• Title/Summary/Keyword: Distribution Information Technology

Search Result 2,683, Processing Time 0.029 seconds

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

  • Choi, Sang-Yong;Kim, Daehyeok;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.422-435
    • /
    • 2016
  • Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today's cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribution. Researchers have proposed various methods for detecting a drive-by download attack effectively. However, existing methods have limitations against recent evasion techniques, including JavaScript obfuscation, hiding, and dynamic code evaluation. In this paper, we propose an emulation-based malicious webpage detection method. Based on our study on the limitations of the existing methods and the state-of-the-art evasion techniques, we will introduce four features that can detect malware distribution networks and we applied them to the proposed method. Our performance evaluation using a URL scan engine provided by VirusTotal shows that the proposed method detects malicious webpages more precisely than existing solutions.

Symbolic Cluster Analysis for Distribution Valued Dissimilarity

  • Matsui, Yusuke;Minami, Hiroyuki;Misuta, Masahiro
    • Communications for Statistical Applications and Methods
    • /
    • v.21 no.3
    • /
    • pp.225-234
    • /
    • 2014
  • We propose a novel hierarchical clustering for distribution valued dissimilarities. Analysis of large and complex data has attracted significant interest. Symbolic Data Analysis (SDA) was proposed by Diday in 1980's, which provides a new framework for statistical analysis. In SDA, we analyze an object with internal variation, including an interval, a histogram and a distribution, called a symbolic object. In the study, we focus on a cluster analysis for distribution valued dissimilarities, one of the symbolic objects. A hierarchical clustering has two steps in general: find out step and update step. In the find out step, we find the nearest pair of clusters. We extend it for distribution valued dissimilarities, introducing a measure on their order relations. In the update step, dissimilarities between clusters are redefined by mixture of distributions with a mixing ratio. We show an actual example of the proposed method and a simulation study.

A technology of realistic multi-media display and odor recognition using olfactory sensors (후각 센서를 이용한 냄새 인식 및 실감형 멀티미디어 표현 기술)

  • Lee, Hyeon Gu;Rho, Yong Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.33-43
    • /
    • 2010
  • In this paper, we propose a floral scent recognition using odor sensors and a odor display using odor distribution system. Proposed odor recognition has method of correlation coefficient between sensors that select optimal sensors in floral scent recognition system of selective multi-sensors. Proposed floral scent recognition system consists of four module such as floral scent acquisition module, optimal sensor decision module, entropy-based floral scent detection module, and floral scent recognition module. Odor distribution system consists of generation module of distribution information, control module of distribution, output module of distribution. We applied to floral scent recognition for performance evaluation of proposed sensors decision method. As a result, application of proposed method with floral scent recognition obtained recognition rate of 95.67% case of using 16 sensors while applied floral scent recognition system of proposed sensor decision method confirmed recognition rate of 96% using only 8 sensors. Also, we applied to odor display of proposed method and obtained 3.18 thorough MOS experimentation.

Power Control with Nearest Neighbor Nodes Distribution for Coexisting Wireless Body Area Network Based on Stochastic Geometry

  • Liu, Ruixia;Wang, Yinglong;Shu, Minglei;Zhao, Huiqi;Chen, Changfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5218-5233
    • /
    • 2018
  • The coexisting wireless body area networks (WBAN) is a very challenging issue because of strong inter-networks interference, which seriously affects energy consumption and spectrum utilization ratio. In this paper, we study a power control strategy with nearest neighbor nodes distribution for coexisting WBAN based on stochastic geometry. Using homogeneous Poisson point processes (PPP) model, the relationship between the transmission power and the networks distribution is analytically derived to reduce interference to other devices. The goal of this paper is to increase the transmission success probability and throughput through power control strategy. In addition, we evaluate the area spectral efficiency simultaneously active WBAN in the same channel. Finally, extensive simulations are conducted to evaluate the power control algorithm.

A Study on the Web-based Overall Information Management System Developement of the Overhead Distribution Facilities Using SIAS (SIAS를 이용한 웹 기반 가동배전설비 종합 정보관리 시스템 개발에 관한 연구)

  • Lee, Dong-Yeop;Kim, Dong-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.5
    • /
    • pp.898-904
    • /
    • 2009
  • The objective of the present study lies in constructing web-based GIS system providing broad range of information applicable for power/telecommunications distribution facilities through cable. Nowadays, Korea is renowned forits faste sttele communications network across the nation enjoyable for being a test-runbed by worldwide contents providers. It is not too much to say that the trend is caused by the fact that Korea utilizes the cobweb-like power transmission cables applicable for the nationwide telecommunications networking. In particular, the trend has been all the more encouraged by the governmental drive to expedite the telecommunication network by way of the established power transmission facilities deemed as publicutility. Nevertheless, few can deny that the overexcessive competition among telecommunication service providers increasingly gives rise to unauthorized, arbitrary facilitation of distribution devices, which becomes much burden in operating the normal power/telecommunications distribution facilities by a power-generating company. In this regard, the study, to cope with such problems, attempts to develop a web GIS-based information management system compatible with NDIS(New Distribution Information System), a distribution facility management system now under operation by KEPCO, making advantage of GE Energy's SIAS(Smallworld Internet Application) technology. The model provided by this study is expected to get closer into effective operation of distribution facilities along with better sharing of information among conventional telecommunications operators, while getting rid of infringed facilitation cases

