• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.043 seconds

Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity (SVM 기반 유전 알고리즘을 이용한 컴파일러 분석 프레임워크 : 특징 및 모델 선택 민감성)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.537-544
    • /
    • 2020
  • Advances in detection techniques, such as mutation and obfuscation, are being advanced with the development of malware technology. In the malware detection technology, unknown malware detection technology is important, and a method for Malware Authorship Attribution that detects an unknown malicious code by identifying the author through distributed malware is being studied. In this paper, we try to extract the compiler information affecting the binary-based author identification method and to investigate the sensitivity of feature selection, probability and non-probability models, and optimization to classification efficiency between studies. In the experiment, the feature selection method through information gain and the support vector machine, which is a non-probability model, showed high efficiency. Among the optimization studies, high classification accuracy was obtained through feature selection and model optimization through the proposed framework, and resulted in 48% feature reduction and 53 faster execution speed. Through this study, we can confirm the sensitivity of feature selection, model, and optimization methods to classification efficiency.

Constructing Negative Links from Multi-facet of Social Media

  • Li, Lin;Yan, YunYi;Jia, LiBin;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2484-2498
    • /
    • 2017
  • Various types of social media make the people share their personal experience in different ways. In some social networking sites. Some users post their reviews, some users can support these reviews with comments, and some users just rate the reviews as kind of support or not. Unfortunately, there is rare explicit negative comments towards other reviews. This means if there is a link between two users, it must be positive link. Apparently, the negative link is invisible in these social network. Or in other word, the negative links are redundant to positive links. In this work, we first discuss the feature extraction from social media data and propose new method to compute the distance between each pair of comments or reviews on social media. Then we investigate whether we can predict negative links via regression analysis when only positive links are manifested from social media data. In particular, we provide a principled way to mathematically incorporate multi-facet data in a novel framework, Constructing Negative Links, CsNL to predict negative links for discovering the hidden information. Additionally, we investigate the ways of solution to general negative link predication problems with CsNL and its extension. Experiments are performed on real-world data and results show that negative links is predictable with multi-facet of social media data by the proposed framework CsNL. Essentially, high prediction accuracy suggests that negative links are redundant to positive links. Further experiments are performed to evaluate coefficients on different kernels. The results show that user generated content dominates the prediction performance of CsNL.

Cost-Benefit Analysis of E-Government: Australia

  • Yoon, Joseph;Moon, Yong-Eun
    • Journal of Digital Convergence
    • /
    • v.3 no.2
    • /
    • pp.73-116
    • /
    • 2005
  • When people contact the government they can use a variety of channels. That is, they go in person to an office, use a telephone service, access information via the Internet, send a letter, or use a third party. Since the Australian Government first recognised the potential of online technology to improve service delivery in its 1997 Investing for Growth statement, it has articulated its policies and strategies for e-government in a number of papers. E-government involves government agencies delivering better programs and services online through the use of new information and communication technologies. The policy papers included Government Online-The Commonwealth's Strategy, launched in April 2000, and a new framework for e-government, Better Services. Better Government, launched in November 2002. Most recently, the Government released Australia's Strategic Framework for the Information Economy in July 2004. These papers outlined the broad directions and priorities for the future of e-government in Australia, and sought to maintain the momentum of agencies' actions under Government Online. One of its key objectives was for agencies to achieve greater efficiency in providing services and a return on their investments in ICT (Information and Communication Technology)-based service delivery. They also stated that investing in e-government should deliver tangible returns, whether they take the form of cost reductions, increased efficiency and productivity, or improved services to business and the broader community Implementation of the Government policy has led to considerable agency investment in ICT-based service delivery. However government policy also requires managers to ensure that program and service delivery is efficient and effective. Efficient and effective use of ICT has the potential to improve service delivery and to make financial savings. This paper outlines how people are using the channels to contact the government in Australia. It also examines the level of satisfaction they have with those services and their preferences and expectations. In addition, this paper aims at identifying the methods used by Australian Government to measure the efficiency and effectiveness of their delivery of services, and at assessing the adequacy of these methods.

  • PDF

A Performance by New Technology Investment and Legal System Operation in Government Organization (정부조직 내 신기술 투자와 ICT 법·제도 운영에 따른 성과 연구)

  • Jung, Byoungho
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.133-144
    • /
    • 2019
  • The purpose of this study is to empirically examine the ICT legal system and the ICT performance by new technology's investment for government organizational changes. I will show the impact of government ICT investment interest, competency, convergence and process change, and then present policy direction. A research method used the structural equations. As a result of analysis, ICT investment interest and operational competency showed the negative impact the ICT legal system and the role change of ICT process and convergence of new technologies showed the positive impact. The Framework Act on National Information showed the positive impact on organizational performance, but the E-Government Act showed the negative impact. The contribution in the study expanded organization research from MIS perspective, and each organization is required the conflict resolve by ICT investment. A future study will require longitudinal study of ICT capabilities from previous to present government.

