• Title/Summary/Keyword: data recover

Search Result 495, Processing Time 0.025 seconds

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

The Changes of Traveller's Sleep-Wake Cycles by Jet Lag (비행시차(jet lag)에 의한 여행객의 수면-각성 주기의 변화)

  • Lee, Seung-Hwan;Kim, Leen;Sub, Kwang-Yoon
    • Sleep Medicine and Psychophysiology
    • /
    • v.2 no.2
    • /
    • pp.146-155
    • /
    • 1995
  • Jet lag can be defined as the cumulative physiological and psychological effects of rapid air travel across multiple time zone. The consequences of jet lag include fatigue, general malaise, sleep disturbances, and reductions of cognitive and psychomotor performance, all of which have been documented in experimental biological and air crew personnel studies. Thus authors tried to study the jet lag of natural travellers by modified self reporting sleep log. Total 61 healthy travellers was studied for 3 days before and 7 days after jet-flights across seven to ten time zone. The eastbound travelling group was 38 persons, aged 19 -70 and westbound travelling group was 23 persons, aged 13 - 69. Sleep onset time, wake-up time, sleep latency, awakening frequency on night sleep, awakening duration on night sleep, sleepiness at wake-up and nap length were evaluated. Our results suggested that the 7 to 10 time zone shift gave significant influence to traveller's sleep-wake cycles. The date which subjective physical condition was recovered on was $5.16{\pm}1.50$ day after arrivals for eastbound, while for westbound, $4.91{\pm}1.62$ day. In eastbound travelling, sleep onset time became later than baselines and could not recover until 7th day. But in westbound, it became earlier than baseline and could recover until 6th day. The mean score of 24-hour sleepiness was greater in eastboumd than westbound. Therefore the eastbound travelling caused more sleep-wake cycle disturbance and daytime dysfunction than westbound travelling. In other parameters, there was no definite difference between east and westbound. From our results, it was suggested that the symptom severity of jet lag was dependent on the travelling direction. To demonstrate more definite evidence, large sized data collections and comparision by age difference were needed.

  • PDF

Analysis of Bursty Packet Loss Characteristic According to Transmission Rate for Wi-Fi Broadcast (Wi-Fi 방송 서비스를 위한 방송 패킷 전송률에 따른 버스트 손실 특성 분석)

  • Kim, Se-Mi;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.553-563
    • /
    • 2013
  • When the IEEE 802.11 wireless LAN-based broadcasting services, we use broadcast packets to broadcast multimedia contents to a large number of users using limited wireless resources. However, broadcast transmission is difficult to recover the loss packets compared with unicast transmission. Therefore, analysis of packet loss characteristics is required to perform efficient packet recovery. The packet loss in wireless transmissions is often bursty with high loss data rate. Even if loss patterns have the same average packet loss, they are different in the recovery rate of random loss and burst loss depending on the nature. Therefore, the analysis and research of the nature of the loss are needed to recover loss packets considering bursty characteristics. In this paper, we experimented Wi-Fi broadcast transmission according to transmission rate and analyzed bursty characteristics of loss patterns using 4-state markov model.

A Classroom Design Plan based on the Biophilic-Design (바이오필릭 디자인 기반 교실 디자인 설계)

  • Choi, Joo-Young;Park, Sung-Jun
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.26 no.3
    • /
    • pp.15-23
    • /
    • 2019
  • This study aims to suggest a Biophilic classroom design of high school to obtain attention restoration for students. The learning space for youth in the modern society is composed of dry artificial structures. This space is considered to be a space that can not relieve stress caused by learning. "The Attention Restoration Theory" is divided into "Directed Attention" of humans, which is the cause of fatigue and stress, and "Involuntary Attention" as a solution to it. "Involuntary Attention" takes place in a rest state and helps the brain recover when exposed to nature. And the core of "Biophilic-Design Theory" is that humans can recover physical and mental conditions when exposed to nature. The purpose of this study is to apply "The Biophilic-Design Theory" that emphasizes the importance of exposure to nature to the educational space and plan the space where the 'Attention Restoration' can be achieved. The research method is as follows. First, we review previous studies related to "The Biophilic-Design Theory" and "The Attention Restoration Theory". Second, we analyze the application examples of "The Biophilic-Design Theory" and "The Attention Restoration Theory" in domestic and foreign educational spaces. Third, the concept of educational space is set up based on the elements derived from previous studies. Finally, we propose the planning direction of classroom design based on Biophilic-Design. The following conclusions were drawn. First, The creation of the education space to restore the learner's attention requires a visual space plan that utilizes natural elements such as natural light, artificial light, plants, and natural materials that can directly experience nature. Second, the direction in which students in the classroom can be "The Attention Restoration Theory" should consider the use of indirect natural elements that bring the surrounding natural landscape into the interior. This study will be used as the baseline data for the spatial design and planning of education facilities based on Biophilic-Design.

