• Title/Summary/Keyword: 자기유사특성

Search Result 278, Processing Time 0.024 seconds

Analysis of self-similar characteristics in the networks (Network에서 트래픽의 self-similar 특성 분석)

  • 황인수;이동철;박기식;최삼길;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.263-267
    • /
    • 2000
  • Traffic analysis during past years used the Poisson distribution or Markov model, assuming an exponential distribution of packet queue arrival. Recent studies, however, have shown aperiodic and burst characteristics of network traffics Such characteristics of data traffic enable the scalability of network, QoS, optimized design, when we analyze new traffic model having a self-similar characteristic. This paper analyzes the self-similar characteristics of a small-scale mixed traffic in a network simulation, the real WAN delay time, TCP packet size, and the total network usage.

  • PDF

Image Recognition based on Self-Similarity (자기 유사성에 의한 영상 인식)

  • Cho, Jae-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.163-164
    • /
    • 2018
  • 최근 생물학 등 여러 학문이 결합한 바이오닉스 기술을 이용하여 시력을 회복시키려는 인공 시각 전달 장치의 개발이 시도되고 있다. 본 논문에서는 인간의 물체 지각의 특성인 자기유사성에 적합한 영상 압축 기법에 대하여 조사하여 영상인식을 위한 최적의 학습 데이타 구성에 대하여 제안하고자 한다. 실험결과, 레인지 블록 크기에 따라 인식율의 변화는 나타나지만 레인지 크기가 작아질수록 별 차이가 없음을 알 수 있었다.

  • PDF

Detection of Personal Information Leakage using the Network Traffic Characteristics (네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법)

  • Park, Jung-Min;Kim, Eun-Kyung;Jung, Yu-Kyung;Chae, Ki-Joon;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.199-208
    • /
    • 2007
  • In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.

Stochastic Self-similarity Analysis and Visualization of Earthquakes on the Korean Peninsula (한반도에서 발생한 지진의 통계적 자기 유사성 분석 및 시각화)

  • JaeMin Hwang;Jiyoung Lim;Hae-Duck J. Jeong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.493-504
    • /
    • 2023
  • The Republic of Korea is located far from the boundary of the earthquake plate, and the intra-plate earthquake occurring in these areas is generally small in size and less frequent than the interplate earthquake. Nevertheless, as a result of investigating and analyzing earthquakes that occurred on the Korean Peninsula between the past two years and 1904 and earthquakes that occurred after observing recent earthquakes on the Korean Peninsula, it was found that of a magnitude of 9. In this paper, the Korean Peninsula Historical Earthquake Record (2 years to 1904) published by the National Meteorological Research Institute is used to analyze the relationship between earthquakes on the Korean Peninsula and statistical self-similarity. In addition, the problem solved through this paper was the first to investigate the relationship between earthquake data occurring on the Korean Peninsula and statistical self-similarity. As a result of measuring the degree of self-similarity of earthquakes on the Korean Peninsula using three quantitative estimation methods, the self-similarity parameter H value (0.5 < H < 1) was found to be above 0.8 on average, indicating a high degree of self-similarity. And through graph visualization, it can be easily figured out in which region earthquakes occur most often, and it is expected that it can be used in the development of a prediction system that can predict damage in the event of an earthquake in the future and minimize damage to property and people, as well as in earthquake data analysis and modeling research. Based on the findings of this study, the self-similar process is expected to help understand the patterns and statistical characteristics of seismic activities, group and classify similar seismic events, and be used for prediction of seismic activities, seismic risk assessments, and seismic engineering.

