• Title/Summary/Keyword: 일반기능평가기법

Search Result 52, Processing Time 0.027 seconds

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Cloud Service Evaluation Techniques Using User Feedback based on Sentiment Analysis (감정 분석 기반의 사용자 피드백을 이용한 클라우드 서비스 평가 기법)

  • Yun, Donggyu;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.27 no.1
    • /
    • pp.8-14
    • /
    • 2018
  • As cloud computing has emerged as a hot trend in the IT industry, various types of cloud services have emerged. In addition, cloud service broker (CSB) technology has emerged to alleviate the complexity of the process of selecting the desired service that user wants among the various cloud services. One of the key features of the CSB is to recommend the best cloud services to users. In general, CSB can use a method to evaluate a service by receiving feedback about a service from users in order to recommend a cloud service. However, since each user has different criteria for giving a rating, there is a problem that reliability of service evaluation can be low when the rating is only used. In this paper, a method is proposed to supplement evaluation of rating based service by applying machine learning based sentiment analysis to cloud service user's review. In addition, the CSB prototype is implemented based on proposed method. Further, the results of comparing the performance of various learning algorithms is proposed that can be used for sentiment analysis through experiments using actual cloud service review as learning data. The proposed service evaluation method complements the disadvantages of the existing rating-based service evaluation and can reflect the service quality in terms of user experience.

  • PDF

A Method for Protein Functional Flow Configuration and Validation (단백질 기능 흐름 모델 구성 및 평가 기법)

  • Jang, Woo-Hyuk;Jung, Suk-Hoon;Han, Dong-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.4
    • /
    • pp.284-288
    • /
    • 2009
  • With explosively growing PPI databases, the computational approach for a prediction and configuration of PPI network has been a big stream in the bioinformatics area. Recent researches gradually consider physicochemical properties of proteins and support high resolution results with integration of experimental results. With regard to current research trend, it is very close future to complete a PPI network configuration of each organism. However, direct applying the PPI network to real field is complicated problem because PPI network is only a set of co-expressive proteins or gene products, and its network link means simple physical binding rather than in-depth knowledge of biological process. In this paper, we suggest a protein functional flow model which is a directed network based on a protein functions' relation of signaling transduction pathway. The vertex of the suggested model is a molecular function annotated by gene ontology, and the relations among the vertex are considered as edges. Thus, it is easy to trace a specific function's transition, and it can be a constraint to extract a meaningful sub-path from whole PPI network. To evaluate the model, 11 functional flow models of Homo sapiens were built from KEGG, and Cronbach's alpha values were measured (alpha=0.67). Among 1023 functional flows, 765 functional flows showed 0.6 or higher alpha values.

Development of Structure Dynamic Characteristics Analysis System Prototype using Image Processing Technique (영상처리기법을 이용한 구조물 동특성 분석 시스템 프로토타입 개발)

  • Jo, Byung-Wan;Lee, Yun-Sung;Kim, Jung-Hoon;Kim, Do-Keun;Yoon, Kwang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.11-21
    • /
    • 2016
  • Recently, structure safety management techniques using cutting-edge technology(Displacement senor, sensor of acceleration) has emerged as an important issue owing to the aging of infrastructure such as bridge and building. In general, the structural monitoring system for structure safety management is based on IT technology and it is expensive to install. In this paper developed an image-based structure dynamic characteristic analysis system prototype to assess the damage of structure in a more cost-effective way than traditional structure health monitoring system. The inspector can take a video of buildings or other structures with digital camera or any other devices that is passible to take video, and then using NCC calculation for image processing technique to get natural frequency. This system is analysis of damage of the structure using a compare between the frequency response ratio and functions when problems are occurs send alarm to administrator. This system is easier to install and remove than previous monitoring sensor in economical way.

