• Title/Summary/Keyword: Number of permission

Search Result 82, Processing Time 0.029 seconds

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control (RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델)

  • Im Hyun-Soo;Cho Eun-Ae;Moon Chang-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

An Empirical Study on the Impact of Permission Smell in Android Applications

  • Wu, Zhiqiang;Lee, Hakjin;Lee, Scott Uk-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we proposed a sniffer to detect permission smells from developer and third-party libraries' code. Moreover, we conducted an empirical study to investigate unnecessary permissions on large real-world Android apps. Our analysis indicates that permission smell extensively exists in Android apps. According to the results, permission smells exist in most Android apps. In particular, third-party libraries request permission for functionalities that are not used by developers, which cause more smells. Moreover, most developers do not properly disable unnecessary permissions that are declared for third-party libraries. We discussed the impacts of permission smells on user experiences. As a result, the existence of permission smell does not impact the number of downloads. However, apps that have more unnecessary permissions have received lower ratings from users.

Implementation of a MAC protocol in ATM-PON

  • Kim, Tea-Min;Shin, Gun-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.586-597
    • /
    • 2004
  • MAC (Medium Access Control) protocol is necessary for a OLT (Optical Line Termination) to allocate bandwidth to ONUs (Optical Network Units) dynamically in ATM PON (Passive Optical Network) operated in a kind of optical subscriber network having tree topology. The OLT collect information about ONUs and provide all permission with each ONU effectively by means of MAC protocol. Major functions of MAC protocol are composed of the algorism for distributing permission demanded by a ONU dynamically and allocation all permission used in APON properly. Sometimes MAC get to be a element of limiting the whole operation speed and occupy a most frequent operation part of the TC (Transmission Convergence) function module so it have to be designed to guarantee the best quality for each traffic. This paper introduce the way of implementation of a algorism which satisfy all of the upper renditions. This MAC algorism allocate bandwidth according to a number of working ONU and the information of the queue length dynamically and distribute permission for same interval to minimize delay variation of each ONU cell. MAC scheduler for the dynamic bandwidth allocation which is introduced in this paper has look-up table structure that makes programming possible. This structure is very suitable for implementation and operated in high speed because it require very simple and small chip size.

Performance Analysis of Packet CDMA R-ALOHA for Multi-media Integration in Cellular Systems with Adaptive Access Permission Probability

  • Kyeong Hur;Eom, Doo-Seop;Tchah, Kyun-Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.12B
    • /
    • pp.2109-2119
    • /
    • 2000
  • In this paper, the Packet CDMA Reservation ALOHA protocol is proposed to support the multi-traffic services such as voice and videophone services with handoff calls, high-rate data and low-rate data services efficiently on the multi-rate transmission in uplink cellular systems. The frame structure, composed of the access slot and the transmission slot, and the proposed access permission probability based on the estimated number of contending users for each service are presented to reduce MAI. The assured priority to the voice and the videophone handoff calls is given through higher access permission probability. And through the proposed code assignment scheme, the voice service can be provided without the voice packet dropping probability in the CDMA/PRMA protocols. The code reservation is allowed to the voice and the videophone services. The low-rate data service uses the available codes during the silent periods of voice calls and the remaining codes in the codes assigned to the voice service to utilize codes efficiently. The high-rate data service uses the assigned codes to the high-rate data service and the remaining codes in the codes assigned to the videophone service. Using the Markov-chain subsystem model for each service including the handoff calls in uplink cellular systems, the steady-state performances are simulated and analyzed. After a round of tests for the examples, through the proposed code assignment scheme and the access permission probability, the Packet CDMA Reservation ALOHA protocol can guarantee the priority and the constant QoS for the handoff calls even at large number of contending users. Also, the data services are integrated efficiently on the multi-rate transmission.

  • PDF

Sustainable Utilization and Management Scheme in Wangdol-cho Surrounding Sea Area (동해 왕돌초 어장의 지속적 이용 및 관리 방안)

  • Lee, Kwang-Nam;Myoung, Jung-Goo
    • Ocean and Polar Research
    • /
    • v.25 no.3
    • /
    • pp.331-345
    • /
    • 2003
  • The fishing ground surrounding Wangdol-cho is not only overexploited by the littering of dilapidated fishing net and equipment, but also by fishermen's overfishing, surpassing optimum fisheries resources. In addition, increasing fishing efforts (number of fishing vessel and fishing net, etc) contribute to the deterioration of fishing ground, and it is urgently required that schemes to tackle the problems should be taken. To effectively address the problems as such, this paper aims to propose sustainable utilization and management scheme of fishing ground through classification of fishing ground surrounding Wangdol-cho as one area which is less than 50m deep, measuring $13.66km^2$ and the other, permission fishing area of Gill Net fishery, measuring $347.23km^2$. The analysis shows that, for the water area less than 50m deep, implementation from a short-term perspective includes autonomous management fishery by gill net and trap fishery. For the permission fishing area of Gill Net fishery, implementation includes limit on fishing period, real name system of fishing equipment and limit on fishing equipment. Implementation from a medium and long-term perspective includes limit on scuba diving, designation of underwater sightseeing zone, sea farming, facilities of surveillance, adoption of approval system for the permission fishing area of Gill Net fishery and introduction of report system for fishing.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

