• Title/Summary/Keyword: Files

Search Result 2,031, Processing Time 0.025 seconds

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

Implementation and Verification of Multi-level Convolutional Neural Network Algorithm for Identifying Unauthorized Image Files in the Military (국방분야 비인가 이미지 파일 탐지를 위한 다중 레벨 컨볼루션 신경망 알고리즘의 구현 및 검증)

  • Kim, Youngsoo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.858-863
    • /
    • 2018
  • In this paper, we propose and implement a multi-level convolutional neural network (CNN) algorithm to identify the sexually explicit and lewdness of various image files, and verify its effectiveness by using unauthorized image files generated in the actual military. The proposed algorithm increases the accuracy by applying the convolutional artificial neural network step by step to minimize classification error between similar categories. Experimental data have categorized 20,005 images in the real field into 6 authorization categories and 11 non-authorization categories. Experimental results show that the overall detection rate is 99.51% for the image files. In particular, the excellence of the proposed algorithm is verified through reducing the identification error rate between similar categories by 64.87% compared with the general CNN algorithm.

Multiple Register Files for Fast Context Switching in Real-Time Systems (실시간 시스템에서 빠른 문맥 전환을 위한 다중 레지스터 파일)

  • Kim, Jong-Wung;Cho, Jeoung-Hun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.128-135
    • /
    • 2010
  • Recently complexity of embedded software cause to be used real-time operating system (RTOS) to implement various functions in the embedded system. And also, according to requirement of complex functions in embedded systems, the number as well as complexity of tasks get increased continuously. In case that many tasks collaborated in a microprocessor, context switching time between tasks is a overhead waisting a CPU resource. Therefore the time of task context switching is an important factor that affects performance of RTOS. In this paper, we concentrate on the improvement of task context switch for reducing overhead and achieving fast response time in RTOS. To achieve these goal, we suggest multiple register files and task context switching algorithm. By reducing the context switch overhead, we try to ease scheduling and assure fast response times in multitasking environment. As a result, the context switch overhead decreased by 8~16% depend on the number of register files, and some task set which are not schedulable with single register file are schedulable due to that decrease with multiple register files.

A File System Architecture for Enriched Metadata in Portable Multimedia Devices (휴대용 멀티미디어 기기에서 메타데이터 활용을 강화한 파일 시스템 구조)

  • Yoon, Hyeon-Ju
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • In this paper, we developed a file system architecture for portable multimedia devices. To enhance user convenience, the information about the stored files should be easily retrieved and organized. We defined NMD (Networked MetaData), which can organize the files in networked fashion by attaching user-defined attributes and relation between files. The NMD is stored in flash memory to utilize its nonvolatile property and low-power consumption, while multimedia files are stored in hard disk, an inexpensive mass storage. The experimental implementation showed that this architecture was able to save about 10% power compared to the hard disk NMD-store.

  • PDF

A Study on the Bibliographic Description of the Computer Files (컴퓨터파일에 대한 서지기술 연구)

  • 이명규
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.2
    • /
    • pp.187-206
    • /
    • 2001
  • This research intends to provide a basis which will lay the foundation of Cataloguing Rules for computer files by comparing the current cataloguing rules. Towards this goal, I researched both the major characteristics and various kinds of computer files. Secondly, I compared and analyzed the AACR2R and the ISBN(ER), which constitute the root and the trunk of cataloguing rules for computer no from a source of information to note area in the ISBD. This study finally examined the development process of cataloguing rules as well as the content of change in computer files.

  • PDF

Efficient Multimedia Data File Management and Retrieval Strategy on Big Data Processing System

  • Lee, Jae-Kyung;Shin, Su-Mi;Kim, Kyung-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.77-83
    • /
    • 2015
  • The storage and retrieval of multimedia data is becoming increasingly important in many application areas including record management, video(CCTV) management and Internet of Things (IoT). In these applications, the files containing multimedia that need to be stored and managed is tremendous and constantly scaling. In this paper, we propose a technique to retrieve a very large number of files, in multimedia format, using the Hadoop Framework. Our strategy is based on the management of metadata that describes the characteristic of files that are stored in Hadoop Distributed File System (HDFS). The metadata schema is represented in Hbase and looked up using SQL On Hadoop (Hive, Tajo). Both the Hbase, Hive and Tajo are part of the Hadoop Ecosystem. Preliminary experiment on multimedia data files stored in HDFS shows the viability of the proposed strategy.