Performance Evaluation of Disk Scheduling Schemes in a VOD System (VOD 시스템에서의 디스크 스케줄링 기법의 성능 평가)

  • Jeon, Yong-Hee;Lee, Sang-Hag
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3519-3533
    • /
    • 2000
  • In a VOD(Video-On-Demand) system, I/O performance and storage requirements are generally more important than computing capability, Due to the development of CPU tecnology, the gap between the performance of processors and desk speed are widening. Therefore, the disk system typically becomes the bohleneck ina VOD system. In order to allevte those effects from physical constramts, disk array system is used. The I/O performance of disk arrays can be improved by the capability of processors, I/O schefuling polcy, the number of member disks in the array, disk block size, block placemet method etc. In this paper, we considered the disk scheduling schemes including EDF( Earliest Deadine First), SCAN, SGAN-EDF, Round-robm. GSS(Grouped Sweeping scheme), and C-SCAN, LOOK, C-LOOK which are variations of SCAN Mamly focusing on those disk scheduling schemes, we performed the simulation in order to compare and eview the perionmance of disk arrays considening seveial related parameters under diverse environments and analyzed the effects of those parameters to the performance.

  • PDF

An Efficient Concurrency Control Scheme for Mobile Transactions with Skewed Data Access Patterns in Wireless Broadcast Environments (무선 브로드캐스트 환경에서 편향된 데이터 접근 패턴을 갖는 모바일 트랜잭션을 위한 효율적인 동시성 제어 기법)

  • Choi Keun-Ha;Jung Sungwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.136-138
    • /
    • 2005
  • 무선 브로드캐스트 환경에서는 모바일 클라이언트의 제한된 배터리와 클라이언트에서 서버로의 제한된 상향 대역폭 등의 문제로 기존의 동시성 제어 기법을 그대로 사용할 수 없다. 이런 문제를 해결하고자 많은 동시성 제어 기법들이 연구되어 왔는데, 지금까지 제안된 기법들은 편향된 데이터의 접근 패턴을 반영한 브로드캐스트 환경을 고려하지 못하고 있다. 무선 브로드캐스트 환경에서 서버는 일반적으로 모바일 클라이언트의 접근 패턴을 고려하여 편향된 접근 빈도를 갖는 데이터 아이템을 브로드캐스트 한다. 본 논문에서는 무선 브로드캐스트 환경에서 편향된 데이터 접근 패턴을 고려한 동시성 제어 기법을 제안한다. 제안하는 기법은 브로드캐스트 디스크 모델에서 전체 메이저 브로드캐스트 주기마다. 모바일 트랜잭션을 위한 제어 정보를 보내는 것이 아니라 일정한 마이너 브로드캐스트 주기마다. 제어 정보를 전송한다. 이는 접근 빈도가 놓은 데이터가 갱신된 경우 갱신된 내용을 마이너 그룹마다 반영하므로 읽기 전용 트랜잭션이 접근하는 데이터가 최신 정보임을 보장할 뿐만 아니라 갱신 트랜잭션이 최종 검증을 위해서 상향 통신 대역폭을 이용하는 횟수를 줄이고, 보다. 빠른 재실행을 통해 모바일 트랜잭션의 평균 응답시간을 줄여줄 수 있다. 또한 모바일 트랜잭션의 요청이 편향된 경우, 반복적인 트랜잭션의 중단, 재실행으로 인한 성능 저하를 개선하고자 정적 백오프 기법을 이용하여 모바일 트랜잭션 간 충돌 가능성을 줄여준다. 마지막으로 시뮬레이션을 통해 기존의 기법들에 비해 평균 접근 시간, 상향 통신 대역폭 등의 사용량이 현저히 줄어드는 것을 보임으로써 제안하는 기법의 성능을 검증한다.한 평균 access time을 최소화하는 동시에 클라이언트들의 제한된 에너지 소비를 최소화하는데 목적이 있다. 제안기법에 대한 평가는 수학적 분석을 통해 HIDAF 기법과 기존의 브로드캐스트 기법의 성능을 비교 분석한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분