A Framework for Quality Improvement in Weapon System using Post-Logistics Support Data (후속군수지원 데이터 분석을 활용한 무기체계 품질향상 방법론)

  • Kim, Geun-Hyung;Kim, Young-Kuk;Park, Seung Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.680-687
    • /
    • 2016
  • Although advanced weapon system weapons with high-performance and various functions have been developed, weapon defects can be fatal in the weapons industry. Therefore, the army requires quality improvement to reduce the number of defects which occur during both the development and operation of the weapon system. Recently, many manufacturers, including weapons manufacturers, have conducted analyses using defect related big-data in order to improve the quality. However, there have been few data analyses, because it is difficult to obtain the data required for the analysis of the development phase. Therefore, this study summarizes the pattern of the weapon system, military organization, and defect types using the actual data of the Post-Logistics Support (PLS) phase. The PLS data, which is referred to as the data collected after force integration, includes information on requests for maintenance. Through this information, this study selects key variables and analyzes the selected variables. The analysis results show the critical factors to be considered during the development phase. Finally, this study proposes a framework for advanced PLS systems using the PLS data. The proposed framework enables the development time of weapon systems to be further shortened and their quality to be improved.

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

Modeling Adaptive Context-Based Contents Navigation of Web Applications (웹 응용의 적응하는 문맥 기반 컨텐츠 항해 모델링)

  • Lee, Byung-Jeong;Hong, Ji-Won
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.93-106
    • /
    • 2007
  • Web Applications are rapidly increasing and the structure becomes very complicated. However, when users explore such complex Web applications, they cannot often grasp the current location and get the information that they want. Therefore, a novel approach to model the navigation of Web application contents is required. In this study, a framework has been presented for modeling adaptive context-based contents navigation of Web applications. The framework performs activities including navigation analysis, navigation design, and navigation realization. first, in navigation analysis domain is analyzed by using use case, focusing on navigation. Next, in navigation design three models have been produced: a navigation information model, a profile, and a navigation interface model. Finally, in navigation realization a Webpage navigation model and a component navigation model have been produced. In this work, several formal definitions and rules for checking validity of navigation model have also been provided.

  • PDF

A Study on Evaluation Criteria for M&S Analysis of Command and Control Effectiveness in Joint Operations (합동작전 지휘통제 효과도 모의분석을 위한 평가기준 연구)

  • Sohn, Young-Hwan;Kim, Weon-Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.167-175
    • /
    • 2011
  • Concerning the effectiveness of command and control is increasing worldwide as future warfare is changing into Network Centric Warfare (NCW). Unlike the old attrition warfare that depends mainly on mobility and strike assets, the modern warfare is based on information and network which regards acquisition and circulation of information as important. Therefore, there's no room for rediscussion that C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) system will play an important role in warfare. In spite of this fact, there isn't any way to explain clearly how to measure the effectiveness of command and control system in a battle and to reflect it systematically in a system effectiveness. In this study, we examined NCO-CF (Network Centric Operations-Conceptual Framework), developed by the Department of Defense (DOD), which can conceptually explain the increment of effectiveness of C4ISR system that is the basis of NCO. And we suggested methodology based on NCO-CF to establish the evaluation criteria for M&S analysis of command and control effectiveness. As a case study we derived the evaluation criteria for the command and control system in joint operations by applying the suggested methodology.

Study on Establishing Essential Framework for Importing Asset Management System of National Road (일반국도 자산관리시스템 도입을 위한 기본체계 구축에 관한 연구)

  • Park, Hyosung;Lee, Soohyng
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.320-334
    • /
    • 2014
  • The government policy had placed new construction as the kernel of the investment in the road department. This had been shifted, however, since the government's budget of the road department reached its peak in 2000, new construction had came to a downsizing phase while the maintenance increased gradually. Considering this recent trend, the necessity of a new paradigm in the road policy had came to a fore, in order to prove the justification of increase in the maintenance budget as well as successfully fulfill the user's needs in the service quality. The developed countries that had intensively constructed social infrastructure in 1950-60s are enjoying a great achievement by applying the asset management concept in coping with the deterioration of the public facilities. This research suggests the basic framework in establishing "Korean Road Asset Management System" designed to efficiently manage the national road. The main feature of this system is to absorb economic analysis course into the current pavement management system, in order to form not only long-lasting but also preventive road management policy.

File Analysis Data Auto-Creation Model For Peach Fuzzing (Peach 퍼징을 위한 파일 분석 데이터 자동 생성 모델)

  • Kim, Minho;Park, Seongbin;Yoon, Jino;Kim, Minsoo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.327-333
    • /
    • 2014
  • The rapid expansion of the software industry has brought a serious security threat and vulnerability. Many softwares are constantly attacked by exploit codes using security vulnerabilities. Smart fuzzing is automated method to find software vulnerabilities. However, Many resources are consumed in fuzzing, because the fuzzing needs to create data model for target software and to analyze a data file and software binary. Therefore, The automated method for efficient smart fuzzing is needed to develop the automated data model. In this paper, through analysing the input file format and optimizing the data structure, we propose an efficient data modeling framework for smart fuzzing and implement the framework for detect software vulnerabilities.