• Title/Summary/Keyword: Access Patterns

Search Result 419, Processing Time 0.025 seconds

Web Application Attack Prevention by Traffic Analysis (트래픽 분석에 의한 웹 어플리케이션 공격 방지)

  • Chang, Moon-Soo;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.139-146
    • /
    • 2008
  • Despite of information security installation, leakage of personal information in web services has not decreased. This is because traffics to web applications are still vulnerable by permitting external sources to access services in port HTTF 80 and HTTPS 443, even with firewall systems in place. This thesis analyzes various attack patterns resulted from web service environment and vulnerable traffic and categorizes the traffics into normal and abnormal traffics. Also this proposes ways to analyze web application attack patterns from those abnormal traffics based on weak points warned in OWASF(Open Web Application Security Project), design a system capable of detect and isolate attacks in real time, and increase efficiency of preventing attacks.

  • PDF

Design and implementation of electromagnetic band-gap embedded antenna for vehicle-to-everything communications in vehicular systems

  • Kim, Hongchan;Yeon, KyuBong;Kim, Wonjong;Park, Chul Soon
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.731-738
    • /
    • 2019
  • We proposed a novel electromagnetic band-gap (EBG) cell-embedded antenna structure for reducing the interference that radiates at the antenna edge in wireless access in vehicular environment (WAVE) communication systems for vehicle-to-everything communications. To suppress the radiation of surface waves from the ground plane and vehicle, EBG cells were inserted between micropatch arrays. A simulation was also performed to determine the optimum EBG cell structure located above the ground plane in a conformal linear microstrip patch array antenna. The characteristics such as return loss, peak gain, and radiation patterns obtained using the fabricated EBG cell-embedded antenna were superior to those obtained without the EBG cells. A return loss of 35.14 dB, peak gain of 10.15 dBi at 80°, and improvement of 2.037 dB max at the field of view in the radiation beam patterns were obtained using the proposed WAVE antenna.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

A Study on Traditional Korean Furniture, PyeongSang II - Developing Modularized and Multi-useful Bed adopting PyeongSang - (한국 전통목가구 평상(平床) 연구 2 - 평상을 적용한 모듈화 다용도 침대 개발 -)

  • Kim, Min Keung;Moon, Sun Ok
    • Journal of the Korea Furniture Society
    • /
    • v.28 no.3
    • /
    • pp.145-155
    • /
    • 2017
  • This study explores developing a piece of modularized and multi-useful bed adapting PyeongSang followed by the last issue, 'a study on traditional Korean furniture, PyeongSang I' for the understanding of the furniture from theory and history. Adopted From the joints and ornament, the modularized elements were designed and developed in order to compose the head board, the side board, the foot board, and the seat bottom. The joints are sambang miter, samae miter, dado, and mortise and tenon, which are strong in holding the bed. And the ornament is lattice patterns like geokjamun and manjamun, elephant eyes patterns like ansangmun from the traditional furniture. Using the elements, the bed is composed with six modules which make people free and easy to move and transform them. Hence, the bed is multi-useful by using the double, the twin the single, and various sofas by the way to display them such as two, three, four, five, and six modules. And the bed was made of bright zelkova tree and dark heat treated ash expressing contrast of black and white, the design concept modern and easy to make many people access to them.

An Empirical Study of Commodity Market Patterns in Ethnic Minorities and Mountainous Areas: Evidence from Vietnam

  • THUY, Trinh Thi Thanh;BINH, Nguyen Thi;HUONG, Trinh Thi Thu;THUY, Nguyen Thu;PHUONG, Dang Thanh;KHANH, Tran Thi Bao;YEN, Nguyen Thi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.107-120
    • /
    • 2021
  • The development of the ethnic minorities and mountainous areas (EMMA) is currently receiving the attention of countries around the world. This is demonstrated through a large number of studies, in many respects, in many different countries. The objective of the study is to find out the current situation of the commodity market in the ethnic minorities and mountainous areas (EMMA) of Vietnam. In particular, the authors will study whether there is a link between the ability to access governmental policies and the characteristics of this commodity market. To achieve the goal, the authors employed the secondary data collection method to gather the relevant information on government policies for EMMA and conducted an interview of seventy (70) enterprises in the Northern midlands and mountainous regions and the Central Coast to clarify the characteristics of commodity market. By Levene's test, the results showed that the accessibility to governmental policies has a certain influence on the development of the commodity market patterns in the EMMA in terms of diversification of distribution forms and sales method of the business. These findings brought some basic solutions to further enhance the role of the government in developing commodity markets in the EMMA of Vietnam.

