• Title/Summary/Keyword: Information Flow Analysis

Search Result 1,921, Processing Time 0.049 seconds

Secure Information Flow Analysis in Mini x86 Assembly Language (Mini x86 어셈블리어에서 보안 정보 흐름 분석)

  • Kim, Je Min;Kim, Ki Tae;Yoo, Weon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.87-98
    • /
    • 2009
  • This paper discuss secure information flow analysis and its visualization. Information leak is defined as existence of information flow from variables which have user's private informations to variables that anyone can access. Secure information flow analysis has been made to decide of whether the information leak is or not. There are many researches for secure information flow analysis concerning high level programming languages. But actually, programs that user executes don't have program source code represented in high level programming language. Thus there is need for analysis of program represented in low level language. More to analysis, visualization of analysis is very important. So, this paper discuss visualization of secure information flow analysis. In this paper, Mini x86 Assembly Language which is subset of x86 assembly language is defined and secure information flow analysis of program is proposed. In addition, this paper defines transfer function that is used for analysis and shows how to visualize control flow graph.

A Probabilistic Sampling Method for Efficient Flow-based Analysis

  • Jadidi, Zahra;Muthukkumarasamy, Vallipuram;Sithirasenan, Elankayer;Singh, Kalvinder
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.818-825
    • /
    • 2016
  • Network management and anomaly detection are challenges in high-speed networks due to the high volume of packets that has to be analysed. Flow-based analysis is a scalable method which reduces the high volume of network traffic by dividing it into flows. As sampling methods are extensively used in flow generators such as NetFlow, the impact of sampling on the performance of flow-based analysis needs to be investigated. Monitoring using sampled traffic is a well-studied research area, however, the impact of sampling on flow-based anomaly detection is a poorly researched area. This paper investigates flow sampling methods and shows that these methods have negative impact on flow-based anomaly detection. Therefore, we propose an efficient probabilistic flow sampling method that can preserve flow traffic distribution. The proposed sampling method takes into account two flow features: Destination IP address and octet. The destination IP addresses are sampled based on the number of received bytes. Our method provides efficient sampled traffic which has the required traffic features for both flow-based anomaly detection and monitoring. The proposed sampling method is evaluated using a number of generated flow-based datasets. The results show improvement in preserved malicious flows.

Preparing a Construction Cash Flow Analysis Using Building Information Modeling (BIM) Technology

  • Kim, Hyunjoo;Grobler, Francois
    • Journal of Construction Engineering and Project Management
    • /
    • v.3 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • Construction is a competitive industry and successful contractors must be able to win bids to obtain projects. Cash flow analysis not only determines actual profit at the end of the project, but also estimates required cash resources or cash ballances at the end of every month. Cash flow analysis is important in managing a construction project; however, it requires extensive information that is not immediately available to the general contractor. Before contractors can perform cash flow analysis, they must first complete a series of pre-requisites such as the quantity take off, scheduling, and cost estimating, followed by accurate assessments of project costs incurred and billable progress made. Consequently, cash flow analysis is currently a lengthy, uncertain process. This paper suggests improved cash flow analysis can be developed using data extraction in Building Information Modeling (BIM). BIM models contain a wealth of information and tools have been developed to automate a series of process such as quantity takeoff, scheduling, and estimating. This paper describes a prototype tool to support BIM-based, automated cash flow analysis.

Flow-based Real-time Traffic Monitoring and Analysis System (Flow 기반 실시간 트래픽 수집 및 분석 시스템)

  • Park, Sang-Hoon;Park, Jin-Wan;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1061-1064
    • /
    • 2007
  • 네트워크의 효율적인 관리를 위해서는 네트워크의 각 호스트에서 발생하는 트래픽을 실시간으로 모니터링 할 수 있는 시스템이 필요하다. 이러한 모니터링의 효율적인 방법 중 하나가 네트워크 장비에서 제공하는 flow 정보를 이용하는 방법이다. 하지만 이는 네트워크 장비의 과부하 발생, 운용비용 상승, 유연성 및 확장성 부족의 단점을 가진다. 이를 극복하기위하여 본 논문에서는 Enterprise 네트워크에 적합한 Flow 기반 실시간 트래픽 모니터링 시스템의 구조를 제안하고, 검증을 위해 구현한 내용을 기술한다. 본 시스템은 패킷을 수집하여 실시간으로 flow 정보를 생성하고 저장하는 Flow Generator 시스템, 저장된 flow 정보를 Analysis 시스템으로 전송하는 Flow Exporter 시스템, Traffic Analysis 시스템, 그리고 분석된 내용을 보여주는 Traffic Reporter 시스템으로 구성된다. 본 시스템은 다양한 분석 목적에 맞게 Flow 정보를 조절할 수 있는 유연성과 다양한 분석시스템을 구축할 수 있는 확장성을 가진다. 본 논문에서 기술한 시스템은 학교 Campus 네트워크를 대상으로 구축되었다.

