• Title/Summary/Keyword: Library Big Data

Search Result 98, Processing Time 0.024 seconds

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Utilization of machining templates to improve 5-axis CAM machining process (5축 CAM 가공 작업 프로세스 개선을 위한 가공 템플릿 활용)

  • Lee, Dong-Cheon;Kim, Seon-Yong
    • Design & Manufacturing
    • /
    • v.11 no.1
    • /
    • pp.45-49
    • /
    • 2017
  • Currently, a lot of efforts to make increases the manufacturing efficiency have tried and there is growing the interest to implementing the machining operation through CAM automation and optimization. This kind of movement has shown gradually in 5X milling as well as 3X milling task. By the way, in case of 5X milling, it is difficult to hire the CAM experts who is an experience for 5X machining and also it has too big trouble to use them due to high cost. For this reason, you can see the manufacturer who is concern the CAM S/W to provide the NC automation program that beginners can generate easily the 5X milling in short term and the existing 5X milling process can be improved. These requirements need to make a NC automation process including the practical machining strategies same as the generation by NC expert. In order to support this, it is necessary to directly apply the 3D machining part based on NC template which includes the machining procedures, standard cutter library, auto machine area selection, analyze tool for part shape, machining condition setting considering the material stiffness to be provided by CimatronE and it should be created the 5axis machining data by a minimized operation. With user-friendly, CimatronE's NC machining automation tools improve the 5-axis machining process and speed up the process, maximizing work efficiency and improving product productivity compared to existing machining tasks.

Comparison of Physics Model for 600 MeV Protons and 290 MeV·n-1 Oxygen Ions on Carbon in MCNPX

  • Lee, Arim;Kim, Donghyun;Jung, Nam-Suk;Oh, Joo-Hee;Oranj, Leila Mokhtari;Lee, Hee-Seock
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.2
    • /
    • pp.123-131
    • /
    • 2016
  • Background: With the increase in the number of particle accelerator facilities under either operation or construction, the accurate calculation using Monte Carlo codes become more important in the shielding design and radiation safety evaluation of accelerator facilities. Materials and Methods: The calculations with different physics models were applied in both of cases: using only physics model and using the mix and match method of MCNPX code. The issued conditions were the interactions of 600 MeV proton and $290MeV{\cdot}n^{-1}$ oxygen with a carbon target. Both of cross-section libraries, JENDL High Energy File 2007 (JENDL/HE-2007) and LA150, were tested in this calculation. In the case of oxygen ion interactions, the calculation results using LAQGSM physics model and JENDL/HE-2007 library were compared with D. Satoh's experimental data. Other Monte Carlo calculations using PHITS and FLUKA codes were also carried out for further benchmarking study. Results and Discussion: It was clearly found that the physics models, especially intra-nuclear cascade model, gave a great effect to determine proton-induced secondary neutron spectrum in MCNPX code. The variety of physics models related to heavy ion interactions did not make big difference on the secondary particle productions. Conclusion: The variations of secondary neutron spectra and particle transports depending on various physics models in MCNPX code were studied and the result of this study can be used for the shielding design and radiation safety evaluation.

Analysis of the Research Trends by Environmental Spatial-Information Using Text-Mining Technology (텍스트 마이닝 기법을 활용한 환경공간정보 연구 동향 분석)

  • OH, Kwan-Young;LEE, Moung-Jin;PARK, Bo-Young;LEE, Jung-Ho;YOON, Jung-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.1
    • /
    • pp.113-126
    • /
    • 2017
  • This study aimed to quantitatively analyze the trends in environmental research that utilize environmental geospatial information through text mining, one of the big data analysis technologies. The analysis was conducted on a total of 869 papers published in the Republic of Korea, which were collected from the National Digital Science Library (NDSL). On the basis of the classification scheme, the keywords extracted from the papers were recategorized into 10 environmental fields including "general environment", "climate", "air quality", and 20 environmental geospatial information fields including "satellite image", "numerical map", and "disaster". With the recategorized keywords, their frequency levels and time series changes in the collected papers were analyzed, as well as the association rules between keywords. First, the results of frequency analysis showed that "general environment"(40.85%) and "satellite image"(24.87%) had the highest frequency levels among environmental fields and environmental geospatial information fields, respectively. Second, the results of the time series analysis on environmental fields showed that the share of "climate" between 1996 and 2000 was high, but since 2001, that of "general environment" has increased. In terms of environmental geospatial information fields, the demand for "satellite image" was highest throughout the period analyzed, and its utilization share has also gradually increased. Third, a total of 80 correlation rules were generated for environmental fields and environmental geospatial information fields. Among environmental fields, "general environment" generated the highest number of correlation rules (17) with environmental geospatial information fields such as "satellite image" and "digital map".

