• Title/Summary/Keyword: Distributed Open System

Search Result 297, Processing Time 0.029 seconds

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

A Systematic Design Automation Method for RDA-based .NET Component with MDA

  • Kum, Deuk Kyu
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.69-76
    • /
    • 2019
  • Recent Enterprise System has component driven real-time distributed architecture (RDA) and this kind of architecture should performed with satisfying strict constraints on life cycle of object and response time such as synchronization, transaction and so on. Microsoft's .NET platform supports RDA and is able to implement services including before mentioned time restriction and security service by only specifying attribute code and maximizing advantages of OMG's Model Driven Architecture (MDA). In this study, a method to automatically generate an extended model of essential elements in an enterprise-system-based RDA as well as the platform specific model (PSM) for Microsoft's .NET platform are proposed. To realize these ideas, the functionalities that should be considered in enterprise system development are specified and defined in a meta-model and an extended UML profile. In addition, after defining the UML profile for .NET specification, these are developed and applied as plug-ins of the open source MDA tool, and extended models are automatically generated using this tool. Accordingly, by using the proposed specification technology, the profile and tools can easily and quickly generate a reusable extended model even without detailed coding-level information about the functionalities considered in the .NET platform and RDA.

A Study on the Operation of Distribution System for Increasing Grid-Connected Distributed Generation (분산형전원 연계용량 증가를 위한 배전계통 운영방식에 관한 연구)

  • Nam-Koong, Won;Jang, Moon-Jong;Lee, Sung-Woo;Seo, Dong-Wan
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.9
    • /
    • pp.83-88
    • /
    • 2014
  • When DG interconnection into network is examined, details of the review are overvoltage, protective device malfunction, etc. In the case of protective device malfunction, replacing protective device into bi-directional protective device and installation NGR are the solution. Overvoltage at interconnection point occurs because the load is relatively less than DG output. When overvoltage at interconnection point occurs, DG interconnection is not permitted because this overvoltage affect other customers. Interconnection by installation new distribution line is one solution but it costs much money. Without installation new investment, change of NOP(Normal Open Point) position is a possible solution about DG interconnection into network.

K-Grid Integrated Data Modeling and Data Exchange Protocol Design and Evaluation (K-Grid 통합 노드 데이터 모델링 및 정보교환 프로토콜 설계와 시험)

  • Choi, Jung-In
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.12
    • /
    • pp.119-131
    • /
    • 2011
  • To be integrated into the IEC 61970-based K-Grid, application of open communication protocol and sub-system modeling to major nodes is needed. In this paper, a module which links load nodes in customers to CIM based on psXML/oBIX, one of open protocols, was developed and data modeling and communication protocols of IEC 61850-7-42 based DER and ESS which apply the module to the customers who have DER and ESS were designed. Also the XML-based distributed database middleware was designed. The proposed modeling and protocols were applied to the building in which commercial DER products and the effectiveness of the proposed data modeling and the communication protocol were evaluated.

Security Issues, Challenges and Techniques for U-Healthcare System (유비쿼터스 환경하에서의 헬스케어 시스템에서의 보안 문제, 해결책 및 기법)

  • Yang, Ji-su;Kim, Han Kyu;Kim, Sung Min;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.984-985
    • /
    • 2013
  • An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. In the paper we analysed some elements to guarantee security and privacy preserving in distributed IT applications which provide some kind of support to complex medical domains.

  • PDF

Improving Elasticsearch for Chinese, Japanese, and Korean Text Search through Language Detector

  • Kim, Ki-Ju;Cho, Young-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.33-38
    • /
    • 2020
  • Elasticsearch is an open source search and analytics engine that can search petabytes of data in near real time. It is designed as a distributed system horizontally scalable and highly available. It provides RESTful APIs, thereby making it programming-language agnostic. Full text search of multilingual text requires language-specific analyzers and field mappings appropriate for indexing and searching multilingual text. Additionally, a language detector can be used in conjunction with the analyzers to improve the multilingual text search. Elasticsearch provides more than 40 language analysis plugins that can process text and extract language-specific tokens and language detector plugins that can determine the language of the given text. This study investigates three different approaches to index and search Chinese, Japanese, and Korean (CJK) text (single analyzer, multi-fields, and language detector-based), and identifies the advantages of the language detector-based approach compared to the other two.