Study on Status of Permission Review for Construction Activities within the National Cultural Property Historical Cultural Environment Preservation Area - Based on Recent 5 Years' (2010~2014) Meeting Records of Cultural Heritage Committee in Cultural Heritage Administration - (국가지정문화재 역사문화환경 보존지역내 건축행위 등에 관한 허가심의 실태조사연구 - 최근 5년간(2010~2014) 문화재청 문화재위원회 회의록을 중심으로 -)

  • Cho, Hong-Seok;Park, Hyun-Joon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.4
    • /
    • pp.110-125
    • /
    • 2017
  • The Cultural Properties Protection Act enacted 1962 to encourge culture level of people by preserving and using cultural properties introduced Cultural Properties Change Permission System in 2000 in order to cope with rather targeted range towards the national designated cultural properties, and introduced the Guidelines for Permission Standard regarding Construction Activities within the Historical Cultural Environment Preservation Area (2006) to complement permission process and targets, Notification of Minor Changes around the National Designated Cultural Properties (2008), etc and continuously put efforts to improve further ever since. Nonetheless, while it showed decrease in the number of process of change permission per individual cases after 2007, it began to increase again since 2010, reaching 1,554 cases by 2014 - about 29% of the cases being rejected or under observation, people living surrounding of cultural properties still experience inconveniences. This study has been carried out by creating integrated DB with total 7,403 cases of permission status from 5 Subcommittees (Building / Historic Sites / Natural Heritage / Modern Cultural Heritage / Important Folk Culture) in Cultural Heritage Committee that are related with changing status for the past 5 years (2010-2014), and by further analyzing 4,364 cases amongst, that were reviewed within historical and cultural environment preservation area - analyzed applying types and the characteristics, reviewed the improvement plans of operation guidelines for the Committee and acts of minor changes towards surroundings of the national designated cultural properties that regulate the status changing permission targets by categorizing analysis results and deriving implications. I hope that this will complement to the operational guidelines for the Committee, along with minor changing activities around cultural properties in short term, and to secure basic data for systematic improvement plans ie., for delegated works range from city/county/districts through our research. Also hope to improve administrative efficiency by reforming permission systems for building activities in historic cultural environment conservation area, and reduce inconvenience people might experience, by minimizing socioeconomic expense needed for the review.

The study about operation condition of dental hospital and clinics used public data : focus on population of local autonomous entity (공공데이터를 활용한 치과병의원 운영실태 연구: 광역자치단체와 특별자치단체의 인구를 중심으로)

  • Yu, Su-Been;Song, Bong-Gyu;Yang, Byoung-Eun
    • The Journal of the Korean dental association
    • /
    • v.54 no.8
    • /
    • pp.613-629
    • /
    • 2016
  • This study assayed regional distribution of dental hospital & dental clinics, the number of population & households per one dental hospital & clinic, operation condition & duration. This study used public data that display from 1946 years(the first dental clinic open in republic of korea) to 2016 years. We collected present condition of 21,686 dental hospital and clinics available in public data portal site on 28. Feb.2016. Data were classified by scale, location, permission year, operation duration of dental hospital & clinics and were analyzed using SPSS 20.0 program. Surveyed on Feb. 2016. Best top 10 regions of permission dental clinics are (1) Gangnam-gu, Seoul(1,337), (2) Seongnamsi, Gyeonggi-do(555), (3) Songpa-gu, Seoul(491), (4) Yeongdeungpo-gu, Seoul(472), (5) Suwon-si, Gyeonggi-do(443), (6) Seocho-gu, Seoul(428), (7) Nowon-gu, Seoul(417), (8) Goyang-si, Gyeonggi-do(413), (9) Jung-gu, Seoul(380), (10) Yongin-si, Gyeonggi-do(353). Whereas best top 10 regions of operating dental clinics are (1) Gangnam-gu, Seoul(581), (2) Seongnamsi, Gyeonggi-do(415), (3) Suwon-si, Gyeonggi-do(382), (4) Seocho-gu, Seoul(320), (5) Changwon-si, Gyeongsangnam-do(303), (6) Songpa-gu, Seoul(295) (7) Goyang-si, Gyeonggi-do(290), (8) Bucheon-si and Yongin-si, Gyeonggi-do(262), (9) Jeonju-si, Jeollabuk-do(224). Average population per one dental hospital & clinic by regional local government are 3,120 people. Best five region of population per one dental hospital & clinic are (1) Sejong-si(5,272), (2) Gangwon-do(4,653), (3) Chungcheongbuk-do(4,513), (4) Gyeongsangbuk-do(4,490), (5) Chungcheongnam-do(4,402). Average households per one dental hospital & clinic by regional local government are 1,316 households. Best three region of households per one dental hospital & clinic are (1) Sejong-si(2,126), (2) Gangwon-do(2,057), (3) Gyeongsangbuk-do(1,946). From 1946 to 1986, permission and operating dental hospital and clinics was steadily increasing. On 1986-1990, 1991-1995, permission, operation and closure of dental hospital and clinics increase rapidly. From the 2011-2015 to 2016(present), permission, operation and closure of dental hospital and clinics is decreasing. Average operating duration of closured dental hospital and clinics are 14.054 years. We need to map of dental hospital and clinics for open and operation of one, base on analyzed results. In an era of 30,000 dentist, we should to be concerned about operation of dental clinics in the light of past operating condition.

  • PDF