• Title/Summary/Keyword: behavior profiling

Search Result 51, Processing Time 0.024 seconds

Generation of Finite Automata for Intrusion Detection (침입탐지를 위한 유한상태기계의 생성 기법)

  • Lim, Young-Hwan;Wee, Kyu-Bum
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.119-124
    • /
    • 2003
  • Although there have been many studies on using finite automata for intrusion detection, it has been a difficult problem to generate compact finite automata automatically. In a previous research an approach to profile normal behaviors using finite automata was proposed. They divided the system call sequence of each process into three parts prefix, main portion, and suffix, and then substituted macros for frequently occurring substrings. However, the procedure was not automatic. In this paper we present algorithms to automatically generate intrusion detection automata from the sequence of system calls resulting from the normal runs of the programs. We also show the effectiveness of the proposed method through experiments.

Dependence of cation ratio in Oxynitride Glasses on the plasma etching rate

  • Lee, Jung-Ki;Hwang, Seong-Jin;Lee, Sung-Min;Kim, Hyung-Sun
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2009.11a
    • /
    • pp.44.2-44.2
    • /
    • 2009
  • Polycrystalline materials suchas yttria and alumina have been applied as a plasma resisting material for the plasma processing chamber. However, polycrystal line material may easily generate particles and the particles are sources of contamination during the plasma enhanced process. Amorphous material can be suitable to prevent particle generation due to absence of grain-boundaries. We manufactured nitrogen-containing $SiO_2-Al_2O_3-Y_2O_3$ based glasses with various contents of silicon and fixed nitrogen content. The thermal properties, mechanical properties and plasma etching rate were evaluated and compared for the different composition samples. The plasma etching behavior was estimated using XPS with depth profiling. From the result, the plasma etching rate highly depends on the silicon content and it may results from very low volatile temperature of SiF4 generated during plasma etching. The silicon concentration at the plasma etched surface was very low besides the concentration of yttrium and aluminum was relatively high than that of silicon due to high volatile temperature of fluorine compounds which consisted with aluminum and yttrium. Therefore, we conclude that the samples having low silicon content should be considered to obtain low plasma etching rate for the plasma resisting material.

  • PDF

Elastohydrodynamic Lubrication of a Profiled Cylindrical Roller (II) (프로파일링을 한 원통형 로울러의 탄성유체윤활 (II))

  • 박태조;김경웅
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.15 no.6
    • /
    • pp.1975-1981
    • /
    • 1991
  • A new numerical solution of the elastohydrodynamic lubrication(EHL) problem of an axially profiled cylindrical roller is presented. A finite difference method and the Newton-Raphson method are used to solve the nonlinear system equations. A non-uniform grid system is adopted to reduce the number of grid points and to obtain accurate solution. For two different types of profiles which have similar elastostatic pressure distribution, the EHL results show large differences. Especially the difference in film shape is larger than in pressure distribution. Therefore, the magnitude of the minimum film thickness should be a major criteria to design the axial profile of the roller. Variations of the minimum film thickness with dimensionless parameters show considerably different behavior from those of infinite solution and show a good agreement with the experimental data in literatures. Present numerical scheme can be used generally in the analysis of three-dimensional EHL problem.

Behavior based Malware Profiling System Prototype (행위기반 악성코드 프로파일링 시스템 프로토타입)

