• 제목/요약/키워드: Number of permission

검색결과 82건 처리시간 0.024초

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델 (The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control)

  • 임현수;조은애;문창주
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 추계학술대회 및 정기총회
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

An Empirical Study on the Impact of Permission Smell in Android Applications

  • Wu, Zhiqiang;Lee, Hakjin;Lee, Scott Uk-Jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권6호
    • /
    • pp.89-96
    • /
    • 2021
  • 본 논문에서는 개발자가 작성한 코드와 써드파티 라이브러리로 인해 발생하는 Permission Smell을 탐지하여 그 영향에 대해 다각적으로 분석했다. 이를 위해서 실제 구글 플레이 스토어에 존재하는 Android 앱로 구성된 대규모 데이터셋을 활용하여 존재하는 Permission Smell의 영향을 조사 및 분석하는 실증적 연구를 수행하였다. 연구 결과에 따르면 대다수의 안드로이드 앱에 Permission Smell이 존재하며 특히 써드파티 라이브러리는 개발자가 사용하지 않는 기능에 대해서도 권한을 요구하므로 이러한 Smell 들을 더 많이 발생시킨다. 또한, 대다수의 개발자는 써드파티 라이브러리로 인해 선언된 불필요한 권한을 올바르게 비활성화하지 않는다는 것을 파악하였다. 이러한 결과를 바탕으로 본 논문에서는 Permission Smell이 사용자 경험에 미치는 영향에 대해 논의한다. 결과적으로 불필요한 권한을 요구하는 앱이더라도 다운로드 횟수에 영향을 주지는 않았다. 그러나 불필요한 권한을 요구하는 앱들은 사용자들로부터 더 낮은 평가를 받았다.

Implementation of a MAC protocol in ATM-PON

  • Kim, Tea-Min;Shin, Gun-Soon
    • 한국정보통신학회논문지
    • /
    • 제8권3호
    • /
    • pp.586-597
    • /
    • 2004
  • MAC (Medium Access Control) protocol is necessary for a OLT (Optical Line Termination) to allocate bandwidth to ONUs (Optical Network Units) dynamically in ATM PON (Passive Optical Network) operated in a kind of optical subscriber network having tree topology. The OLT collect information about ONUs and provide all permission with each ONU effectively by means of MAC protocol. Major functions of MAC protocol are composed of the algorism for distributing permission demanded by a ONU dynamically and allocation all permission used in APON properly. Sometimes MAC get to be a element of limiting the whole operation speed and occupy a most frequent operation part of the TC (Transmission Convergence) function module so it have to be designed to guarantee the best quality for each traffic. This paper introduce the way of implementation of a algorism which satisfy all of the upper renditions. This MAC algorism allocate bandwidth according to a number of working ONU and the information of the queue length dynamically and distribute permission for same interval to minimize delay variation of each ONU cell. MAC scheduler for the dynamic bandwidth allocation which is introduced in this paper has look-up table structure that makes programming possible. This structure is very suitable for implementation and operated in high speed because it require very simple and small chip size.

Performance Analysis of Packet CDMA R-ALOHA for Multi-media Integration in Cellular Systems with Adaptive Access Permission Probability

  • Kyeong Hur;Eom, Doo-Seop;Tchah, Kyun-Hyon
    • 한국통신학회논문지
    • /
    • 제25권12B호
    • /
    • pp.2109-2119
    • /
    • 2000
  • In this paper, the Packet CDMA Reservation ALOHA protocol is proposed to support the multi-traffic services such as voice and videophone services with handoff calls, high-rate data and low-rate data services efficiently on the multi-rate transmission in uplink cellular systems. The frame structure, composed of the access slot and the transmission slot, and the proposed access permission probability based on the estimated number of contending users for each service are presented to reduce MAI. The assured priority to the voice and the videophone handoff calls is given through higher access permission probability. And through the proposed code assignment scheme, the voice service can be provided without the voice packet dropping probability in the CDMA/PRMA protocols. The code reservation is allowed to the voice and the videophone services. The low-rate data service uses the available codes during the silent periods of voice calls and the remaining codes in the codes assigned to the voice service to utilize codes efficiently. The high-rate data service uses the assigned codes to the high-rate data service and the remaining codes in the codes assigned to the videophone service. Using the Markov-chain subsystem model for each service including the handoff calls in uplink cellular systems, the steady-state performances are simulated and analyzed. After a round of tests for the examples, through the proposed code assignment scheme and the access permission probability, the Packet CDMA Reservation ALOHA protocol can guarantee the priority and the constant QoS for the handoff calls even at large number of contending users. Also, the data services are integrated efficiently on the multi-rate transmission.