DE-Based Adaptive Reversible Data Hiding Scheme (DE 기반의 적응적인 가역정보은닉기법)

  • Choi, Jang-Hee;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.103-114
    • /
    • 2012
  • The many DE based data hiding schemes and the many data hiding schemes based on Histogram shifting are researched in spatial domain. The data hiding scheme based on Histogram shifting have an advantage of low distortion of the stego image. But the capacity is low than other schemes. On the other hands, the DE based data hiding schemes have an advantage of high capacity. But the quality of the stego image is low. In this paper, new data hiding scheme which has the similar capacity but the increased quality of the stego image is proposed. The prediction error is divided into blocks to embed the secret data in this scheme. The prediction errors in the block are scanned before the secret data is embedded. If one prediction error is low than the threshold at least, the block is changed to embed the secret data. Otherwise the secret data is not embedded. The distortion of the stego image is minimized by this method. But the block that the secret data embedded is marked in location map. So the additional information to extract the secret data and recover the cover image is needed.

A Dynamic Packet Recovery Mechanism for Realtime Service in Mobile Computing Environments

  • Park, Kwang-Roh;Oh, Yeun-Joo;Lim, Kyung-Shik;Cho, Kyoung-Rok
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.356-368
    • /
    • 2003
  • This paper analyzes the characteristics of packet losses in mobile computing environments based on the Gilbert model and then describes a mechanism that can recover the lost audio packets using redundant data. Using information periodically reported by a receiver, the sender dynamically adjusts the amount and offset values of redundant data with the constraint of minimizing the bandwidth consumption of wireless links. Since mobile computing environments can be often characterized by frequent and consecutive packet losses, loss recovery mechanism need to deal efficiently with both random and consecutive packet losses. To achieve this, the suggested mechanism uses relatively large, discontinuous exponential offset values. That gives the same effect as using both the sequential and interleaving redundant information. To verify the effectiveness of the mechanism, we extended and implemented RTP/RTCP and applications. The experimental results show that our mechanism, with an exponential offset, achieves a remarkably low complete packet loss rate and adapts dynamically to the fluctuation of the packet loss pattern in mobile computing environments.

  • PDF

Exploring the temporal and spatial variability with DEEP-South observations: reduction pipeline and application of multi-aperture photometry

  • Shin, Min-Su;Chang, Seo-Won;Byun, Yong-Ik;Yi, Hahn;Kim, Myung-Jin;Moon, Hong-Kyu;Choi, Young-Jun;Cha, Sang-Mok;Lee, Yongseok
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.70.1-70.1
    • /
    • 2018
  • The DEEP-South photometric census of small Solar System bodies is producing massive time-series data of variable, transient or moving objects as a by-product. To fully investigate unexplored variable phenomena, we present an application of multi-aperture photometry and FastBit indexing techniques to a portion of the DEEP-South year-one data. Our new pipeline is designed to do automated point source detection, robust high-precision photometry and calibration of non-crowded fields overlapped with area previously surveyed. We also adopt an efficient data indexing algorithm for faster access to the DEEP-South database. In this paper, we show some application examples of catalog-based variability searches to find new variable stars and to recover targeted asteroids. We discovered 21 new periodic variables including two eclipsing binary systems and one white dwarf/M dwarf pair candidate. We also successfully recovered astrometry and photometry of two near-earth asteroids, 2006 DZ169 and 1996 SK, along with the updated properties of their rotational signals (e.g., period and amplitude).

  • PDF

VLSI Implementation of Forward Error Control Technique for ATM Networks

  • Padmavathi, G.;Amutha, R.;Srivatsa, S.K.
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.691-696
    • /
    • 2005
  • In asynchronous transfer mode (ATM) networks, fixed length cells of 53 bytes are transmitted. A cell may be discarded during transmission due to buffer overflow or a detection of errors. Cell discarding seriously degrades transmission quality. The quality degradation can be reduced by employing efficient forward error control (FEC) to recover discarded cells. In this paper, we present the design and implementation of decoding equipment for FEC in ATM networks based on a single parity check (SPC) product code using very-large-scale integration (VLSI) technology. FEC allows the destination to reconstruct missing data cells by using redundant parity cells that the source adds to each block of data cells. The functionality of the design has been tested using the Model Sim 5.7cXE Simulation Package. The design has been implemented for a $5{\times}5$ matrix of data cells in a Virtex-E XCV 3200E FG1156 device. The simulation and synthesis results show that the decoding function can be completed in 81 clock cycles with an optimum clock of 56.8 MHz. A test bench was written to study the performance of the decoder, and the results are presented.

  • PDF

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

Algorithms for Handling Incomplete Data in SVM and Deep Learning (SVM과 딥러닝에서 불완전한 데이터를 처리하기 위한 알고리즘)

  • Lee, Jong-Chan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.1-7
    • /
    • 2020
  • This paper introduces two different techniques for dealing with incomplete data and algorithms for learning this data. The first method is to process the incomplete data by assigning the missing value with equal probability that the missing variable can have, and learn this data with the SVM. This technique ensures that the higher the frequency of missing for any variable, the higher the entropy so that it is not selected in the decision tree. This method is characterized by ignoring all remaining information in the missing variable and assigning a new value. On the other hand, the new method is to calculate the entropy probability from the remaining information except the missing value and use it as an estimate of the missing variable. In other words, using a lot of information that is not lost from incomplete learning data to recover some missing information and learn using deep learning. These two methods measure performance by selecting one variable in turn from the training data and iteratively comparing the results of different measurements with varying proportions of data lost in the variable.