• Title/Summary/Keyword: System ID

Search Result 1,006, Processing Time 0.027 seconds

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

A refinement of customer satisfactory factors in multimedia contentware evaluation process - focused on company website design - (멀티미디어 컨텐트웨어 상품에 대한 소비자 감성 평가 요소(문화성 인자)추출에 관한 연구 - 기업 웹사이트를 중심으로 -)

  • 이종호;김명석;이현이;김태균
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.291-302
    • /
    • 1998
  • This paper covers the development process of multimedia evaluation system, especially focused on customer satisfactory factors while customers navigating net-based Interactive multimedia system. Customers usually experience new level of interaction cased by newly developed web-based technology In ordinary multimedia system. However, if it gives customers satisfactory experience is a matter of question. To find out the relationship between customer satisfaction and interactivity factors exposed by multimedia system, a model has been developed which describes the structure of web-based multimedia system and its relation to customer satisfactory factors. Five different experiments, including 'semantic differential', 'focus group interview', and 'expert review', has been conducted and four customer satisfactory factors were identified. Those are 'customery value', 'structural perfectness', 'visual perfectness', and 'contemporaneity'. With these factors and newly delveoped evaluation system, 7 different web-site has been evaluated and analyzed at the end of this report.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

A Generalized Adaptive Deep Latent Factor Recommendation Model (일반화 적응 심층 잠재요인 추천모형)

  • Kim, Jeongha;Lee, Jipyeong;Jang, Seonghyun;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.249-263
    • /
    • 2023
  • Collaborative Filtering, a representative recommendation system methodology, consists of two approaches: neighbor methods and latent factor models. Among these, the latent factor model using matrix factorization decomposes the user-item interaction matrix into two lower-dimensional rectangular matrices, predicting the item's rating through the product of these matrices. Due to the factor vectors inferred from rating patterns capturing user and item characteristics, this method is superior in scalability, accuracy, and flexibility compared to neighbor-based methods. However, it has a fundamental drawback: the need to reflect the diversity of preferences of different individuals for items with no ratings. This limitation leads to repetitive and inaccurate recommendations. The Adaptive Deep Latent Factor Model (ADLFM) was developed to address this issue. This model adaptively learns the preferences for each item by using the item description, which provides a detailed summary and explanation of the item. ADLFM takes in item description as input, calculates latent vectors of the user and item, and presents a method that can reflect personal diversity using an attention score. However, due to the requirement of a dataset that includes item descriptions, the domain that can apply ADLFM is limited, resulting in generalization limitations. This study proposes a Generalized Adaptive Deep Latent Factor Recommendation Model, G-ADLFRM, to improve the limitations of ADLFM. Firstly, we use item ID, commonly used in recommendation systems, as input instead of the item description. Additionally, we apply improved deep learning model structures such as Self-Attention, Multi-head Attention, and Multi-Conv1D. We conducted experiments on various datasets with input and model structure changes. The results showed that when only the input was changed, MAE increased slightly compared to ADLFM due to accompanying information loss, resulting in decreased recommendation performance. However, the average learning speed per epoch significantly improved as the amount of information to be processed decreased. When both the input and the model structure were changed, the best-performing Multi-Conv1d structure showed similar performance to ADLFM, sufficiently counteracting the information loss caused by the input change. We conclude that G-ADLFRM is a new, lightweight, and generalizable model that maintains the performance of the existing ADLFM while enabling fast learning and inference.

Study Focused on Task Process regarding Effective Information Transfer of Ancillary Tests in Diagnostic Pathology (병리추가조직검사 정보전달을 위한 업무프로세스 연구)

  • Ko, Jae-Nam;Park, Yun-Ik;Jung, Jin-Gyeong;Ahn, Sang-Ho;Kim, Jae-Ho;Shin, Hwa-Jeong;Hyun, Ji-Suk;Kim, Kyeong-Ho
    • Quality Improvement in Health Care
    • /
    • v.22 no.2
    • /
    • pp.95-108
    • /
    • 2016
  • Purpose: Ancillary tests such as immunohistochemistry or molecular testing for pathologic diagnosis are performed using ready-made tissue blocks for a histological examination. Various methods and processes during ancillary testing cause some of issues, particularly in the time required and the results reporting scheme. Methods: To solve these issues, we constructed real-time management software. When a pathologist or a clinician had ancillary tests examined using this software by selecting the codes of the needed ancillary tests on site and the system assigned the tests to each laboratory. Then, pathology technologists checked the referred tests and performed the examination. In clinical departments, serial number of each ancillary test can be matched the original pathologic ID. In the department of pathology, numbers of tissue blocks that needed additional tests could be indicated and detected using one-click detection system when a clinician referred the test. Results: Using this system resulted in simplifying the referral procedures from nine-steps to three-steps in each clinical department and from seven-steps to two-steps in department of pathology. Errors that happened on the paper-based request system were also reduced. Furthermore, the time required was saved by seven hours in pathologic laboratory on average. Mean durations from requesting to reporting of the ancillary test was reduced by three days for specimens of health promotion center. Conclusion: Construction of an effective information transfer system may be helpful for shortening the time required, reducing errors, and checking processing information of the tests in real time.

