• Title/Summary/Keyword: dependencies

Search Result 434, Processing Time 0.027 seconds

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks

  • Pan, Hongyu;Fang, Yong;Huang, Cheng;Guo, Wenbo;Wan, Xuelin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4008-4023
    • /
    • 2022
  • Since machine learning was introduced into cross-site scripting (XSS) attack detection, many researchers have conducted related studies and achieved significant results, such as saving time and labor costs by not maintaining a rule database, which is required by traditional XSS attack detection methods. However, this topic came across some problems, such as poor generalization ability, significant false negative rate (FNR) and false positive rate (FPR). Moreover, the automatic clustering property of graph convolutional networks (GCN) has attracted the attention of researchers. In the field of natural language process (NLP), the results of graph embedding based on GCN are automatically clustered in space without any training, which means that text data can be classified just by the embedding process based on GCN. Previously, other methods required training with the help of labeled data after embedding to complete data classification. With the help of the GCN auto-clustering feature and labeled data, this research proposes an approach to detect XSS attacks (called GCNXSS) to mine the dependencies between the units that constitute an XSS payload. First, GCNXSS transforms a URL into a word homogeneous graph based on word co-occurrence relationships. Then, GCNXSS inputs the graph into the GCN model for graph embedding and gets the classification results. Experimental results show that GCNXSS achieved successful results with accuracy, precision, recall, F1-score, FNR, FPR, and predicted time scores of 99.97%, 99.75%, 99.97%, 99.86%, 0.03%, 0.03%, and 0.0461ms. Compared with existing methods, GCNXSS has a lower FNR and FPR with stronger generalization ability.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Design and Implementation of the Survival Game API Using Dependency Injection (의존성 주입을 활용한 서바이벌 게임 API 설계 및 구현)

  • InKyu Park;GyooSeok Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.183-188
    • /
    • 2023
  • Game object inheritance and multiple components allow for visualization of system architecture, good code reuse, and fast prototyping. On the other hand, objects are more likely to rely on high latency between game objects and components, static casts, and lots of references to things like null pointers. Therefore, It is important to design a game in such a way so that the dependency of objects on multiple classes could be reduced and existing codes could be reused. Therefore, we designed the game to make the classes more modular by applying Dependency Injection and the design patterns proposed by the Gang of Four. Since these dependencies are attributes of the game object and the injection occurs only in the initialization pass, there is little performance degradation or performance penalty in the game loop. Therefore, this paper proposed an efficient design method to effectively reuse APIs in the design and implementation of survival games.

Multivariate Congestion Prediction using Stacked LSTM Autoencoder based Bidirectional LSTM Model

  • Vijayalakshmi, B;Thanga, Ramya S;Ramar, K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.216-238
    • /
    • 2023
  • In intelligent transportation systems, traffic management is an important task. The accurate forecasting of traffic characteristics like flow, congestion, and density is still active research because of the non-linear nature and uncertainty of the spatiotemporal data. Inclement weather, such as rain and snow, and other special events such as holidays, accidents, and road closures have a significant impact on driving and the average speed of vehicles on the road, which lowers traffic capacity and causes congestion in a widespread manner. This work designs a model for multivariate short-term traffic congestion prediction using SLSTM_AE-BiLSTM. The proposed design consists of a Bidirectional Long Short Term Memory(BiLSTM) network to predict traffic flow value and a Convolutional Neural network (CNN) model for detecting the congestion status. This model uses spatial static temporal dynamic data. The stacked Long Short Term Memory Autoencoder (SLSTM AE) is used to encode the weather features into a reduced and more informative feature space. BiLSTM model is used to capture the features from the past and present traffic data simultaneously and also to identify the long-term dependencies. It uses the traffic data and encoded weather data to perform the traffic flow prediction. The CNN model is used to predict the recurring congestion status based on the predicted traffic flow value at a particular urban traffic network. In this work, a publicly available Caltrans PEMS dataset with traffic parameters is used. The proposed model generates the congestion prediction with an accuracy rate of 92.74% which is slightly better when compared with other deep learning models for congestion prediction.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

An Experimental Study for the Shear Property Dependency of High Damping Rubber Bearings (고감쇠 고무받침의 전단특성 의존성에 대한 실험적 연구)

  • Oh, Ju;Jung, Hie-Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.2A
    • /
    • pp.121-129
    • /
    • 2010
  • In this paper, the characteristics of high damping rubber bearing were studied through various prototype test. The characteristics of HDRB were dependent on displacements, repeated cycles, frequencies, vertical pressure, temperature, the capability of shear deformation and the vertical stiffness. The prototype test showed that the displacement was the most governing factor influencing on characteristics of HDRB. The effective stiffness and equivalent damping of HDRB were decreased with displacement, and increased with frequency. The effective stiffness was decreased with high vertical pressure, while the equivalent damping was increased. In which, the equivalent damping was more dependent on the vertical pressure than the effective stiffness. According to the results of this study, more careful examination is required to design the effective stiffness and equivalent damping ratio considering the dependencies of design displacement and exciting velocity.