  • PDF

동해 왕돌초 어장의 지속적 이용 및 관리 방안 (Sustainable Utilization and Management Scheme in Wangdol-cho Surrounding Sea Area)

  • 이광남;명정구
    • Ocean and Polar Research
    • /
    • 제25권3호
    • /
    • pp.331-345
    • /
    • 2003
  • The fishing ground surrounding Wangdol-cho is not only overexploited by the littering of dilapidated fishing net and equipment, but also by fishermen's overfishing, surpassing optimum fisheries resources. In addition, increasing fishing efforts (number of fishing vessel and fishing net, etc) contribute to the deterioration of fishing ground, and it is urgently required that schemes to tackle the problems should be taken. To effectively address the problems as such, this paper aims to propose sustainable utilization and management scheme of fishing ground through classification of fishing ground surrounding Wangdol-cho as one area which is less than 50m deep, measuring $13.66km^2$ and the other, permission fishing area of Gill Net fishery, measuring $347.23km^2$. The analysis shows that, for the water area less than 50m deep, implementation from a short-term perspective includes autonomous management fishery by gill net and trap fishery. For the permission fishing area of Gill Net fishery, implementation includes limit on fishing period, real name system of fishing equipment and limit on fishing equipment. Implementation from a medium and long-term perspective includes limit on scuba diving, designation of underwater sightseeing zone, sea farming, facilities of surveillance, adoption of approval system for the permission fishing area of Gill Net fishery and introduction of report system for fishing.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

국가지정문화재 역사문화환경 보존지역내 건축행위 등에 관한 허가심의 실태조사연구 - 최근 5년간(2010~2014) 문화재청 문화재위원회 회의록을 중심으로 - (Study on Status of Permission Review for Construction Activities within the National Cultural Property Historical Cultural Environment Preservation Area - Based on Recent 5 Years' (2010~2014) Meeting Records of Cultural Heritage Committee in Cultural Heritage Administration -)

  • 조홍석;박현준
    • 한국전통조경학회지
    • /
    • 제35권4호
    • /
    • pp.110-125
    • /
    • 2017
  • 1962년 문화재를 보존하여 이를 활용함으로써 국민의 문화수준향상을 도모하기 위하여 제정된 문화재보호법은 2000년 지정문화재를 대상으로 하는 대상적 범위의 극복을 위해 문화재 현상변경 허가제도를 도입, 이후 허가 절차 및 대상 등의 보완을 위해 역사문화환경 보존지역내 건축행위 등에 관한 허용기준 작성 지침 제정(2006), 국가지정문화재 주변 경미한 현상변경 행위 고시(2008) 등 지속적인 개선노력을 해오고 있다. 그럼에도 불구하고, 2007년 이후 감소세를 보이던 개별 현상변경 허가처리 건수는 2010년부터 다시 증가, 2014년에는 총 1554건이 접수되었고, 그 중 약 29%가 불허 또는 심의 중에 있는 것으로 확인, 문화재 주변 지역주민들의 주민 불편사항이 계속 제기되고 있다. 이에 본 연구는 최근 5년간(2010~2014) 문화재위원회 가운데 현상변경 관련 분야 5개 분과위원회(건축/사적/천기/근대/중민)의 허가 처리현황 전체 7,403건에 대한 통합DB를 구축, 그 가운데 역사문화환경 보존지역에서 이루어진 4,364건을 대상으로 심층분석을 실시하여 신청유형과 행위 유형 특성을 분석하고, 분석결과 유형화 및 시사점 도출을 통해 현상변경 허가대상을 규정하는 역사문화환경 보존지역 내 경미한 건축행위 등에 관한 기준과 문화재위원회 운영 지침의 개선방안을 검토하였다. 이를 통해, 단기적으로는 관련 행정처리기준의 보완과 더불어 시 군 구 위임사무범위 등의 제도개선방안 기초자료를 확보하는 한편, 역사문화환경 보존지역 내 건축행위 등의 허가제도 개선을 통한 행정효율성 제고 및 허가심의에 필요한 사회경제적 지출 최소화로 국민불편 경감효과를 기대한다.