Analysis of Research Trends of 'Word of Mouth (WoM)' through Main Path and Word Co-occurrence Network (주경로 분석과 연관어 네트워크 분석을 통한 '구전(WoM)' 관련 연구동향 분석)

  • Shin, Hyunbo;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.179-200
    • /
    • 2019
  • Word-of-mouth (WoM) is defined by consumer activities that share information concerning consumption. WoM activities have long been recognized as important in corporate marketing processes and have received much attention, especially in the marketing field. Recently, according to the development of the Internet, the way in which people exchange information in online news and online communities has been expanded, and WoM is diversified in terms of word of mouth, score, rating, and liking. Social media makes online users easy access to information and online WoM is considered a key source of information. Although various studies on WoM have been preceded by this phenomenon, there is no meta-analysis study that comprehensively analyzes them. This study proposed a method to extract major researches by applying text mining techniques and to grasp the main issues of researches in order to find the trend of WoM research using scholarly big data. To this end, a total of 4389 documents were collected by the keyword 'Word-of-mouth' from 1941 to 2018 in Scopus (www.scopus.com), a citation database, and the data were refined through preprocessing such as English morphological analysis, stopwords removal, and noun extraction. To carry out this study, we adopted main path analysis (MPA) and word co-occurrence network analysis. MPA detects key researches and is used to track the development trajectory of academic field, and presents the research trend from a macro perspective. For this, we constructed a citation network based on the collected data. The node means a document and the link means a citation relation in citation network. We then detected the key-route main path by applying SPC (Search Path Count) weights. As a result, the main path composed of 30 documents extracted from a citation network. The main path was able to confirm the change of the academic area which was developing along with the change of the times reflecting the industrial change such as various industrial groups. The results of MPA revealed that WoM research was distinguished by five periods: (1) establishment of aspects and critical elements of WoM, (2) relationship analysis between WoM variables, (3) beginning of researches of online WoM, (4) relationship analysis between WoM and purchase, and (5) broadening of topics. It was found that changes within the industry was reflected in the results such as online development and social media. Very recent studies showed that the topics and approaches related WoM were being diversified to circumstantial changes. However, the results showed that even though WoM was used in diverse fields, the main stream of the researches of WoM from the start to the end, was related to marketing and figuring out the influential factors that proliferate WoM. By applying word co-occurrence network analysis, the research trend is presented from a microscopic point of view. Word co-occurrence network was constructed to analyze the relationship between keywords and social network analysis (SNA) was utilized. We divided the data into three periods to investigate the periodic changes and trends in discussion of WoM. SNA showed that Period 1 (1941~2008) consisted of clusters regarding relationship, source, and consumers. Period 2 (2009~2013) contained clusters of satisfaction, community, social networks, review, and internet. Clusters of period 3 (2014~2018) involved satisfaction, medium, review, and interview. The periodic changes of clusters showed transition from offline to online WoM. Media of WoM have become an important factor in spreading the words. This study conducted a quantitative meta-analysis based on scholarly big data regarding WoM. The main contribution of this study is that it provides a micro perspective on the research trend of WoM as well as the macro perspective. The limitation of this study is that the citation network constructed in this study is a network based on the direct citation relation of the collected documents for MPA.

SNS Effect of the negative event on the Firm Performance: Comparison between Pre and Post SNS media appearance

  • Kim, Sang Yong;Lee, Da Eun
    • Asia Marketing Journal
    • /
    • v.16 no.1
    • /
    • pp.21-33
    • /
    • 2014
  • When the negative event is published, the company tends to go through the negative impact on the firm performance. Especially, with the SNS, the negative event is instantly spread on indefinite region so the impact seems bigger than the period before the SNS media appearance. It seems that everyone considers the SNS media impact on the firm performance quite big. However, there has been no empirical study on the impact comparison on the firm performance between pre and post SNS media occurrence periods. This study tries to empirically compare the impact of the negative event on the firm performance between pre and post SNS media appearance. Our study starts fromthe basic but not verified question; Does really the negative event have more negative impact in the post-SNS-occurrence period than in the pre-SNS-occurrence period? In order to examine the impact of the negative publicity on firm performance in two eras, pre and post SNS media appearance, we used CAR (Cumulative Abnormal Resturns) model. By using this model, we could verify the statistical significance of cumulative abnormal returns in market between before and after the events. For event samples, we focused on food manufacturers and collected the negative events from 1991 to 2003 for pre-SNS occurrence period, and from 2010 to 2013 for post-SNS occurrence period. Based on the listed food companies at KOSPI, we researched Naver News Library (newslibrary.naver.com) and Naver News (news.naver.com) for all the individual negative events published for both periods. Firm returns data were collected from TS 2000 (KOCO Info) and market portfolio data were collected from KRX Exchange. Through our empirical analysis, our finding is interesting to note that the type of events differently influences on the firm performance. With the SNS, the health-related events have influence on the firm performance 'after the event day' whereas the company behavior trust events have influence 'before the event day'. Our findings have implications for management. When a negative event directly related to or threatening customers or their life such as health, it is crucial to fix up the situation right after the event occurs. On the other hand, when a negative event is not publicly available information such as company behavior trust, it is important for marketers to strengthen the firms' trust reputation and control the bad WOM before the event.

  • PDF

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.