to-text transformation processes by modifying only the transformation rules. If an existing model is modified or a new model is added, only the model transformation rules can be maintained without changing the program algorithm. As a result of the evaluation, all combinations for the decision table were automatically generated as test cases.

Tracking and Detection of Face Region in Long Distance Image (실시간 원거리 얼굴영역 검출 및 추적)

  • Park, Sung-Jin;Han, Sang-Il;Cha, Hyung-Tai
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.201-204
    • /
    • 2005
  • 동영상에서 얼굴을 인식하는 기술은 Eigen-Face를 이용하는 방법, 템플릿을 이용하는 방법 등과 같이 다양한 방법이 연구되어지고 있다. 하지만 이들 기법들이 모두 동영상에서 얼굴영역을 검출했을지는 모르지만 얼굴영역이 영상에서 차지하는 위치와 크기를 일정하게 제한하고 있다. 그 중에서 입력되는 영상이 촬영 도구로부터 제한된 거리에서 촬영되어 얻어 지거나 실험을 통해 얻어진 영상을 이용하여 얼굴영역을 검출한다. 하지만 실제 다양한 응용분야에서 얼굴영역 검출 기술을 이용하기 위해서는 이러한 제한된 입력 영상뿐만이 아니라 어떠한 환경에서의 입력 영상에서도 얼굴영역을 검출할 수 있어야 한다. 본 논문은 근거리뿐만이 아니라 원거리에서 획득한 영상에서도 얼굴영역을 검출할 수 있으며, 얼굴의 특징 추출과 예측기법을 통하여 보다 향상된 얼굴영역 검출을 할 수 있다. 움직임 정보와 얼굴색상정보를 이용하여 8x8블록을 만들고 이런 블록 정보들을 특정한 규칙에 적용함으로써 얼굴영역을 후보를 검출하게 된다. 그리고 후보 얼굴영역의 고유한 특징들을 추출하고 칼만 필터를 적용한 예측기법을 통하여 얼굴영역 판단하게 된다.

  • PDF

The Design and Implementation of A Distributed Intrusion Detection System for Multiple Attacks (대규모 네트워크 상의 다중공격에 대비한 분산 침입탐지시스템의 설계 및 구현)

  • 최주영;최은정;김명주
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.21-29
    • /
    • 2001
  • For multiple attacks through large networks e.g., internet, IDS had better be installed over several hosts and collect all the audit data from them with appropriate synthesis. We propose a new distributed intrusion detection system called SPIDER II which is the upgraded version of the previous standalone IDS - SPIDER I. As like the previous version, SPIDER II has been implemented on Linux Accel 6.1 in CNU C. After planting intrusion detection engines over several target hosts as active agents, the administration module of SPIDER II receives all the logs from agents and analyzes hem. For the world-wide standardization on IDS, SPIDER II is compatible with MITRE's CVE(Common Vulnerabilities and Exposures).

  • PDF

Modeling and Design of a Distributed Detection System Based on Active Sonar Sensor Networks (능동 소나망 분산탐지 체계의 모델링 및 설계)

  • Choi, Won-Yong;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.123-131
    • /
    • 2011
  • In this paper, modeling and design of a distributed detection system are considered for an active sonar sensor network. The sensor network has a parallel configuration and it consists of a fusion center and a set of receiver nodes. A system with two receiver nodes is considered to investigate a theoretical aspect of design. To be specific, AND rule and OR rule are considered as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is obtained that maximizes the probability of detection given probability of false alarm. Numerical experiments were also performed to investigate the detection characteristics of a distributed detection system with multiple sensor nodes. The experimental results show how signal strength, false alarm probability, and the distance between nodes in a sensor field affect the system detection performances.

Design and Performance Analysis of Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 분산탐지 체계의 설계 및 성능 분석)

  • Kim, Song-Geun;Do, Joo-Hwan;Song, Seung-Min;Hong, Sun-Mog;Kim, In-Ik;Oh, Won-Tchon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.159-169
    • /
    • 2009
  • In this paper, optimum design of distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under the constraint of a specified probability of false alarm. It is also investigated through numerical experiments how signal strength, false alarm probability, and the distance between two sensor nodes affect the system detection performances.

Anatomical Ultrastructure of Spermatozoa of a Korean Bitterling, Acheilognathus yamatsutae (Pisces, Cyprinidae) (한국산 줄납자루 (Acheilognathus yamatsutae) 정자의 미세해부학적 구조)

  • Kim, Kgu-Hwan
    • Korean Journal of Ichthyology
    • /
    • v.20 no.3
    • /
    • pp.163-166
    • /
    • 2008
  • The spermatozoal ultrastructure of Acheilognathus yamatsutae was studied using transmission electron microscopy. The mature spermatozoa are similar to those of other cyprinids as follows: a spherical nucleus with a shallow nuclear fossa, a short midpiece containing mitochondria and a long flagellum. However, there are some differences from other cyprinids in the orientation and position of the centrioles, the number of mitochondria, and the structure of vesicles. The position of the proximal centriole was of two types: one located on the side of nucleus decline, the other situated on the opposite side.

Behavior and Motor Skill of Children with Intellectual Disabilities Participating Functional Games (지적장애아동의 기능성 게임 참여에 따른 행동변화 및 운동수행능력)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.149-154
    • /
    • 2015
  • The aim of this study is to suggest the change of behavior and motor skill of children with intellectual disabilities participating functional games using virtual reality. For this purpose, 5 children with intellectual disabilities completed a 16-week functional game program twice a week. The result was as following; the application of functional games using virtual reality has positive effect on behavior and motor skill -static coordination, hand motion coordination, normal motion coordination, motor speed, simultaneous spontaneous motion, single motion competency. The application and utilization of functional games using virtual reality systematically of children with intellectual disabilities can bring an improvement on their overall development.

Iterative Image Restoration Based on Wavelets for De-Noising and De-Ringing (잡음과 오류제거를 위한 웨이블렛기반 반복적 영상복원)

  • Lee Nam-Yong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.271-280
    • /
    • 2004
  • This paper presents a new iterative image restoration algorithm with removal of boundary/object-oriented ringing, The proposed method is based on CGM(Conjugate Gradient Method) iterations with inter-wavelet shrinkage. The proposed method provides a fast restoration as much as CGM, while having adaptive do-noising and do-ringing by using wavelet shrinkage. In order to have effective do-noising and do-ringing simultaneously, the proposed method uses a space-dependent shrinkage rule. The improved performance of the proposed method over more traditional iterative image restoration algorithms such as LR(Lucy-Richardson) and CGM in do-noising and do-ringing is shown through numerical experiments.

  • PDF