  • Kang, Hong-Koo;Yoo, Dae-Hoon;Choi, Bo-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.376-379
    • /
    • 2017
  • 전 세계적으로 악성코드는 하루 100만개 이상이 새롭게 발견되고 있으며, 악성코드 발생량은 해마다 증가하고 있는 추세이다. 공격자는 보안장비에서 악성코드가 탐지되는 것을 우회하기 위해 기존 악성코드를 변형한 변종 악성코드를 주로 이용한다. 변종 악성코드는 자동화된 제작도구나 기존 악성코드의 코드를 재사용하므로 비교적 손쉽게 생성될 수 있어 최근 악성코드 급증의 주요 원인으로 지목되고 있다. 본 논문에서는 대량으로 발생하는 악성코드의 효과적인 대응을 위한 행위기반 악성코드 프로파일링 시스템 프로토타입을 제안한다. 동일한 변종 악성코드들은 실제 행위가 유사한 특징을 고려하여 악성코드가 실행되는 과정에서 호출되는 API 시퀀스 정보를 이용하여 악성코드 간 유사도 분석을 수행하였다. 유사도 결과를 기반으로 대량의 악성코드를 자동으로 그룹분류 해주는 시스템 프로토타입을 구현하였다. 악성코드 그룹별로 멤버들 간의 유사도를 전수 비교하므로 그룹의 분류 정확도를 객관적으로 제시할 수 있다. 실제 유포된 악성코드를 대상으로 악성코드 그룹분류 기능과 정확도를 측정한 실험에서는 평균 92.76%의 분류 성능을 보였으며, 외부 전문가 의뢰에서도 84.13%로 비교적 높은 분류 정확도를 보였다.

Effect of Rapid Thermal Annealing on the Ti doped In2O3 Films Grown by Linear Facing Target Sputtering

  • Seo, Ki-Won;Kim, Han-Ki
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.342.1-342.1
    • /
    • 2014
  • The electrical, optical and structural properties of Ti doped $In_2O_3$ (TIO) ohmic contacts to p-type GaN were investigated using linear facing target sputtering (LFTS) system. Sheet resistance and resistivity of TIO films are decreased with increasing rapid thermal annealing (RTA) temperature. Although the $400^{\circ}C$ and $500^{\circ}C$ annealed samples showed rectifying behavior, the $600^{\circ}C$ and $700^{\circ}C$ annealed samples showed linear I-V characteristics indicative of the formation of an ohmic contact between TIO and p-GaN. The annealing of the contact at $700^{\circ}C$ resulted in the lowest specific contact resistivity of $9.5{\times}10^{-4}{\Omega}cm^2$. Based on XPS depth profiling and synchrotron X-ray scattering analysis, we suggested a possible mechanism to explain the annealing dependence of the properties of TIO layer on rapid thermal annealing temperature.

  • PDF

Applet Control using Java Bytecode Modification on the Internet Communication (인터넷 통신상에서 자바 바이트 코드 수정을 이용한 애플릿 제어)

  • 김광준;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.90-99
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

The Comparisons of Eating-Related Index and Pre- and Post-Prandial Gut Hormone Patterns between Normal-Overweight and Obese Subjects of Taeemin (태음인 정상-과체중군과 비만군의 식이관련지표 및 식사 전후 Gut Hormone 비교연구)

  • Lee, Ji-Won;Park, Byung-Joo;Lee, Jun-Hee
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.14 no.1
    • /
    • pp.36-45
    • /
    • 2014
  • Objectives: The purpose of this studay was to compare the eating-related index and the patterns of pre- and post-prandial gut hormone level in normal-overweight and obese subjects of Taeemin population. Methods: We enrolled healthy male participants who were diagnosed with Taeeumin by Sasang Constitutional diagnosis and who were normal-overweight ($18.5kg/m^2{\leq}$body mass index [BMI)< $25kg/m^2$) or obese ($25.0kg/m^2{\leq}$BMI< $30kg/m^2$). Eating behavior and gastrointestinal problems were assessed by using standardized scale. Subjective appetite ratings using visual analogue scales and the profiling of serum levels of ghrelin and peptide YY (PYY) were assessed before and after a standard meal (6 time points: 30 minutes pre-prandial, immediately before meal, 15, 30, 60, and 120 minutes post-prandial). Results: Tewnty two healthy Taeeumin people classified as normal-overweight group or obese group are the final subjects. External eating score of Dutch eating behavior questionaire scores is higher in normal-overweight group than in obese group. The variations of subjective appetite ratings in obese group are smaller than in normal-overweight group. The pattern of ghrelin in normal-overweight group shows a high peak at 30 minutes post-prandial point, which is contrary to existing studies. The pattern of PYY in obese group decreases from 15 minutes post-prandial point and shows lower peak level, whereas in normal-overweight group shows increasing tendency from pre-prandial point until 30 minutes post-prandial point. Conclusions: There are differences in the eating-related index and the gut hormone patterns related to obesity.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Compressive behavior of profiled double skin composite wall