U-healthcare Based System for Sleeping Control and Remote Monitoring (u-헬스케어기반의 수면제어 및 원격모니터링 시스템)

  • Kim, Dong-Ho;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.33-45
    • /
    • 2007
  • Using switches and sensors informing the current on or off state, this paper suggests a sleeping control and remote monitoring system that not only can recognize the sleeping situations but also can control for keeping an appropriate sleeping situation remotely, And we show an example that this system is applied to the healthcare sleeping mat, Our system comprises the following 3 parts: a part for detecting the sleeping situations, a part for extracting sensing data and sending/receiving the relating situated data, and a part controlling and monitoring the all of sleeping situations. In details, in order to develop our system, we used the touch and pressure-sensitive sensors with On/Off functions for a purpose of the first part, The second part consists of the self-developed embedded board with the socket based communication as well as extracting real-time sensing data. And the third part is implemented by service modules for providing controlling and monitoring functions previously described. Finally, these service modules are implemented by the TMO scheme, one of real-time object-oriented programming models and the communications among them is supported using the TMOSM of distributed real-time middleware.

  • PDF

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

Comparative Genomic Analysis of Pathogenic Factors of Pectobacterium Species Isolated in South Korea Using Whole-Genome Sequencing

  • Jee, Samnyu;Kang, In-Jeong;Bak, Gyeryeong;Kang, Sera;Lee, Jeongtae;Heu, Sunggi;Hwang, Ingyu
    • The Plant Pathology Journal
    • /
    • v.38 no.1
    • /
    • pp.12-24
    • /
    • 2022
  • In this study, we conducted whole-genome sequencing with six species of Pectobacterium composed of seven strains, JR1.1, BP201601.1, JK2.1, HNP201719, MYP201603, PZ1, and HC, for the analysis of pathogenic factors associated with the genome of Pectobacterium. The genome sizes ranged from 4,724,337 bp to 5,208,618 bp, with the GC content ranging from 50.4% to 52.3%. The average nucleotide identity was 98% among the two Pectobacterium species and ranged from 88% to 96% among the remaining six species. A similar distribution was observed in the carbohydrate-active enzymes (CAZymes) class and extracellular plant cell wall degrading enzymes (PCWDEs). HC showed the highest number of enzymes in CAZymes and the lowest number in the extracellular PCWDEs. Six strains showed four subsets, and HC demonstrated three subsets, except hasDEF, in type I secretion system, while the type II secretion system of the seven strains was conserved. Components of human pathogens, such as Salmonella pathogenicity island 1 type type III secretion system (T3SS) and effectors, were identified in PZ1; T3SSa was not identified in HC. Two putative effectors, including hrpK, were identified in seven strains along with dspEF. We also identified 13 structural genes, six regulator genes, and five accessory genes in the type VI secretion system (T6SS) gene cluster of six Pectobacterium species, along with the loss of T6SS in PZ1. HC had two subsets, and JK2.1 had three subsets of T6SS. With the GxSxG motif, the phospholipase A gene did locate among tssID and duf4123 genes in the T6SSa cluster of all strains. Important domains were identified in the vgrG/paar islands, including duf4123, duf2235, vrr-nuc, and duf3396.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Temporal Analysis of Opinion Manipulation Tactics in Online Communities (온라인 공간에서 비정상 정보 유포 기법의 시간에 따른 변화 분석)

  • Lee, Sihyung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.29-39
    • /
    • 2020
  • Online communities, such as Internet portal sites and social media, have become popular since they allow users to share opinions and to obtain information anytime, anywhere. Accordingly, an increasing number of opinions are manipulated to the advantage of particular groups or individuals, and these opinions include falsified product reviews and political propaganda. Existing detection systems are built upon the characteristics of manipulated opinions for one particular time period. However, manipulation tactics change over time to evade detection systems and to more efficiently spread information, so detection systems should also evolve according to the changes. We therefore propose a system that helps observe and trace changes in manipulation tactics. This system classifies opinions into clusters that represent different tactics, and changes in these clusters reveal evolving tactics. We evaluated the system with over a million opinions collected during three election campaigns and found various changes in (i) the times when manipulations frequently occur, (ii) the methods to manipulate recommendation counts, and (iii) the use of multiple user IDs. We suggest that the operators of online communities perform regular audits with the proposed system to identify evolutions and to adjust detection systems.