• Title/Summary/Keyword: security model

Search Result 3,984, Processing Time 0.03 seconds

Android Malware Detection Using Auto-Regressive Moving-Average Model (자기회귀 이동평균 모델을 이용한 안드로이드 악성코드 탐지 기법)

  • Kim, Hwan-Hee;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1551-1559
    • /
    • 2015
  • Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.

Epigenetic Regulation of Fungal Development and Pathogenesis in the Rice Blast Fungus

  • Jeon, Junhyun
    • 한국균학회소식:학술대회논문집
    • /
    • 2014.10a
    • /
    • pp.11-11
    • /
    • 2014
  • Fungal pathogens have huge impact on health and economic wellbeing of human by causing life-threatening mycoses in immune-compromised patients or by destroying crop plants. A key determinant of fungal pathogenesis is their ability to undergo developmental change in response to host or environmental factors. Genetic pathways that regulate such morphological transitions and adaptation are therefore extensively studied during the last few decades. Given that epigenetic as well as genetic components play pivotal roles in development of plants and mammals, contribution of microbial epigenetic counterparts to this morphogenetic process is intriguing yet nearly unappreciated question to date. To bridge this gap in our knowledge, we set out to investigate histone modifications among epigenetic mechanisms that possibly regulate fungal adaptation and processes involved in pathogenesis of a model plant pathogenic fungus, Magnaporthe oryzae. M. oryzae is a causal agent of rice blast disease, which destroys 10 to 30% of the rice crop annually. Since the rice is the staple food for more than half of human population, the disease is a major threat to global food security. In addition to the socioeconomic impact of the disease it causes, the fungus is genetically tractable and can undergo well-defined morphological transitions including asexual spore production and appressorium (a specialized infection structure) formation in vitro, making it a model to study fungal development and pathogenicity. For functional and comparative analysis of histone modifications, a web-based database (dbHiMo) was constructed to archive and analyze histone modifying enzymes from eukaryotic species whose genome sequences are available. Histone modifying enzymes were identified applying a search pipeline built upon profile hidden Markov model (HMM) to proteomes. The database incorporates 22,169 histone-modifying enzymes identified from 342 species including 214 fungal, 33 plants, and 77 metazoan species. The dbHiMo provides users with web-based personalized data browsing and analysis tools, supporting comparative and evolutionary genomics. Based on the database entries, functional analysis of genes encoding histone acetyltransferases and histone demethylases is under way. Here I provide examples of such analyses that show how histone acetylation and methylation is implicated in regulating important aspects of fungal pathogenesis. Current analysis of histone modifying enzymes will be followed by ChIP-Seq and RNA-seq experiments to pinpoint the genes that are controlled by particular histone modifications. We anticipate that our work will provide not only the significant advances in our understanding of epigenetic mechanisms operating in microbial eukaryotes but also basis to expand our perspective on regulation of development in fungal pathogens.

  • PDF

The Effects of Relationship between Universities, Public Research Institutes and External Organizations on Performance of Technology Transfer : based of Triple Helix Model (대학·공공연구소와 외부기관과의 관계가 기술이전 성과에 미치는 영향 : Triple Helix 모형을 기반으로)

  • Son, Hosung;Chung, Yanghon;Yoon, Sangpil
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.2
    • /
    • pp.587-614
    • /
    • 2018
  • The Korean government is aiming to strengthen industrial and national competitiveness through the promotion of cooperation between universities, public research institutes and industry and vitalization of technology transfer. In 2013 and 2014, the Ministry of Trade, Industry and Energy and Ministry of Science, ICT and Future Planning have announced policies to support SMEs by public research organizations. In addition, in 2015, the 'Korean Fraunhofer support system', which pay government subsidies according to the amounts of private R&D funds was adopted. However, there are some concern about the government's policies. There is yet disclosed how these policies affect technology transfer because industrial R&D funding has not been activated in Korea unlike German. Therefore this paper analyzes effects of relationship between universities, public research institutes and external organizations on performance of technology transfer based on the Triple Helix Model. Empirical results show that the relationship with the government has a significant impact on the resource security and the relationship with the industry has a significant effect on the diffusion of the performance. In addition, a public research institute was selected and case analysis was conducted to suggest policy implications for improving the technology transfer performance of universities and public research institutes.

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

A Study on Maturity Model of Information Integration System (정보연계 시스템의 성숙도 모델에 관한 연구)

  • Ha, Hyodong;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.570-578
    • /
    • 2019
  • In this era of big data, a variety of government organizations are trying to create new added value via Information Integration. Therefore, several projects related to government agencies' information sharing have activated system connection/integration. The risk factors of system operation, however, have increased as the volume of Information Integration System grows. The interference in information sharing is predicted to affect the operation of the agencies, and the issue will grow even worse with massive impact on civil society when the agency operation is interrupted due to system failures in terms of infrastructure, software, data quality, and security. Diverse studies related to the maintenance of Information System have been conducted, but there is currently no evaluation framework for the operational system of Information Integration between various government agencies. In this respect, this study distinguishes each of the Information System components, Data, IT, People, Process, systematizes with Plan-Do-See, and finally presents a maturity model for Information Integration. Nine derived processes were analyzed through interview and questionnaires from Information Integration System officials, further suggesting maturity stage applying CMMI. This model allows diagnosis of the maturity level of an Information Integration System, and is expected to be utilized as resource for improving organizational processes.