  • PDF

Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty

  • Dong, Shi;Ding, Wei;Chen, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1649-1667
    • /
    • 2012
  • In order to improve the accuracy and universality of the flow metric correlation analysis, this paper firstly analyzes the characteristics of Internet flow metrics as random variables, points out the disadvantages of Pearson Correlation Coefficient which is used to measure the correlation between two flow metrics by current researches. Then a method based on Symmetrical Uncertainty is proposed to measure the correlation between two flow metrics, and is extended to measure the correlation among multi-variables. Meanwhile, the simulation and polynomial fitting method are used to reveal the threshold value between different correlation degrees for SU method. The statistical analysis results on the common flow metrics using several traces show that Symmetrical Uncertainty can not only represent the correct aspects of Pearson Correlation Coefficient, but also make up for its shortcomings, thus achieve the purpose of measuring flow metric correlation quantitatively and accurately. On the other hand, reveal the actual relationship among fourteen common flow metrics.

Data Flow Analysis of Secure Information-Flow in Core Imperative Programs (명령형 프로그램의 핵심부분에 대한 정보흐름 보안성의 데이타 흐름 분석)

  • 신승철;변석우;정주희;도경구
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.667-676
    • /
    • 2004
  • This paper uses the standard technique of data flow analysis to solve the problem of secure information-flow in core imperative programs. The existing methods tend to be overly conservative, giving “insecure” answers to many “secure” programs. The method described in this paper is designed to be more precise than previous syntactic approaches. The soundness of the analysis is proved.

The Effect of Fashion Brand Apps on Smartphones Flow and Consumer Satisfaction in Mobile Shopping (모바일 쇼핑에서 패션 브랜드 앱이 스마트폰 몰입과 소비자 만족에 미치는 영향)

  • Kang, Eunmi;Park, Eunjoo
    • Fashion & Textile Research Journal
    • /
    • v.18 no.6
    • /
    • pp.825-832
    • /
    • 2016
  • The purposes of this study was to investigate effects of fashion brand apps on smartphones flow and consumer satisfaction in mobile shopping. These findings provide new information to marketers for the marketing strategy for dealing with mobile shopping mall. A total of 233 usable questionnaires were obtained from men and women ages 20-30 who have mobile shopping purchasing experience. Data were analyzed by frequency analysis, factor analysis using SPSS for Window 22.0 and confirmatory factor analysis and structural equation model analysis by AMOS 22.0. The results were as follows. First, the analysis of fashion brand apps factors showed that it consist of 2 kinds of dimensions of basic information type and additional information type. Second, basic information type of fashion brand apps have had a direct impact on consumer satisfaction and did not affect the smartphones flow. Additional information type influence consumer satisfaction through a smartphones flow. Basic information type of fashion brand apps showed a greater impact on consumer satisfaction than a smartphone flow. A managerial implication was discussed for fashion brand marketers to develop strategies on fashion brand apps that could stimulate and increase the consumer flow and satisfaction.

Sensitivity Analysis of Debris Flow Simulation in Flo-2D Using Flow Discharge and Topographic Information (유량과 지형조건에 따른 Flo-2D에서의 토석류 확산 민감도 분석)

  • Kim, Namgyun;Jun, Byonghee
    • The Journal of Engineering Geology
    • /
    • v.32 no.4
    • /
    • pp.547-558
    • /
    • 2022
  • In August 2020, a debris flow occurred in Gokseon, Jeollanam-do, that resulted in the death of five residents. In this study area, high-resolution 0.03 m topographic information was generated through photogrammetry, and the amount of soil movement/loss was measured. In addition, sensitivity analysis was performed for flow depth, flow velocity, and debris flow area with the program Flo-2D using the difference in simulation parameter that discharge and topographic information. Wth increasing debris flow input discharge, increases were seen in flow depth, flow velocity, and debris flow area, as ell as in the gap in results from high-resolution topographic information and low-resolution topographic information. Also, when high-resolution topographic information was used, the results were similar to the actual (measured) flow direction of the debris flow. Therefore, the application of high-resolution topographic information increases the accuracy of the debris flow analysis results compared with low-resolution information. Results could be further imporved in the future by considering geological information such as yield stress and viscosity.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.

A Flow Analysis Framework for Traffic Video

  • Bai, Lu-Shuang;Xia, Ying;Lee, Sang-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.45-53
    • /
    • 2009
  • The fast progress on multimedia data acquisition technologies has enabled collecting vast amount of videos in real time. Although the amount of information gathered from these videos could be high in terms of quantity and quality, the use of the collected data is very limited typically by human-centric monitoring systems. In this paper, we propose a framework for analyzing long traffic video using series of content-based analyses tools. Our framework suggests a method to integrate theses analyses tools to extract highly informative features specific to a traffic video analysis. Our analytical framework provides (1) re-sampling tools for efficient and precise analysis, (2) foreground extraction methods for unbiased traffic flow analysis, (3) frame property analyses tools using variety of frame characteristics including brightness, entropy, Harris corners, and variance of traffic flow, and (4) a visualization tool that summarizes the entire video sequence and automatically highlight a collection of frames based on some metrics defined by semi-automated or fully automated techniques. Based on the proposed framework, we developed an automated traffic flow analysis system, and in our experiments, we show results from two example traffic videos taken from different monitoring angles.

  • PDF