Virus Detection and Recovery Using File Virus Self-Reproduction Characteristic (파일 바이러스 복제 특성을 이용한 바이러스 탐지 및 복구1))

  • 서용석;이성욱;홍만표;조시행
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.724-726
    • /
    • 2001
  • 본 논문에서는 컴퓨터 바이러스의 자기 복제 특성을 용한 바이러스 탐지 및 복구 방안을 제안한다. 바이러스의 행동 패턴은 바이러스의 종류 만큼 다양하지만 파일 바이러스의 경우, 자기 복제 행동 패턴은 대부분의 바이러스가 유사하다. 파일 바이러스가 시스템 감염시키기 위해서는 기생할 실행파일을 열고, 자기 자신을 그 실행 파일에 복사해야 한다. 이와 같은 자기 복제 행위를 통해 바이러스가 광범위하게 선과될 때 피 피해도 커지게 된다. 바이러스치 자기 복제 특성을 감안하여 본 연구에서 제안하는 바이러스 탐지 알고리즘은 다음과 같은 득징을 가진다. 첫째, 바이러스의 자기복세 행동 패턴은 파일 입출력 이벤트로 표현하여 바이러스의 행동 패턴으로 일반화시켰다. 둘째, 바이러스의 1차 감염행위는 허용하고 2차 이후 감염 행위부터 탐지하고, 탐지되기 이전에 감염되었던, 파일들을 복구한다. 이는 일반적인 바이러스들이 자기 복제를 지속적으로 수행한다는 점에 착안하여 false-positive 오류를 줄이기 위한 것이다. 본 고에서 제안하는 방법을 사용함으로써 특정 문자열에 의한 바이러스 탐지 및 복구 방법의 단점을 보안할 수 있을 것으로 기대된다.

  • PDF

Self-Similarity in Worm Attacks on Web Sowers (웹 서버를 공격하는 웜 바이러스의 자기 유사성)

  • 정기훈;송하윤;노삼혁
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.127-129
    • /
    • 2003
  • 최근 인터넷의 폭발적인 확장에 따라서 웹 서버의 절대 개수가 증가하였으며 웹 바이러스에 의만 웹 서버의 공격도 빈번해졌다. 바이러스의 무제한 자기 증식이라는 특성에 따라 인터넷상의 공격 패킷의 증가로 인하여 네트워크가 마비되고, 특히 IIS가 DoS공격으로 인하여 많은 피해를 입었다. 이에 따라 웜 바이러스의 공격을 방어하기 위한 많은 방법이 제시되었는데, 본 논문에서는 윙 바이러스의 공격 패턴을 분석하여 웜 바이러스의 공격 패턴의 특성이 어떠한지를 연구하였다. 대부분의 웜 바이러스 공격이 IIS에는 유효하지만 유닉스 시스템에서는 무력한 점을 이용하여 UNIX 시스템에서 구동되는 Apache 웹 서버의 로그 정보를 사용하여 웜 바이러스의 공격 패턴을 분석하였다 분석 결과 웜 바이러스의 공격 패턴은 Hurst 상수 H에 의만 자기 유사성을 나타내는 것을 알 수 있었다.

  • PDF

A Study on the World Wide Web Traffic Source Modeling with Self-Similarity (자기 유사성을 갖는 World Wide Web 트래픽 소스 모델링에 관한 연구)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.416-420
    • /
    • 2002
  • Traditional queueing analyses are very useful for designing a network's capacity and predicting there performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN and VBR traffic characteristics have indicated that the models used in the traditional Poisson assumption can't properly predict the real traffic properties due to under estimation of the long range dependence of network traffic and self-similarity In this parer self-similar characteristics over statistical approaches and real time network traffic measurements are estimated It is also shown that the self- similar traffic reflects network traffic characteristics by comparing source model.

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

Hack's Law and the Geometric Properties of Catchment Plan-form (Hack의 법칙과 집수평면의 기하학적 특성)

  • Kim, Joo-Cheol;Lee, Sang-Jin
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.9
    • /
    • pp.691-702
    • /
    • 2009
  • This study makes a systematic approach to Hack's law considering self-affinity and self-similarity of natural basins as well as the elongation of corresponding catchment-plan forms. Catchment-plan forms extracted from DEM appear to be the population come from the interactions of 2 hypotheses on Hack's law. It is judged that the elongation measures based on inertia moments are more intuitive than the ones based on main channel lengths. The exponent of Hack's law, h, seems to be similar to the result of Gray's study (1961). However Hurst exponent, H, being 0.96 imply that catchment-plan forms considered in this study have isotropic increasing properties with scale. From this point of view it is inferred that the shapes of the basins in this study would be more affected from self-similarity of main channel lengths than self-affinity of catchment-plan forms.