• Title/Summary/Keyword: Message filtering

Search Result 72, Processing Time 0.026 seconds

URL Filtering by Using Machine Learning

  • Saqib, Malik Najmus
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.275-279
    • /
    • 2022
  • The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.

SPAM Filtering for short Message Using Korean Character Alignment (한글 문자 단위 서열 정렬을 통한 스팸 문자 필터링)

  • Lim, Jin-Su;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1585-1587
    • /
    • 2011
  • 휴대전화 사용이 늘어나면서 이를 노리는 광고 문자 또한 많아지고 있다. 이를 막기 위해 대부분의 휴대전화가 스팸 차단 기능을 제공하고 있다. 허나 현재 제공되고 있는 스팸 차단 기능은 발신 번호가 같거나 설정 문구가 같은 경우에만 막아주는 기초적인 기능뿐이다. 그리고 광고 문자를 보내는 쪽은 이러한 차단 기능을 염두에 두고 변칙적인 문구를 사용해서 보내는 경우도 많다. 본 논문에서는 한글을 문자 단위로 서열 정렬하여 광고 문자를 차단하는 방법을 제안한다. 제안한 방법은 사용자가 등록한 문구를 수신한 문구에 대해 서열 정렬하고 이 결과를 바탕으로 유사도를 비교하여 차단하고자 하는 문구를 지닌 스팸 문자를 최대한 차단할 수 있다.

A Study on Internet Emergency Alert Distribution System Adaptive to the Receiver Characteristics (인터넷 기반의 수신자 맞춤형 재난경보 전달시스템 연구)

  • Ahn, Soyoung;Jeon, Inchan;Kim, Jihee;Lee, Yong Tae;Choi, Seong Jong
    • Journal of Broadcast Engineering
    • /
    • v.20 no.4
    • /
    • pp.598-605
    • /
    • 2015
  • Effective alerts will drastically mitigate the disaster impacts. One way to enhance the effectiveness is to prepare multiple alert distribution channels. In this paper, we propose a new emergency alert distribution system that will solve the weaknesses of the current distribution systems, such as Cell Broadcasting System and T-DMB Automatic Emergency Alert Service. The weaknesses are: the limitation of message length, small portions of terminals that can receive and display the alert signal, and one-way communication service. To solve these problems, we propose an emergency alert distribution system over the Internet with RSS (Rich Site Summary) format. The system also has the capability of adaptive alert filtering according to the receiver characteristics. We analyzed the characteristics of RSS as an alerting format, and draw functional requirements satisfying use case scenarios. We designed the system only with major requirements and verified it on our test bed. Sending richer message contents through various receiving terminals, the system will achieve more effective emergency alert service.

Zone-Based Wireless Link-K Network Structure and Routing for Supporting Mission Group (작전임무그룹 지원을 위한 Zone 기반 무선 Link-K 네트워크 구조 및 라우팅)

  • Cheon, Minhwan;Baek, Hoki;Jee, Seungbae;Kim, Sangjun;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.108-120
    • /
    • 2017
  • To this end, the ROK military is developing a Korean Tactical Data Link (Link-K) in two stages: Basic and Completion types. Currently, the basic type of the Link-K has a limitations for supporting Mission Group(MG)s, such as to share unnecessary information and inefficient routing, because all RICCs simply broadcasts the same information in the basic type of the Link-K. In this paper, we propose a Zone-based Wireless Link-K network structure and a routing algorithm. To improve the effectiveness of the proposed routing algorithm, we have studied a filtering method that adjusts the message data according to the priority of the message and a method of controlling the load of the network. In order to evaluate the performance of the proposed scheme, it is proved that it is effective to support the mission task group compared with the existing wireless Link-K routing algorithm according to the operational scenario situation.

A Survey of IEEE 1588 Time Synchronization Performance (IEEE 1588 시간 동기화 성능에 대한 조사)

  • Jahja, Rico Hartono;Jeon, Seong-Yong;Shin, Seok-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.2
    • /
    • pp.165-176
    • /
    • 2015
  • Clock or time synchronization protocol is one of the crucial factors that could determine the quality of the communication. With the rapid development of the network technology, more robust clock synchronization algorithm is required. IEEE 1588 is one of the possible solutions for a robust clock synchronization algorithm; however, there are still some challenges that need to be concerned in IEEE 1588 in term of reducing and stabilizing the PDV value. This survey paper shows several solutions that could improve the performance of IEEE 1588, including modifying the PTP message transmission, optimizing PTP method, filtering techniques, and using the hardware timestamp instead of application layer timestamp, and so on. Despite the improvement that is created with these techniques, the clock synchronization algorithm is still an open issue in the network communication.

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF

Filtering Algorithms for Position Evaluation and Tracking of Tactical Objects (전술객체 위치 모의 및 추적을 위한 필터링 알고리즘 연구)

  • Kim, Seok-Kwon;Jin, Seung-Ri;Son, Jae-Won;Park, Dong-Jo
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.199-208
    • /
    • 2010
  • Positions of tactical objects are represented as Time, Space and Position Information(TSPI) in modeling and simulations(M&S). The format and required information record for TSPI is investigated by referring the TSPI object model of the Test and Training Enabling Architecture(TENA), which has been developed by the United States Department of Defense. The most sophisticated tactical data link, Link-16 has a Precise Participant Location and Information (PPLI) message. We study the data format for exchanging TSPI data based on the PPLI message. To evaluate and track positions of tactical objects, we consider the Kalman filter for linear systems, and the extended Kalman filter and the unscented Kalman filter for nonlinear systems. Based on motion equations of a ballistic missile, the tracking performance for the trajectory of the ballistic missile is simulated by the unscented Kalman filter.

Design of a New Audio Watermarking System Based on Human Auditory System (청각시스템을 기반으로 한 새로운 오디오 워터마킹 시스템 설계)

  • Shin, Dong-Hwan;Shin Seung-Won;Kim, Jong-Weon;Choi, Jong-Uk;Kim, Duck-Young;Kim, Sung-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.7
    • /
    • pp.308-316
    • /
    • 2002
  • In this paper, we propose a robust digital copyright-protection technique based on the concept of human auditory system. First, we propose a watermarking technique that accepts the various attacks such as, time scaling, pitch shift, add noise and a lot of lossy compression such as MP3, AAC WMA. Second, we implement audio PD(portable device) for copyright protection using proposed method. The proposed watermarking technique is developed using digital filtering technique. Being designed according to critical band of HAS(human auditory system), the digital filers embed watermark without nearly affecting audio quality. Before processing of digital filtering, wavelet transform decomposes the input audio signal into several signals that are composed of specific frequencies. Then, we embed watermark in the decomposed signal (0kHz~11kHz) by designed band-stop digital filer. Watermarking detection algorithm is implemented on audio PD(portable device). Proposed watermarking technology embeds 2bits information per 15 seconds. If PD detects watermark '11', which means illegal song. PD displays "Illegal Song" message on LCD, skips the song and plays the next song, The implemented detection algorithm in PD requires 19 MHz computational power, 7.9kBytes ROM and 10kBytes RAM. The suggested technique satisfies SDMI(secure digital music initiative) requirements of platform3 based on ARM9E core.

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.