Blockchain and Cryptocurrency Distributed Testing Methods

  • Lee, Taegyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, a large number of cryptocurrencies and block chains have been continuously released. However, these cryptocurrencies and block chains are open to users without authorized verification and testing procedures, causing various reliability problems. Existing cryptocurrencies and blockchain test methods build a blockchain Testnet for a certain period of time by the developer without external verification by a third party, and after repeatedly self-testing and self-operating processes, commercialization is in progress by switching to the Mainnet. This self-verification method does not guarantee objectivity and publicness, and high reliability of customers cannot be realized. This study proposes a cryptocurrency and blockchain test interface and test control system as a third-party open test method.

A Design and Implementation of SOAP-EJB Based Collaboration Supporting System (SOAP-EJB 기반 협업 지원 시스템의 UML에 의한 설계 및 구현)

  • Kim, Hyeong-Seon;Lee, Ju-Haeng;Kim, Hyun;Lee, Jae-Yeol
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.318-321
    • /
    • 2001
  • A collaboration supporting system, which enables multi-user collaboration and communication in Internet environment, is being a new indispensable tool to compete and collaborate with business peers. A collaboration supporting system in distributed environment requires scalable and open system architecture to rapidly deploy a new technology and trends. In this paper, we propose such a collaboration supporting system where communication API is using XMI(Extended Markup Language)-based SOAP(Simple Object Access Protocol)protocols, which is independent on programming language and platform. In our system, sever components are developed with EJB(Enterprise Java Beans). System analysis, design, and development are based on UML(Unified Modeling Language).

  • PDF

Effect of the Freshwater Discharge on Water Quality Variation and in Haechang Bay, Korea (해창만의 수질환경변동 및 담수방류의 영향평가)

  • Lee, Dae-In;Cho, Hyeon-Seo;Lee, Moon-Ok
    • Journal of Environmental Impact Assessment
    • /
    • v.12 no.5
    • /
    • pp.341-348
    • /
    • 2003
  • Seasonal characteristics of water quality and effect of the freshwater discharge during open the tide embankment in Haechang Bay were evaluated. In the freshwater, where interior of the tide embankment, COD and Chl-a exceeded about 4mg/L and $10mg/m^3$, respectively, independent of season, while in the seawater they showed high values in April and July in contrast to the other period due to input of freshwater and increase of phytoplankton, respectively. The content of seawater inorganic nitrogen maintained a relatively high level at inner part of the bay, whereas high values of inorganic phosphorus content was distributed at all over the bay. The limiting factor for algal growth was nitrogen with respect to the N/P ratio. The compass of influence by the freshwater discharge in April was quite different with water pollutants. As a result of the salinity variation with time, the freshwater extended strongly to offshore from the surface layer without mixing with depth when open the tide embankment, and reached within about one hour at a station which is 3.5km from the tide embankment. To effective water quality management of Haechang Bay, discharge rate and pollutant loads should be controlled.

The Mechanism for Reliable Group Communication Based on CORBA in Distributed Environment (분산환경에서 CORBA를 기반으로 한 신뢰성 있는 그룹통신기법)

  • 안계호;이재완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.79-85
    • /
    • 2002
  • In open communication architecture, application systems consist of objects distributed in lots of computing nodes. To reduce complexity of development. and management of distributed software, to manage efficiently distributed objects and to provide realtime service, the mechanisms for object group management and communication are needed in distributed environment. In this paper we compose object groups and provide reliable group communication mechanism based on CORBA which can adopt a new service without lots of changes on existing system. Group consist of some subgroups that subgroup manager manages for improving the efficiency of group management and message ordering is kept by using sequencer, Communication method among groups uses multicast based on paint to point communication as well as IP multicast and we provide high performance by using selective retransmission of message through message history, We analyze the performance of the proposed mechanism through simulation in distributed environment.

  • PDF