  • PDF

A Study on Butter Managment Mechanism for Efficient Cell Transmission in ATM Network (ATM망에서 효율적인 셀 전송을 위한 버퍼 관리 기법에 관한 연구)

  • 양신현;서진교;김준년;김영일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.782-792
    • /
    • 1997
  • Asynchronous transfer mode (ATM) provides the means to support with variety of multimedia serivices in broadband network. For the support of multimedia services, various data traffic with priortes should be controlled errectively and congestion function is required in the network to carry out the control operation. To accomplish this in a flexible and effective manner, priorty classes for the different services are commonly used. In this paper, we suggested a buffer managment algorithm in ATM network to improve overall network performance with separated buffer which consists of existing buffer with threshold andauxiliary buffer whose input consists of superposition of voice and data traffic. To evaluate the proposed buffer managment algorithms, simulations are excuted with two proiorities and the results are provied that network throughput is improved better than the existing parital buffer method.

  • PDF

A Study on the Characteristics of Meta Search Engines (메타검색엔진의 특징에 관한 연구)

  • 이란주
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.2
    • /
    • pp.85-100
    • /
    • 2000
  • Meta search engines have been used as the first engine because they let users several search engines at once for their queries and give them the search results. The purpose of this study is to examine the features and functions of 17 meta search engines in order that it helps users select and execute effective searches on meta search engines. Each selected engine is analyzed based on the criteria evaluating both meta search engines and general search engines. The results show that each meta search engine has its own characteristics while there are common features among them. It is expected that the results of this study will help users utilize meta search engines and provide meta search engine designer basic ideas.

  • PDF

Implementation of IEEE 802.15.4a Software Stack for Ranging Accuracy Based on SDS-TWR (SDS-TWR 기반의 거리측정 정확도를 위한 IEEE 802.15.4a 소프트웨어 스택 구현)

  • Yoo, Joonhyuk;Kim, Hiecheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • The localization accuracy in wireless sensor networks using ranging-based localization algorithms is greatly influenced by the ranging accuracy. Software implementation of HAL(Hardware Abstraction Layer) and MAC(Medium Access Layer) should seamlessly deliver the raw performance of ranging-based localization provided by hardware capability fully to the applications without degrading the raw performance. This paper presents the design and implementation of the software stack for IEEE 802.15.4a which supports normal ranging mode of the Nanotron's NA5TR1 RF chip. The experiment results shows that average ranging error rate with our implementation is 24.5% for the normal mode of the SDS-TWR ranging scheme.

A Study on the Establishment and Application of Evaluation Criteria for Old Railway Station Considering the Level of Railway Service (철도 서비스수준을 고려한 노후철도역사 평가기준 마련 및 적용방안)

  • Kim, Kyung Ho;Kim, Si Gon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.1
    • /
    • pp.101-108
    • /
    • 2024
  • The total number of railroad stations managed in Korea is 322 (including general and wide-area railways), and a considerable number of stations are aging. In terms of the size of the existing railway station and the number of entrances, it has not been possible to secure adequate service capacity, and the demand for station improvement is increasing due to changes in surrounding conditions such as urban development. In the past, railroad stations were focused on the simple function of a connection passage in terms of maintenance or management, but in recent years, railroad stations are also changing to an atmosphere that they should be reborn as a user-centered comfortable, convenient, and safe service provision space. In this study, a case study related to the improvement of the old railway station was conducted to derive an improvement plan that meets the improvement standard of the old station, and the service level evaluation standard was developed. By introducing the concept of service level (LOS) in the development model, station congestion, station movement convenience, and station safety were selected as evaluation indicators. In addition, this development model applied an analytical stratification technique to divide various evaluation elements of each indicator into major and detailed elements and derive the relative importance of the elements by class. Priority for improvement was derived using the ratio of the number of E and F on the LOS for each facility. Based on this study, it is expected to be helpful in using it as an evaluation criterion for improving objective and equitable railway station.