• Title/Summary/Keyword: code analysis for access behavior

Search Result 6, Processing Time 0.02 seconds

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Performance Analysis and Comparison of Different Data Rates in Wideband CDMA Using Three Different Transmission Schemes

  • Pahadee, Sangita;Ahmed, Kazi M.;Rajatheva, R.M.A.P.;Sigdel, S.
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.552-555
    • /
    • 2002
  • Wideband CDMA is one of the radio access technologies for the third generation in which voice is the basic service. There has been lot of research work in order to find out the suitable transmission scheme to meet the requirement of accommodating variable type of services in Wideband-CDMA. This paper studies the behavior of different services using different transmission schemes in Wideband CDU and compares their performance in terms of BER. Different transmission schemes are found to be suitable for different services. Transmission schemes used are- fixed processing gain scheme also called as variable bandwidth scheme, single code transmission and multicode transmission. It is found that fixed processing gain scheme is suitable fur high data rates. Single code transmission is suitable fer low data rates where as multicode transmission is suitable for low and medium data rates.

  • PDF

Numerical Analysis of the Mechanical and Hydraulic behavior of Concrete Plug in Underground Storage Cavern (지하저장공동에서의 콘크리트 플러그의 역학적 및 수리적 거동에 관한 수치해석적 연구)

  • 박병기;이희근;전석원;박의섭
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2000.09a
    • /
    • pp.93-103
    • /
    • 2000
  • The concrete plug in an underground cavern prevents the stored product (oil, gas, etc) from leaking and the excessive show of underground water, so it plays an important role in construction and operation of the storage cavern. Additionally, it should maintain its stability under every possible loading condition. Once the plug is constructed, the cavern is isolated from the external access. Therefore, mechanical and hydraulic consideration should be made in construction to fulfill its function. Therefore, in this study, numerical analyses were conducted to study the optimal shape and thickness of the plug with respect to the various conditions of installation depth, the shape of the plug, in-situ stress ratio (K), the condition of rock-plug interface, and the effect of Excavation Damaged Zone (EDZ). This paper also presents the effect of slot depth on the hydraulic behavior of the plug. These analyses were carried out by using the 2-dimensional finite difference code, rm FLAC, and the 3D code, m FLA $C^{3D}$./.

  • PDF

Numerical Analysis of the Mechanical and Hydraulic behavior of Concrete Plug in Underground Storage Cavern (지하저장공동에서의 콘크리트 플러그의 역학적 및 수리적 거동에 관한 수치해석적 연구)

  • 박병기;이희근;전석원;박의섭
    • Tunnel and Underground Space
    • /
    • v.10 no.3
    • /
    • pp.344-354
    • /
    • 2000
  • The concrete plug in an underground cavern prevents the stored product (oil, gas, etc) from leaking and the excessive inflow of underground water, so it plays an important role in construction and operation of the storage cavern. Additionally, it should maintain its stability under every possible loading condition. Once the plug is constructed, the cavern is isolated from the external access. Therefore, mechanical and hydraulic consideration should be made in construction to fulfill its function. Therefore, in this study, numerical analyses were conducted to study the optimal shape and thickness of the plug with respect to the various conditions of installation depth, the shape of the plug, in-situ stress ratio (K), the condition of rock-plug interface, and the effect of Excavation Damaged Zone (EDZ). This paper also presents the effect of slot depth on the hydraulic behavior of the plug. These analyses were carried out by using the 2-dimensional finite difference code, rm FLAC, and the 3D code, rm FLAC$\^$3D/.

  • PDF

Policy and Mechanism for Safe Function-level Dynamic Kernel Update (함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계)

  • Park, Hyun-Chan;Yoo, Chuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.808-812
    • /
    • 2008
  • In recent years, the software vulnerability becomes an important problem to the safety in operating system kernel. Many organizations endeavor to publish patches soon after discovery of vulnerability. In spite of the effort, end-system administrators hesitate to apply the patches to their system. The reasons of hesitation are the reboot disruption and the distrust of patches. To solve this problem we propose a dynamic update system for non-updatable kernel, named DUNK. The DUNK provides: 1) a dynamic update mechanism at function-level granularity to overcome the reboot disruption and 2) a safety verification mechanism to overcome the distrust problem, named MAFIA. In this paper, we describe the design of DUNK and detailed algorithm of MAFIA.

Asymptotic Behavior of the output SINR at MMSE receivers in a MIMO MC-CDMA system (MIMO MC-CDMA시스템에서 MMSE 수신기 출력의 점근적 양상)

  • Kim, Kyeong-Yeon;Shim, Sei-Joon;Ham, Jae-Sang;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.4
    • /
    • pp.10-16
    • /
    • 2007
  • This paper analyzes the output signal-to-interference-plus-noise ratio (SINR) for a multiple-input-multiple-output (MIMO) multicarrier code division multiple access (MC-CDMA) system with minium mean square error receivers. A previous work of a single antenna MC-CDMA system cannot directly applied to a MIMO MC-CDMA system because some assumptions for single antenna do not match the case of multiple antenna. Therefore this paper expands the concept of freeness to MIMO system by using the Marcenko Pastur law. The analysis shows that the output SINR asymptotically converges to a deterministic value and finds the value on the assumption of freeness. From the analysis, it is easy to calculate bit error rate and the calculation is verified by simulations.