• Title/Summary/Keyword: Defining rules

Search Result 77, Processing Time 0.021 seconds

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.

A COMPARISON OF OLD AND NEW OSHA REGULATIONS ON CRANES AND DERRICKS USING COMPREHENSIVE GAP ANALYSIS

  • Chung-Suk Cho;Francis Boafo
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.74-79
    • /
    • 2013
  • Aiming at reducing deaths and injuries involving construction crane operations, OSHA has recently updated its 40-year-old crane safety standards with new rules addressing the use of cranes and derricks in construction. The goal of this change in rule is to deal with the leading causes of fatalities related to crane and derrick operations. Employers in the construction industry are mandated to ensure that employees in the work zone are trained to recognize hazards associated with the use of the equipment and any related duties that they are assigned to perform. However, those responsible at construction sites for the supervision and management of safe crane operations often lack the integrated knowledge of the standards, regulations and best practices for conducting or supervising daily, monthly, or quarterly inspection of cranes. As such, proper planning, management and implementation of crane operations, including inspections are just as paramount to reducing accidents on the construction site. It is important that engineers responsible for the management and planning of crane operations understand the latest OSHA crane and hoisting standards to ensure a safer work environment is maintained. Many on site engineers overseeing crane operations do not have adequate training, experience, and knowledge of the inspection requirements to assess safe crane operation and too often rely on the crane operator's judgement. This paper highlights recent research effort in defining significant changes in new crane and hoisting standards and provides basis for safety construction operations.

  • PDF

Massive Electronic Record Management System using iRODS (iRODS를 이용한 대용량 전자기록물 관리 시스템)

  • Han, Yong-Koo;Kim, Jin-Seung;Lee, Seung-Hyun;Lee, Young-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.825-836
    • /
    • 2010
  • The advancement of electronic records brought great changes of the records management system. One of the biggest changes is the transition from passive to automatic management system, which manages massive records more efficiently. The integrated Rule-Oriented Data System (iRODS) is a rule-oriented grid system S/W which provides an infrastructure for building massive archive through virtualization. It also allows to define rules for data distribution and back-up. Therefore, iRODS is an ideal tool to build an electronic record management system that manages electronic records automatically. In this paper we describe the issues related to design and implementation of the electronic record management system using iRODS. We also propose a system that serves automatic processing of distribution and back-up of records according to their types by defining iRODS rules. It also provides functions to store and retrieve metadata using iRODS Catalog (iCAT) Database.

Accountability Trend for Government Supported Research Institutes : Evidence from the Institute Evaluation 1991-2005 (출연연구기관 기관평가의 책임성 요소 변화 분석)

  • Lee, Min-Hyung
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.3
    • /
    • pp.580-603
    • /
    • 2007
  • This paper examines accountability trend for government supported research institutes through the analysis of what aspects of accountability have been emphasized in the institute evaluation from 1991 to 2005. We divided research period into pre-research council period(1991-1998) and post-research council period(1999-2005). In pre-research council period, we find four kinds of accountability for government supported research institutes, that is, compliance accountability for regulation, managerial accountability, performance accountability and social accountability and great emphasis has been put on compliance accountability for regulation and managerial accountability. In post-research council period, financial accountability for soundness has been added to the above four kinds of accountability and great emphasis has been put on performance accountability and managerial accountability, especially performance accountability. The concrete contents of an accountability has been also changed between pre-research council period(1991-1998) and post-research council period(1999-2005). Regulation accountability in the pre-research council period are related to conforming to government rules for institute operation and regulation defining institute function for reformulation, but in post-research council period, it has been focused on rules for the rationalization of management. Managerial accountability has been changed from emphasizing on management efficiency approximately to focusing on more specific management efficiency like the appropriateness of personnel management, the efficiency of budget management and project management, reasonableness of evaluation and compensation. Performance accountability has been changed in methods for measuring performance, in the pre-research council period, it has been taken quantitative method for measuring productivity, but, in post-research council period, qualitative approach like objective management has been complemented. Finally, accountability for government supported research institutes has been changed towards being concrete in many sided accountabilities and focusing on performance accountability.

  • PDF

Legal implications of missile test moratorium by the North Korea (북한의 미사일발사 실험 유예조치의 법적 의의)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.1
    • /
    • pp.105-123
    • /
    • 2007
  • The launching of the Taepo-dong 1 on 31 August 1998 by the North Korea was the first case where the diplomatic protests was made against the flight, the purpose of which, the launching State claimed, consisted in space exploration and use. It is the principle regarding the freedom of space exploration and use, as included in the international treaty, that is relevant in applying the various rules and in defining the legal status of the flight. Its legal status, however, was not actually taken into account, as political negotiations leading to the test moratorium has been successful until present day in freezing the political crisis. This implies that the rules of the law lack the validity and logic sufficient in dictating the conduct of the States. This case shows that, in effect, it is not the rule but the politics that is to govern the status of the flight.