Patterns of the Change and the Predictors of the Social Exclusion of the Older People: Analysis of English Longitudinal Study of Ageing(ELSA) (노인의 사회적 배제 수준의 변화유형과 예측요인: 영국고령화패널(ELSA)분석)

  • Park, Hyunju;Chung, Soondool
    • 한국노년학
    • /
    • v.32 no.4
    • /
    • pp.1063-1086
    • /
    • 2012
  • The purpose of this study is to understand the current state of the older people's social exclusion by identifying patterns of the change in social exclusion level through a longitudinal analysis with an aim of exploring the predictors of changes. To this end, this study has adopted the panel data, the English longitudinal Study of Ageing(ELSA). The data of 7631 respondents who aged over 50 were used for the final analysis. The social exclusion of the older people was analyzed into five different sub-dimensions: social relationship; cultural activities; access to health services; financial security; and sense of loneliness. The person-centered approach that focuses on the various patterns of the trajectories of change has used semi-parametric group based model in order to estimate different trajectories among individuals. The data was analyzed using Spss 18.0 and SAS 9.2 proc traj. In results, First, semi-parametric group-based model analysis has shown that the older people are not 'homogeneous' group with similar exclusion level in every individual with same trajectories of change, but can be divided into various categories with diverse intercept and slope. Second, different trajectories in change of exclusion level help to confirm that the older people's social exclusion level increases gradually over time or remains unchanged. Third, this analysis has provided the useful guidelines to identify the high-risk groups of social exclusion. Forth, the variables that make difference in more than three dimensions include gender, age, self-perceived health, physical activity, weekly income, marital status, family relation, and beneficiary status. Implications and further suggestion were discussed.

Fire Detection using Deep Convolutional Neural Networks for Assisting People with Visual Impairments in an Emergency Situation (시각 장애인을 위한 영상 기반 심층 합성곱 신경망을 이용한 화재 감지기)

  • Kong, Borasy;Won, Insu;Kwon, Jangwoo
    • 재활복지
    • /
    • v.21 no.3
    • /
    • pp.129-146
    • /
    • 2017
  • In an event of an emergency, such as fire in a building, visually impaired and blind people are prone to exposed to a level of danger that is greater than that of normal people, for they cannot be aware of it quickly. Current fire detection methods such as smoke detector is very slow and unreliable because it usually uses chemical sensor based technology to detect fire particles. But by using vision sensor instead, fire can be proven to be detected much faster as we show in our experiments. Previous studies have applied various image processing and machine learning techniques to detect fire, but they usually don't work very well because these techniques require hand-crafted features that do not generalize well to various scenarios. But with the help of recent advancement in the field of deep learning, this research can be conducted to help solve this problem by using deep learning-based object detector that can detect fire using images from security camera. Deep learning based approach can learn features automatically so they can usually generalize well to various scenes. In order to ensure maximum capacity, we applied the latest technologies in the field of computer vision such as YOLO detector in order to solve this task. Considering the trade-off between recall vs. complexity, we introduced two convolutional neural networks with slightly different model's complexity to detect fire at different recall rate. Both models can detect fire at 99% average precision, but one model has 76% recall at 30 FPS while another has 61% recall at 50 FPS. We also compare our model memory consumption with each other and show our models robustness by testing on various real-world scenarios.

Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints

  • Hua, Wang;Mengyu, Wang;Yuxin, Zhu;Jiqiang, Niu;Xueye, Chen;Yang, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1666-1689
    • /
    • 2021
  • The red line of Permanent Basic Farmland is the most important part in the "three-line" demarcation of China's national territorial development plan. The scientific and reasonable delineation of the red line is a major strategic measure being taken by China to improve its ability to safeguard the practical interests of farmers and guarantee national food security. The delineation of Permanent Basic Farmland zoning (DPBFZ) is essentially a multi-objective optimization problem. However, the traditional method of demarcation does not take into account the synergistic development goals of conservation of cultivated land utilization, ecological conservation, or urban expansion. Therefore, this research introduces the idea of artificial immune optimization and proposes a multi-objective model of DPBFZ red line delineation based on a clone selection algorithm. This research proposes an objective functional system consisting of these three sub-objectives: optimal quality of cropland, spatially concentrated distribution, and stability of cropland. It also takes into consideration constraints such as the red line of ecological protection, topography, and space for major development projects. The mathematical formal expressions for the objectives and constraints are given in the paper, and a multi-objective optimal decision model with multiple constraints for the DPBFZ problem is constructed based on the clone selection algorithm. An antibody coding scheme was designed according to the spatial pattern of DPBFZ zoning. In addition, the antibody-antigen affinity function, the clone mechanism, and mutation strategy were constructed and improved to solve the DPBFZ problem with a spatial optimization feature. Finally, Tongxu County in Henan province was selected as the study area, and a controlled experiment was set up according to different target preferences. The results show that the model proposed in this paper is operational in the work of delineating DPBFZ. It not only avoids the adverse effects of subjective factors in the delineation process but also provides multiple scenarios DPBFZ layouts for decision makers by adjusting the weighting of the objective function.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.