TET2DICOM-GUI: Graphical User Interface Based TET2DICOM Program to Convert Tetrahedral-Mesh-Phantom to DICOM-RT Dataset

  • Se Hyung Lee;Bo-Wi Cheon;Chul Hee Min;Haegin Han;Chan Hyeong Kim;Min Cheol Han;Seonghoon Kim
    • Progress in Medical Physics
    • /
    • v.33 no.4
    • /
    • pp.172-179
    • /
    • 2022
  • Recently, tetrahedral phantoms have been newly adopted as international standard mesh-type reference computational phantoms (MRCPs) by the International Commission on Radiological Protection, and a program has been developed to convert them to computational tomography images and DICOM-RT structure files for application of radiotherapy. Through this program, the use of the tetrahedral standard phantom has become available in clinical practice, but utilization has been difficult due to various library dependencies requiring a lot of time and effort for installation. To overcome this limitation, in this study a newly developed TET2DICOM-GUI, a TET2DICOM program based on a graphical user interface (GUI), was programmed using only the MATLAB language so that it can be used without additional library installation and configuration. The program runs in the same order as TET2DICOM and has been optimized to run on a personal computer in a GUI environment. A tetrahedron-based male international standard human phantom, MRCP-AM, was used to evaluate TET2DICOM-GUI. Conversion into a DICOM-RT dataset applicable in clinical practice in about one hour with a personal computer as a basis was confirmed. Also, the generated DICOM-RT dataset was confirmed to be effectively implemented in the radiotherapy planning system. The program developed in this study is expected to replace actual patient data in future studies.

A Study on Privacy Violation Vulnerability Through E-Mail Sent to Expired Domains (만료된 도메인의 전자우편을 통한 개인정보 유출에 관한 연구)

  • Kim, DongHyun;Hong, YunSeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.146-149
    • /
    • 2022
  • With internet development, many peoples use their email to exchange documents, register for web services, and much more. Some individuals/organizations (including educational institutions) use their own domain name for email instead of a domain provided by commercial email services. However, suppose the domain used for custom email expires. In that case, other individuals/organizations can reuse the domain, and the new domain owner can send and receive all emails incoming to the domain. It makes us concerned about Privacy violations. Email that new domain owners can look into also contains sensitive emails like password reset notifications, credit card statements, order history, and more. In this research, we would like to describe the privacy violations caused by the expired domain used for email that did not remove all dependencies of email users and propose a solution.

  • PDF

The Efficiency of Long Short-Term Memory (LSTM) in Phenology-Based Crop Classification

  • Ehsan Rahimi;Chuleui Jung
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.1
    • /
    • pp.57-69
    • /
    • 2024
  • Crop classification plays a vitalrole in monitoring agricultural landscapes and enhancing food production. In this study, we explore the effectiveness of Long Short-Term Memory (LSTM) models for crop classification, focusing on distinguishing between apple and rice crops. The aim wasto overcome the challenges associatedwith finding phenology-based classification thresholds by utilizing LSTM to capture the entire Normalized Difference Vegetation Index (NDVI)trend. Our methodology involvestraining the LSTM model using a reference site and applying it to three separate three test sites. Firstly, we generated 25 NDVI imagesfrom the Sentinel-2A data. Aftersegmenting study areas, we calculated the mean NDVI values for each segment. For the reference area, employed a training approach utilizing the NDVI trend line. This trend line served as the basis for training our crop classification model. Following the training phase, we applied the trained model to three separate test sites. The results demonstrated a high overall accuracy of 0.92 and a kappa coefficient of 0.85 for the reference site. The overall accuracies for the test sites were also favorable, ranging from 0.88 to 0.92, indicating successful classification outcomes. We also found that certain phenological metrics can be less effective in crop classification therefore limitations of relying solely on phenological map thresholds and emphasizes the challenges in detecting phenology in real-time, particularly in the early stages of crops. Our study demonstrates the potential of LSTM models in crop classification tasks, showcasing their ability to capture temporal dependencies and analyze timeseriesremote sensing data.While limitations exist in capturing specific phenological events, the integration of alternative approaches holds promise for enhancing classification accuracy. By leveraging advanced techniques and considering the specific challenges of agricultural landscapes, we can continue to refine crop classification models and support agricultural management practices.

Prediction for Bicycle Demand using Spatial-Temporal Graph Models (시-공간 그래프 모델을 이용한 자전거 대여 예측)

  • Jangwoo Park
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.111-117
    • /
    • 2023
  • There is a lot of research on using a combination of graph neural networks and recurrent neural networks as a way to account for both temporal and spatial dependencies. In particular, graph neural networks are an emerging area of research. Seoul's bicycle rental service (aka Daereungi) has rental stations all over the city of Seoul, and the rental information at each station is a time series that is faithfully recorded. The rental information of each rental station has temporal characteristics that show periodicity over time, and regional characteristics are also thought to have important effects on the rental status. Regional correlations can be well understood using graph neural networks. In this study, we reconstructed the time series data of Seoul's bicycle rental service into a graph and developed a rental prediction model that combines a graph neural network and a recurrent neural network. We considered temporal characteristics such as periodicity over time, regional characteristics, and the degree importance of each rental station.