• Title/Summary/Keyword: state graph

Search Result 272, Processing Time 0.043 seconds

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

A Study on the Reliability Evaluation of Communication Networks by Matrix Transformation (행열변현에 의한 통신망의 신뢰도 계정에 관한 연구)

  • 김영근;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.5
    • /
    • pp.379-389
    • /
    • 1988
  • In this paper, an algorithm for obtaining 2-state switching failure function and a terminal pair reliability evaluation method in a communication network are proposed. The communication network is modeled by a graph. By using the sequence of matrix transformations for the graph, minimal cut-set matrix representing all minimal cut-sets which completely interrupt the communication path is determined and 2-state switching failure function is then obtained from the minimal cut-set matrix. The terminal pari reliability of the communication network is evaluated by corresponding the random variables to 2-state switching failure function. Illustrative examples are provided to demonstrate the algorithm. A computer program evaluating the terminal pair reliability in a complex and large network has also been developed.

  • PDF

Controller Design of Takagi-Sugeno Fuzzy Model-Based Multi-Agent Systems for State Consensus (타카기-수게노 퍼지모델 기반 다개체 시스템의 상태일치를 위한 제어기 설계)

  • Moon, Ji Hyun;Lee, Ho Jae;Kim, Do Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.2
    • /
    • pp.133-138
    • /
    • 2013
  • This paper addresses a state consensus controller design technique of Takagi-Sugeno fuzzy model-based multi-agent systems in a continuous-time domain. We express the interconnection topology among the agents through graph theory. The design condition is represented in terms of linear matrix inequalities. Numerical example is provided to demonstrate the effectiveness of the proposed method.

A design of the PSDG based semantic slicing model for software maintenance (소프트웨어의 유지보수를 위한 PSDG기반 의미분할모형의 설계)

  • Yeo, Ho-Young;Lee, Kee-O;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.2041-2049
    • /
    • 1998
  • This paper suggests a technique for program segmentation and maintenance using PSDG(Post-State Dependency Graph) that improves the quality of a software by identifying and detecting defects in already fixed source code. A program segmentation is performed by utilizing source code analysis which combines the measures of static, dynamic and semantic slicing when we need understandability of defect in programs for corrective maintanence. It provides users with a segmental principle to split a program by tracing state dependency of a source code with the graph, and clustering and highlighting, Through a modeling of the PSDG, elimination of ineffective program deadcode and generalization of related program segments arc possible, Additionally, it can be correlated with other design modeb as STD(State Transition Diagram), also be used as design documents.

  • PDF

GUI-based Detection of Usage-state Changes in Mobile Apps (GUI에 기반한 모바일 앱 사용상태 구분)

  • Kang, Ryangkyung;Seok, Ho-Sik
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.448-453
    • /
    • 2019
  • Under the conflicting objectives of maximum user satisfaction and fast launching, there exist great needs for automated mobile app testing. In automated app testing, detection of usage-state changes is one of the most important issues for minimizing human intervention and testing of various usage scenarios. Because conventional approaches utilizing pre-collected training examples can not handle the rapid evolution of apps, we propose a novel method detecting changes in usage-state through graph-entropy. In the proposed method, widgets in a screen shot are recognized through DNNs and 'onverted graphs. We compared the performance of the proposed method with a SIFT (Scale-Invariant Feature Transform) based method on 20 real-world apps. In most cases, our method achieved superior results, but we found some situations where further improvements are required.

Bond Graph Modeling, Analysis and Control of Dual Stage System (본드그래프를 이용한 듀얼 스테이지 시스템의 모델링, 해석, 및 제어)

  • Wang, Wei-Jun;Han, Chang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1453-1459
    • /
    • 2012
  • The dual stage manipulator is composed of the voice coil motor (VCM) and piezoelectric ceramics transducer (PZT), which can produce the high precise displacement and express a well dynamic performance. However, inaccurate modeling of the dual stage will exacerbate the positioning accuracy. This paper presents an approach to model the dual stage system by using bond graph theory. And the state space equations can be derived through the bond graph straightforwardly, which can be used in computing simulations. Through designing the compensators for the dual stage system and simulating, the dual stage performs better dynamics characteristic than the single actuator system.

Strong Connectivity Decision Method using Graph Rewriting System in Conformance Testing (적합성 시험에서 그래프 재표기 시스템을 활용한 강한 연결 판단 방법)

  • Lee, Jun-Won;Kim, Seong-Won;Gu, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1327-1336
    • /
    • 1997
  • Test generation from the communication protocol specified in I/OFSM protocol is based on the asumption that the specification S and implemenataiton I are storngly, connected,minmal and deterministic.In this paper,we identify why these asumptions are necessary for minimal test cases genration from I/OFSM protocol speci-fication,and we propose a graph Rewriting System and its application to the specification I/OFSM for verifying its storng cinnectivity.We prove that the suggested algorithm is more dffcient thah the traditional strongly connected compoment find algorithm.

  • PDF

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

A Study on the Development of Computer Assisted Instruction for the Middle School Mathematics Education - Focused on the graph of quadratic function - (중학교 수학과 CAI 프로그램 개발 연구 -이차함수의 그래프를 중심으로-)

  • 장세민
    • Journal of the Korean School Mathematics Society
    • /
    • v.1 no.1
    • /
    • pp.151-163
    • /
    • 1998
  • In mathematics education, teaching-learning activity can be divided largely into the understanding the mathematical concepts, derivation of principles and laws, acquirement of the mathematical abilities. We utilize various media, teaching tools, audio-visual materials, manufacturing materials for understanding mathematical concepts. But sometimes we cannot define or explain correctly the concepts as well as the derivation of principles and laws by these materials. In order to solve the problem we can use the computer. In this paper, character and movement state of various quadratic function graph types can be used. Using the computers is more visible than other educational instruments like blackboards, O.H.Ps., etc. Then, students understand the mathematical concepts and the correct quadratic function graph correctly. Consquently more effective teaching-learning activity can be done. Usage of computers is the best method for improving the mathematical abilities because computers have functions of the immediate reaction, operation, reference and deduction. One of the important characters of mathematics is accuracy, so we use computers for improving mathematical abilities. This paper is about the program focused on the part of "the quadratic function graph", which exists in mathematical curriculum the middle school. When this program is used for students, it is expected the following educational effect. 1, Students will have positive thought by arousing interests of learning because this program is composed of pictures, animations with effectiveness of sound. 2. This program will cause students to form the mathematical concepts correctly. 3. By visualizing the process of drawing the quadratic function graph, students understand the quadratic function graph structually. 4. Through the feedback, the recognition ability of the trigonometric function can be improved. 5. It is possible to change the teacher-centered instruction into the student-centered instruction. For the purpose of increasing the efficiencies and qualities of mathmatics education, we have to seek the various learning-teaching methods. But considering that no computer can replace the teacher′s role, tearchers have to use the CIA program carefully.

  • PDF

SEPARATION AXIOMS ON BI-GENERALIZED TOPOLOGICAL SPACES

  • Ray, A. Deb;Bhowmick, Rakesh
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.27 no.3
    • /
    • pp.363-379
    • /
    • 2014
  • In this paper, introducing various separation axioms on a bi-GTS, it has been observed that such separation axioms actually unify the well-known separation axioms on topological spaces. Several characterizations of such separation properties of a bi-GTS are established in terms of ${\gamma}_{{\mu}_i,{\mu}_j}$-closure operator, generalized cluster sets of functions and graph of functions.