Secret Key-Dimensional Distribution Mechanism Using Deep Learning to Minimize IoT Communication Noise Based on MIMO (MIMO 기반의 IoT 통신 잡음을 최소화하기 위해서 딥러닝을 활용한 비밀키 차원 분배 메커니즘)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.23-29
    • /
    • 2020
  • As IoT devices increase exponentially, minimizing MIMO interference and increasing transmission capacity for sending and receiving IoT information through multiple antennas remain the biggest issues. In this paper, secret key-level distribution mechanism using deep learning is proposed to minimize MIMO-based IoT communication noise. The proposed mechanism minimizes resource loss during transmission and reception process by dispersing IoT information sent and received through multiple antennas in batches using deep learning. In addition, the proposed mechanism applied a multidimensional key distribution processing process to maximize capacity through multiple antenna multiple stream transmission at base stations without direct interference between the APs. In addition, the proposed mechanism synchronizes IoT information by deep learning the frequency of use of secret keys according to the number of IoT information by applying the method of distributing secret keys in dimension according to the number of frequency channels of IoT information in order to make the most of the multiple antenna technology.

Smart Rectification on Satellite images

  • Seo, Ji-Hun;Jeong, Soo;Kim, Kyoung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.75-80
    • /
    • 2002
  • The mainly used technique to rectify satellite images with distortion is to develop a mathematical relationship between the pixel coordinates on the image and the corresponding points on the ground. By defining the relationship between two coordinate systems, a polynomial model is designed and various linear transformations are used. These GCP based geometric correction has performed overall plane to plane mapping. In the overall plane mapping, overall structure of a scene is considered, but local variation is discarded. The highly variant height of region is resampled with distortion in the rectified image. To solve this problem this paper proposed the TIN-based rectification on a satellite image. The TIN based rectification is good to correct local distortion, but insufficient to reflect overall structure of one scene. So, this paper shows the experimental result and the analysis of each rectification model. It also describes the relationship GCP distribution and rectification model. We can choose a geometric correction model as the structural characteristic of a satellite image and the acquired GCP distribution.

  • PDF

A Distributed LT Codes-based Data Transmission Technique for Multicast Services in Vehicular Ad-hoc Networks

  • Zhou, Yuan;Fei, Zesong;Huang, Gaishi;Yang, Ang;Kuang, Jingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.748-766
    • /
    • 2013
  • In this paper, we consider an infrastructure-vehicle-vehicle (I2V2V) based Vehicle Ad-hoc Networks (VANETs), where one base station multicasts data to d vehicular users with the assistance of r vehicular users. A Distributed Luby Transform (DLT) codes based transmission scheme is proposed over lossy VANETs to reduce transmission latency. Furthermore, focusing on the degree distribution of DLT codes, a Modified Deconvolved Soliton Distribution (MDSD) is designed to further reduce the transmission latency and improve the transmission reliability. We investigate the network behavior of the transmission scheme with MDSD, called MDLT based scheme. Closed-form expressions of the transmission latency of the proposed schemes are derived. Performance simulation results show that DLT based scheme can reduce transmission latency significantly compared with traditional Automatic Repeat Request (ARQ) and Luby Transform (LT) codes based schemes. In contrast to DLT based scheme, the MDLT based scheme can further reduce transmission latency and improve FER performance substantially, when both the source-to-relay and relay-to-sink channels are erasure channels.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Load Allocation Strategy for Command and Control Networks based on Interdependence Strength

  • Bo Chen;Guimei Pang;Zhengtao Xiang;Hang Tao;Yufeng Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2419-2435
    • /
    • 2023
  • Command and control networks(C2N) exhibit evident multi-network interdependencies owing to their complex hierarchical associations, interleaved communication links, and dynamic network changes. However, the existing command and control networks do not consider the effects of dependent nodes on the load distribution. Thus, we proposed a command and control networks load allocation strategy based on interdependence strength. First, a new measure of interdependence strength was proposed based on the edge betweenness, which was followed by proposing the inter-layer load allocation strategy based on the interdependence strength. Eventually, the simulation experiments of the aforementioned strategy were designed to analyze the network invulnerability with different initial load capacity parameters, allocation model parameters, and allocation strategies. The simulation indicates that the strategy proposed in this study improved the node survival rate of the interdependent command and control networks model and successfully prevented cascade failures.