  • Qin, Ying;Li, Yong-Wei;Su, Yu-Sen;Lan, Xu-Zhao;Wu, Yuan-De;Wang, Xiang-Yu
    • Steel and Composite Structures
    • /
    • v.30 no.5
    • /
    • pp.405-416
    • /
    • 2019
  • Profiled composite slab has been widely used in civil engineering due to its structural merits. The extension of this concept to the bearing wall forms the profiled composite wall, which consists of two external profiled steel plates and infill concrete. This paper investigates the structural behavior of this type of wall under axial compression. A series of compression tests on profiled composite walls consisting of varied types of profiled steel plate and edge confinement have been carried out. The test results are evaluated in terms of failure modes, load-axial displacement curves, strength index, ductility ratio, and load-strain response. It is found that the type of profiled steel plate has influence on the axial capacity and strength index, while edge confinement affects the failure mode and ductility. The test data are compared with the predictions by modern codes such as AISC 360, BS EN 1994-1-1, and CECS 159. It shows that BS EN 1994-1-1 and CECS 159 significantly overestimate the actual compressive capacity of profiled composite walls, while AISC 360 offers reasonable predictions. A method is then proposed, which takes into account the local buckling of profiled steel plates and the reduction in the concrete resistance due to profiling. The predictions show good correlation with the test results.

microRNA Expression Profile in Patients with Stage II Colorectal Cancer: A Turkish Referral Center Study

  • Tanoglu, Alpaslan;Balta, Ahmet Ziya;Berber, Ufuk;Ozdemir, Yavuz;Emirzeoglu, Levent;Sayilir, Abdurrahim;Sucullu, Ilker
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.5
    • /
    • pp.1851-1855
    • /
    • 2015
  • Background: There are increasing data about microRNAs (miRNA) in the literature, providing abundant evidence that they play important roles in pathogenesis and development of colorectal cancer. In this study, we aimed to investigate the miRNA expression profiles in surgically resected specimens of patients with recurrent and non-recurrent colorectal cancer. Materials and Methods: The study population included 40 patients with stage II colorectal cancer (20 patients with recurrent tumors, and 20 sex and age matched patients without recurrence), who underwent curative colectomy between 2004 and 2011 without adjuvant therapy. Expression of 16 miRNAs (miRNA-9, 21, 30d, 31, 106a, 127, 133a, 133b, 135b, 143, 145, 155, 182, 200a, 200c, 362) was verified by quantitative real-time polymerase chain reaction (qRT-PCR) in all resected colon cancer tissue samples and in corresponding normal colonic tissues. Data analyses were carried out using SPSS 15 software. Values were statistically significantly changed in 40 cancer tissues when compared to the corresponding 40 normal colonic tissues (p<0.001). MiR-30d, miR-133a, miR-143, miR-145 and miR-362 expression was statistically significantly downregulated in 40 resected colorectal cancer tissue samples (p<0.001). When we compared subgroups, miRNA expression profiles of 20 recurrent cancer tissues were similar to all 40 cancer tissues. However in 20 non-recurrent cancer tissues, miR-133a expression was not significantly downregulated, moreover miR-133b expression was significantly upregulated (p<0.05). Conclusions: Our study revealed dysregulation of expression of ten miRNAs in Turkish colon cancer patients. These miRNAs may be used as potential biomarkers for early detection, screening and surveillance of colorectal cancer, with functional effects on tumor cell behavior.