  • PDF

Legal implications of missile test moratorium by the North Korea (북한의 미사일발사 실험 유예조치의 법적 의의)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.87-104
    • /
    • 2007
  • The launching of the Taepo-dong 1 on 31 August 1998 by the North Korea was the first case where the diplomatic protests was made against the flight, the purpose of which, the launching State claimed, consisted in space exploration and use. It is the principle regarding the freedom of space exploration and use, as included in the international treaty, that is relevant in applying the various rules and in defining the legal status of the flight. Its legal status, however, was not actually taken into account, as political negotiations leading to the test moratorium has been successful until present day in freezing the political crisis. This implies that the rules of the law lack the validity and logic sufficient in dictating the conduct of the States. This case shows that, in effect, it is not the rule but the politics that is to govern the status of the flight.

  • PDF

Precautionary Action by a Military Aircraft in the Law of Air Warfare: its Rules and Problems (국제항공규범의 전시적용 법리와 쟁점 - 공전규범상 사전예방조치 (Precautionary Measure)의 법리와 쟁점을 중심으로 -)

  • Hwang, Won-Ho;Kim, Hyoung-Ku
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.41-68
    • /
    • 2011
  • This article deals with the current rules of law of air warfare and its surrounding issues on precautionary action by a military aircraft at air-to-air operation in international armed conflict. However there is no separate and independent legal system to regulate warfare in aerospace in the current system of law of war (or law of armed conflict). In other words, law of air warfare does not exist in a form of a separate treaty. Air warfare has been regulated by international customary law and the relevant provisions in different Conventions, including 1949 four Geneva Conventions and two Additional Protocols, which mainly regulate land and naval warfare. And this makes difficult to make clear a legal term or legal tests on an issue concerned with law of air warfare, which concludes from time to time a dispute on interpretation and implementation of law of air warfare between states. Therefore, this article refers various materials (including 1949 Geneva Conventions and Additional Protocols, San Remo Manual, Harvard Manual, and ICAO Manual on Interception of Civilian Aircraft) for the purpose of defining the current and desirable legal test on precautionary action by military aircraft. In addition to the main purpose of this article, this article tried to show a characteristic of developing mechanism of law of air Warfare taking into account interactions between international air law and law of air warfare.

  • PDF

Implementation of a Transition Rule Model for Automation of Tracking Exercise Progression (운동 과정 추적의 자동화를 위한 전이 규칙 모델의 구현)

  • Chung, Daniel;Ko, Ilju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.157-166
    • /
    • 2022
  • Exercise is necessary for a healthy life, but it is recommended that it be conducted in a non-face-to-face environment in the context of an epidemic such as COVID-19. However, in the existing non-face-to-face exercise content, it is possible to recognize exercise movements, but the process of interpreting and providing feedback information is not automated. Therefore, in this paper, to solve this problem, we propose a method of creating a formalized rule to track the contents of exercise and the motions that constitute it. To make such a rule, first make a rule for the overall exercise content, and then create a tracking rule for the motions that make up the exercise. A motion tracking rule can be created by dividing the motion into steps and defining a key frame pose that divides the steps, and creating a transition rule between states and states represented by the key frame poses. The rules created in this way are premised on the use of posture and motion recognition technology using motion capture equipment, and are used for logical development for automation of application of these technologies. By using the rules proposed in this paper, not only recognizing the motions appearing in the exercise process, but also automating the interpretation of the entire motion process, making it possible to produce more advanced contents such as an artificial intelligence training system. Accordingly, the quality of feedback on the exercise process can be improved.

A Two-Dimensional Binary Prefix Tree for Packet Classification (패킷 분류를 위한 이차원 이진 프리픽스 트리)

  • Jung, Yeo-Jin;Kim, Hye-Ran;Lim, Hye-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.543-550
    • /
    • 2005
  • Demand for better services in the Internet has been increasing due to the rapid growth of the Internet, and hence next generation routers are required to perform intelligent packet classification. For a given classifier defining packet attributes or contents, packet classification is the process of identifying the highest priority rule to which a packet conforms. A notable characteristic of real classifiers is that a packet matches only a small number of distinct source-destination prefix pairs. Therefore, a lot of schemes have been proposed to filter rules based on source and destination prefix pairs. However, most of the schemes are based on sequential one-dimensional searches using trio which requires huge memory. In this paper, we proposea memory-efficient two-dimensional search scheme using source and destination prefix pairs. By constructing binary prefix tree, source prefix search and destination prefix search are simultaneously performed in a binary tree. Moreover, the proposed two-dimensional binary prefix tree does not include any empty internal nodes, and hence memory waste of previous trio-based structures is completely eliminated.

The CAbAT Modeling of Library User Context Information Applying Activity Theory (행위이론을 적용한 도서관 이용자 컨텍스트 정보의 CAbAT 모델링)

  • Lee, Jeong-Soo;Nam, Young-Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.221-239
    • /
    • 2012
  • The information that has been created according to the complex environment and usage pattern of library user can provide context-aware information service through knowledge structuralization on whether it is a suitable situation for user. Accordingly, the development of a context model for defining the various contexts of library user and for the structuralization of interrelated context information is an essential requirement. This study examined the context concept and context modeling, and utilizing the concept of Activity Theory by Engestrom, the activity model of library user was designed as 1) subject, 2) object, 3) tools, 4) divison of labor, 5) community, and 6) rules. In addition, for the purpose of analyzing the context of library user, activity information was tracked to utilize the Shadow Tracking for observing and recording their forms, and the methodology of CAbAT (Context Analysis based on Activity Theory) was utilized for the collected activity information to analyze the user context model.