Semantic Similarity-Based Contributable Task Identification for New Participating Developers

  • Kim, Jungil;Choi, Geunho;Lee, Eunjoo
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.4
    • /
    • pp.228-234
    • /
    • 2018
  • In software development, the quality of a product often depends on whether its developers can rapidly find and contribute to the proper tasks. Currently, the word data of projects to which newcomers have previously contributed are mainly utilized to find appropriate source files in an ongoing project. However, because of the vocabulary gap between software projects, the accuracy of source file identification based on information retrieval is not guaranteed. In this paper, we propose a novel source file identification method to reduce the vocabulary gap between software projects. The proposed method employs DBPedia Spotlight to identify proper source files based on semantic similarity between source files of software projects. In an experiment based on the Spring Framework project, we evaluate the accuracy of the proposed method in the identification of contributable source files. The experimental results show that the proposed approach can achieve better accuracy than the existing method based on comparison of word vocabularies.

A Pragmatic Framework for Predicting Change Prone Files Using Machine Learning Techniques with Java-based Software

  • Loveleen Kaur;Ashutosh Mishra
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.457-496
    • /
    • 2020
  • This study aims to extensively analyze the performance of various Machine Learning (ML) techniques for predicting version to version change-proneness of source code Java files. 17 object-oriented metrics have been utilized in this work for predicting change-prone files using 31 ML techniques and the framework proposed has been implemented on various consecutive releases of two Java-based software projects available as plug-ins. 10-fold and inter-release validation methods have been employed to validate the models and statistical tests provide supplementary information regarding the reliability and significance of the results. The results of experiments conducted in this article indicate that the ML techniques perform differently under the different validation settings. The results also confirm the proficiency of the selected ML techniques in lieu of developing change-proneness prediction models which could aid the software engineers in the initial stages of software development for classifying change-prone Java files of a software, in turn aiding in the trend estimation of change-proneness over future versions.

A Distributed Cache Management Scheme for Efficient Accesses of Small Files in HDFS (HDFS에서 소형 파일의 효율적인 접근을 위한 분산 캐시 관리 기법)

  • Oh, Hyunkyo;Kim, Kiyeon;Hwang, Jae-Min;Park, Junho;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.28-38
    • /
    • 2014
  • In this paper, we propose the distributed cache management scheme to efficiently access small files in Hadoop Distributed File Systems(HDFS). The proposed scheme can reduce the number of metadata managed by a name node since many small files are merged and stored in a chunk. It is also possible to reduce the file access costs, by keeping the information of requested files using the client cache and data node caches. The client cache keeps small files that a user requests and metadata. Each data node cache keeps the small files that are frequently requested by users. It is shown through performance evaluation that the proposed scheme significantly reduces the processing time over the existing scheme.

EFFECT OF VARIOUS CANAL PREPARATION TECHNIQUES USING ROTARY NICKEL-TITANIUM FILES ON THE MAINTENANCE OF CANAL CURVATURE (수종의 엔진구동형 Nickel-Titanium file을 이용한 근관형성 방법이 근관만곡도 유지능력에 미치는 영향)

  • Lee, Cheol-Hwan;Cho, Kyung-Mo;Hong, Chan-Ui
    • Restorative Dentistry and Endodontics
    • /
    • v.28 no.1
    • /
    • pp.41-49
    • /
    • 2003
  • There are increasing usage of Nickel-Titanium rotary files in modern clinical endodontic treatment because it is effective and faster than hand filing due to reduced step. This study was conducted to evaluate the effect of canal preparations using 3 different rotary Nickel-Titanium files that has different cross sectional shape and taper on the maintenance of canal curvature. Simulated resin block were instrumented with Profile(Dentsply, USA), GT rotary files(Dentsply, USA), Hero 642(Micro-Mega France), and Pro-Taper(Dentsply, USA). The image of Pre-instrumentation and Post-instrumentation were acquired using digital camera and overspreaded in the computer. Then the total differences of canal diameter, deviation at the outer portion of curvature, deviation at the inner portion of curvature, movement of center of the canal and the centering ratio at the pre-determined level from the apex were measured. Results were statistically analyzed by means of ANOVA, followed by Scheffe test at a significance level of 0.05. The results were as follows; 1. Deviation at the outer portion of curvature, deviation at the inner portion of curvature were showed largest in Pro-Taper so also did in the total differences of canal diameter(p<0.05). 2. All the groups showed movements of center Profile combined with GT rotary files and Hero 642 has no difference but Pro-Taper showed the most deviation(p<0.05). 3. At the 1, 2, 3mm level from the apex movements of center directed toward the outer portion of curvature, but in 4, 5 mm level directed toward the inner portion of curvature(p<0.05). As a results of this study, it could be concluded that combined use of other Nickel-Titanium rotary files is strongly recommended when use Pro-Taper file because it could be remove too much canal structure and also made more deviation of canal curvature than others.