공공데이터를 활용한 치과병의원 운영실태 연구: 광역자치단체와 특별자치단체의 인구를 중심으로 (The study about operation condition of dental hospital and clinics used public data : focus on population of local autonomous entity)

  • 유수빈;송봉규;양병은
    • 대한치과의사협회지
    • /
    • 제54권8호
    • /
    • pp.613-629
    • /
    • 2016
  • This study assayed regional distribution of dental hospital & dental clinics, the number of population & households per one dental hospital & clinic, operation condition & duration. This study used public data that display from 1946 years(the first dental clinic open in republic of korea) to 2016 years. We collected present condition of 21,686 dental hospital and clinics available in public data portal site on 28. Feb.2016. Data were classified by scale, location, permission year, operation duration of dental hospital & clinics and were analyzed using SPSS 20.0 program. Surveyed on Feb. 2016. Best top 10 regions of permission dental clinics are (1) Gangnam-gu, Seoul(1,337), (2) Seongnamsi, Gyeonggi-do(555), (3) Songpa-gu, Seoul(491), (4) Yeongdeungpo-gu, Seoul(472), (5) Suwon-si, Gyeonggi-do(443), (6) Seocho-gu, Seoul(428), (7) Nowon-gu, Seoul(417), (8) Goyang-si, Gyeonggi-do(413), (9) Jung-gu, Seoul(380), (10) Yongin-si, Gyeonggi-do(353). Whereas best top 10 regions of operating dental clinics are (1) Gangnam-gu, Seoul(581), (2) Seongnamsi, Gyeonggi-do(415), (3) Suwon-si, Gyeonggi-do(382), (4) Seocho-gu, Seoul(320), (5) Changwon-si, Gyeongsangnam-do(303), (6) Songpa-gu, Seoul(295) (7) Goyang-si, Gyeonggi-do(290), (8) Bucheon-si and Yongin-si, Gyeonggi-do(262), (9) Jeonju-si, Jeollabuk-do(224). Average population per one dental hospital & clinic by regional local government are 3,120 people. Best five region of population per one dental hospital & clinic are (1) Sejong-si(5,272), (2) Gangwon-do(4,653), (3) Chungcheongbuk-do(4,513), (4) Gyeongsangbuk-do(4,490), (5) Chungcheongnam-do(4,402). Average households per one dental hospital & clinic by regional local government are 1,316 households. Best three region of households per one dental hospital & clinic are (1) Sejong-si(2,126), (2) Gangwon-do(2,057), (3) Gyeongsangbuk-do(1,946). From 1946 to 1986, permission and operating dental hospital and clinics was steadily increasing. On 1986-1990, 1991-1995, permission, operation and closure of dental hospital and clinics increase rapidly. From the 2011-2015 to 2016(present), permission, operation and closure of dental hospital and clinics is decreasing. Average operating duration of closured dental hospital and clinics are 14.054 years. We need to map of dental hospital and clinics for open and operation of one, base on analyzed results. In an era of 30,000 dentist, we should to be concerned about operation of dental clinics in the light of past operating condition.

  • PDF