Regional differences in winter activity of hibernating greater horseshoe bats (Rhinolophus ferrumequinum) from Korea

  • Kim, Sun-Sook;Choi, Yu-Seong;Yoo, Jeong-Chil
    • Journal of Ecology and Environment
    • /
    • v.43 no.1
    • /
    • pp.1-8
    • /
    • 2019
  • Background: Hibernating bats exhibit ubiquitous winter activity in temperate zones, but there is considerable between- and within-species variety in their intensity and purpose. Bats may fly during winter for sustenance or travel to other hibernacula. This study compared inter-regional variation in the winter activity of the greater horseshoe bat (Rhinolophus ferrumequinum). We predicted that weather and hibernacula-environmental conditions would influence winter activity patterns. Results: Winter activity patterns differed between regions. In the Anseong area, we confirmed movement inside the hibernaculum, but in Hampyeong, we observed movement both inside and between hibernacula. The two regions differ by $4^{\circ}C$ in average winter temperatures. Anseong experiences 22 days during which average daily temperatures exceeded $5^{\circ}C$, whereas Hampyeong experienced 50 such days. During the hibernating period, bat body weight decreased by approximately 17-20% in both regions. Conclusions: Ambient temperatures and winter-roost environments appear to be behind regional differences in hibernating bat activity. As winter temperatures in Korea do not favor insect activity, feeding probability is low for bats. However, bats may need to access water. At Anseong, underground water flows inside the hibernaculum when the reservoir outside is frozen. At Hampyeong, the hibernaculum does not contain a water source, but the reservoir outside does not freeze during winter. In conclusion, water-source location is the most likely explanation for regional variation in the winter activity of hibernating bats.

Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications

  • Luan, Shenji;Bao, Jianrong;Liu, Chao;Li, Jie;Zhu, Deqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1123-1140
    • /
    • 2019
  • Many Internet of Things (IoT) applications involving bursty traffic have emerged recently with event detection. A power management scheme qualified for uplink bursty traffic (PM-UBT) is proposed by distinguishing between bursty and general uplink traffic patterns in the IEEE 802.11 standard to balance energy consumption and uplink latency, especially for stations with limited power and constrained buffer size. The proposed PM-UBT allows a station to transmit an uplink bursty frame immediately regardless of the state. Only when the sleep timer expires can the station send uplink general traffic and receive all downlink frames from the access point. The optimization problem (OP) for PM-UBT is power consumption minimization under a constrained buffer size at the station. This OP can be solved effectively by the bisection method, which demonstrates a performance similar to that of exhaustive search but with less computational complexity. Simulation results show that when the frame arrival rate in a station is between 5 and 100 frame/second, PM-UBT can save approximately 5 mW to 30 mW of power compared with an existing power management scheme. Therefore, the proposed power management strategy can be used efficiently for delay-intolerant uplink traffic in event-driven IoT applications, such as health status monitoring and environmental surveillance.

Quantum-based exact pattern matching algorithms for biological sequences

  • Soni, Kapil Kumar;Rasool, Akhtar
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.483-510
    • /
    • 2021
  • In computational biology, desired patterns are searched in large text databases, and an exact match is preferable. Classical benchmark algorithms obtain competent solutions for pattern matching in O (N) time, whereas quantum algorithm design is based on Grover's method, which completes the search in $O(\sqrt{N})$ time. This paper briefly explains existing quantum algorithms and defines their processing limitations. Our initial work overcomes existing algorithmic constraints by proposing the quantum-based combined exact (QBCE) algorithm for the pattern-matching problem to process exact patterns. Next, quantum random access memory (QRAM) processing is discussed, and based on it, we propose the QRAM processing-based exact (QPBE) pattern-matching algorithm. We show that to find all t occurrences of a pattern, the best case time complexities of the QBCE and QPBE algorithms are $O(\sqrt{t})$ and $O(\sqrt{N})$, and the exceptional worst case is bounded by O (t) and O (N). Thus, the proposed quantum algorithms achieve computational speedup. Our work is proved mathematically and validated with simulation, and complexity analysis demonstrates that our quantum algorithms are better than existing pattern-matching methods.

A Critical Analysis of the Studies on Children's and Adolescents' Information Seeking and Use Part I: Focusing on Information Seeking and Use for Learning (어린이와 청소년의 정보이용에 관한 연구의 비판적 분석 I - 학습을 위한 정보이용을 중심으로 -)

  • Chung, Jin-Soo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.2
    • /
    • pp.143-153
    • /
    • 2009
  • This paper identifies some natural habits and patterns of children's and adolescents' information seeking and use by drawing a wide range of studies conducted with children and adolescents as study participants. The patterns reported here indicate that children's and adolescents' information seeking and use are affected by the nature of information tasks, the qualities of access tools, their cognitive ability to seek and use information, and their prior knowledge and experience about the tasks and topics given. The findings should provide insights for identifying future research issues as well as for programming the information environments particularly conducive to learning.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.