• Title/Summary/Keyword: Session-based

Search Result 1,140, Processing Time 0.026 seconds

Tree-based Navigation Pattern Analysis

  • Choi, Hyun-Jip
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.1
    • /
    • pp.271-279
    • /
    • 2001
  • Sequential pattern discovery is one of main interests in web usage mining. the technique of sequential pattern discovery attempts to find inter-session patterns such that the presence of a set of items is followed by another item in a time-ordered set of server sessions. In this paper, a tree-based sequential pattern finding method is proposed in order to discover navigation patterns in server sessions. At each learning process, the suggested method learns about the navigation patterns per server session and summarized into the modified Rymon's tree.

  • PDF

CR-SeMMS: Cost-Reduced Secure Mobility Management Scheme Based on SIP in NEMO Environments (CR-SeMMS : NEMO환경에서 SIP에 기반한 비용절감의 안전한 이동성관리 기법)

  • Cho, Chul-Hee;Jong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • The mobile Virtual Private Network (MVPN) of Internet Engineering Task Force (IETF) is not designed to support NEwork MObility (NEMO) and is not suitable for real-time applications. Therefore, an architecture and protocol which supports VPN in NEMO are needed. In this paper, we proposed the cost-reduced secure mobility management scheme (CR-SeMMS) which is designed for real-time applications in conjunction with VPN and also which is based on the session initiation protocol (SIP). Our scheme is to support MVPN in NEMO, so that the session is well maintained while the entire network is moved. Further, in order to reduce the authentication delay time which considers as a delaying factor in hands-off operations, the signaling time which occurs to maintain the session is shortened through proposing the hands-off scheme adopting an authentication method based on HMAC based One Time Password (HOTP). Finally, our simulation results show the improvement of the average hands-off performance time between our proposed scheme and the existing schemes.

Pilot Study of Single Session Song-Based Music Therapy for Decreasing ICU Caregiver Anxiety (중환자 보호자의 불안 감소를 위한 단회기 노래중심 음악치료 적용 예비연구)

  • Jung, Yu Sun;Na, Sungwon
    • Journal of Music and Human Behavior
    • /
    • v.16 no.1
    • /
    • pp.25-46
    • /
    • 2019
  • This pilot study involved a single session of song-based music therapy to relieve the anxiety of intensive care unit (ICU) caregivers. Six caregivers of ICU patients participated in the intervention session individually. During the initial stage of the intervention, the participants' current emotional states were identified. Then they listened to familiar songs and playing a tone chime, which was intended to help them relax their body and reduce their psychological resistance. During singing experiences as an essential part of the intervention, the participants discussed the lyrics of songs in an attempt to find the meaning related to them. Also, they sang the songs with a live accompaniment in which their emotional states were reflected with changes in musical elements (e.g., tempo, dynamics, rhythm, or chords). In the final stage, they identified personal application to their everyday lives. To analyze the results, the State-Trait Anxiety Inventory (STAI) and a visual analog scale on emotional states were completed by participants before and after the session, and participants' verbal responses during the session were also recorded. According to the results, STAI anxiety scores significantly declined following the session. Also, they showed significant increases in positive emotions and significant decreases in negative emotions. This suggests that short-term music therapy can be an effective intervention for relieving the psychological distress of ICU caregivers.

A Session Allocation Algorithm for Fair Bandwidth Distribution of Multiple Shared Links (다중 공유 링크들의 공정한 대역폭 분배를 위한 세션할당 알고리즘)

  • Shim, Jae-Hong;Choi, Kyung-Hee;Jung, Gi-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.253-262
    • /
    • 2004
  • In this paper, a session allocation algorithm for a switch with multiple shared links is proposed. The algorithm guarantees the reserved bandwidth to each service class and keeps the delay of sessions belonging to a service class as close as possible even if the sessionsare allocated to different shared links. To support these qualities of services, a new scheduling model for multiple shared links is defined and a session allocation algorithm to decide a shared link to be allocated to a new session on the connection establishmentis developed based on the model. The proposed heuristic algorithm allocates a session to a link including the subclass with the shortest (expected) delay that subclasses of the service class the session belongs to will experience. Simulation results verify that a switch with multiple shared links hiring the proposed algorithm provides service classes with fairer bandwidth allocation and higher throughput, and guarantees reserved bandwidth better than the switch hiring other session algorithms. It also guarantees very similarservice delay to the sessions in the same service class.

A Design of Protocol Management System for Aggregating Messages based on Certification between Vehicles (차량간 인증 기반 메시지 집계 프로토콜 관리시스템 설계)

  • Lee, ByungKwan;Jeong, EunHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.43-51
    • /
    • 2013
  • This paper proposes the design of protocol management system for aggregationg messages based on certification between vehicles which not only prevents the messages between vehicles from being forged and altered by Sybil attack by authenticating the them, and but also provides the efficient communication by aggregating the redundant vehicle messages which frequently happens when communicating. For this, the proposed system proposes the SKLC(Session Key Local Certificate) design which is a local certificate based on a session key, and the MAP(Message Aggregation Protocol) design which aggregates the redundant vehicle messages. Therefore, when the proposed system checks the certificate of vehicle, it provides the reliable information securely by verifying the integrity of vehicle with a hash function operation, and improves communication efficiency by reducing the processing time.

A Study on the Implementation of SIP based new Integrated Instant Messenger (SIP 기반의 새로운 통합 인스턴트 메신저 구현에 관한 연구)

  • Jo, Hyun-Gyu;Lee, Ky-Soo;Jang, Choon-Seo
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.371-378
    • /
    • 2004
  • SIP(Session Initiation Protocol) is a text based call signaling protocol that has characteristics such as flexibilities and extensibility for various application services over Internet. In this paper, we have implemented SIP based integrated Instant Messenger system which includes Presence Watcher Information service that can notify various current users status. In this system, voice and video communications are also possible as well as text based instant messages. For voice and video communication, we have newly proposed a method in which direct connection is possible between users without creation of SW INVITE dialog by extending PRESENCE TUPLE of presence information. In this case, PRESENCE TUPLE stores some informations necessary for the session.

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

PMIPv6 Global Handover Mechanism using Multicast Source Based Forwarding (멀티캐스트 소스기반 포워딩을 이용한 PMIPv6 글로벌 핸드오버 메커니즘)

  • Choi, Hoan-Suk;Lee, Jang-Hyun;Rhee, Woo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.745-759
    • /
    • 2011
  • In this paper, we propose the global handover mechanism that is able to provide the unlimited range of next-generation multimedia mobile services in an integrated environment. This mechanism consists of a multicast source based forwarding scheme and a global session management scheme. Global session management scheme provides LMA session information management, global mobility and route optimization. Multicast source based forwarding scheme delivers data between previously attached LMA and newly attached LMA without packet loss. In addition, this scheme removes the redundancy of buffered data. We present a performance evaluation and features analysis by the simulations using the ns-2. Global session management scheme has a less handover latency, propagation delay and signaling cost than the conventional methods. Multicast source based forwarding scheme can deliver buffer data without loss and it has less buffer size than conventional method.

Anomaly Detection Model based on Network using the Session Patterns (세션 패턴을 이용한 네트워크기반의 비정상 탐지 모델)

  • Park Soo-Jin;Choi Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.719-724
    • /
    • 2004
  • Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various foms of hackers' intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port- scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various forms of abnormal accesses for intrusion regardless of the intrusion methods. In this paper, SPAD(Session Pattern Anomaly Detector) is presented, which detects the abnormal service patterns by comparing them with the ordinary normal service patterns.

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF