• Title/Summary/Keyword: suspicious data

Search Result 105, Processing Time 0.026 seconds

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.

Implementation of smart security CCTV system based on wireless sensor networks and GPS data (무선 센서 네트워크와 GPS정보를 이용한 스마트 보안 CCTV 시스템 구현)

  • Yoon, Kyung-Hyo;Park, Jin-Hong;Kim, Jungjoon;Seo, Dae-Hwa
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.8
    • /
    • pp.918-931
    • /
    • 2013
  • The conventional object tracking techniques using PTZ camera detects object movements by analyzing acquired image. However, this technique requires expensive hardware devices to perform a complex image processing. And it is occasionally hard to detect object movements, if an acquired image is low quality or image acquisition is impossible. In this paper, we proposes a smart security CCTV system applying to wireless sensor network technique based on IEEE 802.15.4 standard to overcome the problems of conventional object tracking technique, which enables to track suspicious objects by detecting object movements and GPS data in sensor node. This system enables an efficient control of PTZ camera to observe a wide area, decreasing image processing complexity. Also, wireless sensor network is implemented using mesh networks to increase the efficiency of installing sensor node.

A Reflectornet Based on Software Defined Network (소프트웨어 정의 네트워크 기반 리플렉터넷)

  • Park, Taejune;Lee, Seungsoo;Shin, Seoungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.397-405
    • /
    • 2014
  • Software-Defined Networking (SDN), which separates the control plane from the data plane and manages data planes in a centralized way, is now considered as a future networking technology, and many researchers and practitioners have dived into this area to devise new network applications, such new routing methods. Likewise, network security applications could be redesigned with SDN, and some pioneers have proposed several interesting network security applications with SDN. However, most approaches have just reimplemented some well-known network security applications, although SDN provides many interesting features, They didn't effectively use them. To investigate if we can use SDN in realizing sophisticated network security applications, we have designed and implemented an advanced network security application, Reflectornet, which redirects malicious or suspicious network trials to other security monitoring points (e.g., honeypot). In addition, we have tested its performance and practicability in diverse angles. Our findings and some insights will encourage other researchers to design better or intelligent network security applications with SDN.

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

A Study on Attitude Estimation of UAV Using Image Processing (영상 처리를 이용한 UAV의 자세 추정에 관한 연구)

  • Paul, Quiroz;Hyeon, Ju-Ha;Moon, Yong-Ho;Ha, Seok-Wun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.137-148
    • /
    • 2017
  • Recently, researchers are actively addressed to utilize Unmanned Aerial Vehicles(UAV) for military and industry applications. One of these applications is to trace the preceding flight when it is necessary to track the route of the suspicious reconnaissance aircraft in secret, and it is necessary to estimate the attitude of the target flight such as Roll, Yaw, and Pitch angles in each instant. In this paper, we propose a method for estimating in real time the attitude of a target aircraft using the video information that is provide by an external camera of a following aircraft. Various image processing methods such as color space division, template matching, and statistical methods such as linear regression were applied to detect and estimate key points and Euler angles. As a result of comparing the X-plane flight data with the estimated flight data through the simulation experiment, it is shown that the proposed method can be an effective method to estimate the flight attitude information of the previous flight.

Screening, Diagnosis, and Treatment of Familial Hypercholesterolemia: Symposium of the Education Committee, Korean Society of Lipid and Atherosclerosis (가족성 고콜레스테롤혈증의 스크린, 진단, 치료: 한국지질동맥경화학회 교육위원회 심포지엄)

  • Lee, Chan Joo;Lee, Ji Hyun;Choi, Seonghoon;Kim, Shin-Hye;Kang, Hyun-Jae;Lee, Sang-Hak;Park, Kyong Soo
    • Journal of Lipid and Atherosclerosis
    • /
    • v.7 no.2
    • /
    • pp.122-154
    • /
    • 2018
  • Familial hypercholesterolemia (FH) is typically associated with single gene mutation that is inherited by autosomal dominant manner. Due to high cardiovascular risk, aggressive discovery, diagnosis, and treatment of FH are critical. Although FH is being increasingly spotlighted, we do not have sufficient data on Korean patients with FH. Here, we present the content of symposium of the Education Committee, Korean Society of Lipid and Atherosclerosis held in May 2018: 1) epidemiology, clinical diagnosis, Korean FH data, and regulation in Korea; 2) genes associated with FH, sequencing process in suspicious proband, cascade screening, and difficulty in genetic diagnosis in FH; 3) the importance of lipid-lowering therapy in FH, conventional and novel therapeutics for FH; 4) diagnosis of FH in children and adolescence, screening, and treatment of FH in children and adolescence; 5) history of FH studies in Korea, the structure and current status of FH registry of Korean Society of Lipid and Atherosclerosis; and 6) difficulty in diagnosis of heterozygous and homozygous FH, drug intolerance and achievement of treatment target. Discussion between speakers and panels were also added. We hope that this article is helpful for understanding FH and future studies performed in Korea.

Analysis on the Reliability and Influence Factors of Refraction Traveltime Tomography Depending on Source-receiver Configuration (송수신기 배열에 따른 굴절 주시 역산의 영향 인자 및 신뢰성 분석)

  • Lee, Donguk;Park, Yunhui;Pyun, Sukjoon
    • Geophysics and Geophysical Exploration
    • /
    • v.20 no.3
    • /
    • pp.163-175
    • /
    • 2017
  • In land seismic exploration, irregular surface topography and weathering layer in near surface distorts the reflected signals of data. Therefore, typical land seismic data should be compensated for this distortion by static correction. To perform the static correction, near-surface velocity is required, which can be obtained by seismic refraction survey. However, land seismic data is often acquired in a limited form of geometry depending on the equipment availability, accessibility condition, and permission for the survey site. In this situation, refraction analysis should be performed using reflection data because it is impossible to acquire refraction-oriented data due to limited source and receiver geometry. In this study, we aimed to analyze the reliability of the results obtained by refraction traveltime tomography when using reflection data with a limited number of sources and receivers from irregular surface topography. By comparing the inversion result from irregular topography with that from flat surface, we found that the surface topography affects the reliability of the inversion results to some degree. We also found that the number of sources has little effect on the inversion results unless the number of sources are very small. On the other hand, we observed that velocity distortion occurred in the overlapped part of receiver arrays when using a limited number of receivers, and therefore suggested the size of the least overlapping ratio to avoid the velocity distortion. Finally, we performed numerical tests for the model which simulates the surface topography and acquisition geometry of the survey region and verified the reliability analysis of inversion results. We identified reliable areas and suspicious area of the inverted velocity model by applying the analysis results to field data.

Diagnostic Accuracy of Fine Needle Aspiration Cytology in Thyroid Lesions - Analysis of Histologically Confirmed 153 Cases - (갑상선 질환의 진단에 있어서 세침흡인세포학적 검사의 중요성 - 조직학적으로 확진된 153예에 대한 연구 -)

  • Park, Kyeong-Mee;Ko, Ill-Hyang
    • The Korean Journal of Cytopathology
    • /
    • v.7 no.2
    • /
    • pp.122-133
    • /
    • 1996
  • This is a retrospective review of fine-needle aspiration cytology(FNAC) smears of 153 cases of thyroid disease performed during August 1989 to July 1995, which were confirmed histologically following surgical operations. FNAC results showed 63 cases(41.2%) of adenomatous goiter, 45 cases(29.4%) of papillary carcinoma, 29 cases(19.0%) of follicular neoplasm, 4 cases(2.6%) of follicular variant of papillary carcinoma, 4 cases(2.6%) of Hashimoto's thyroiditis, 4 cases(2.6%) of $H\ddot{u}rthle$ cell neoplasm, 2 cases(1.3%) of medullary carcinoma and one case(0.7%) each of subacute thyroiditis and of anaplastic carcinoma. The overall accuracy of cytological diagnosis was 83.7%. These data strongly suggest thyroid FNAC is a reliable preoperative diagnostic tool, but FNAC has been less valuable in the diagnosis of follicular lesions than any other disease of the thyroid. Adenomatous goiter was not infrequently interpreted as follicular neoplasia that requires surgery for diagnostic conformation and vice versa. The following findings are considered to be compatible with follicular neoplasm: 1) microfollicles, 2) nuclear grooving, 3) irregularity of nuclear membrane, and 4) irregular arrangement or crowding of follicular cells in groups. The FNAC criteria of adenomatous goiter are as follows: 1) atrophic follicular cells, 2) presence of macrophages, 3) abundant colloid, and 4) large follicles. It is recommended that aspiration of thyroid lesions in order to analyse with critical clinico-pathological approach and surgery is considered only for nodules that are clinically suspicious or unresponsive to hormone therapy or when a diagnosis of follicular neoplasm is made.

  • PDF

Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)

  • In, Hoh Peter;Lee, Myoung-Rak;Kim, Do-Hoon;Kim, Nung-Hoe;Yoon, Byung-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1329-1345
    • /
    • 2011
  • After the 9.11 terror attack, lawful Interception (LI) has emerged as an important tool for anti-terrorist activity. Law enforcement agents and administrative government bodies effectively monitor suspicious target users of permanent IP-based network devices by LI in Packet Data Networks (PDNs). However, it is difficult to perform LI in monitoring migrating users from a location to another, who change their IPs due to the proliferation of portable Internet devices enabling 3G IP Multimedia Subsystems (IMS). The existing, manual handover technique in 3G IMS makes it even more difficult to continue the LI activities due to time-lag reissuance of LI authority warrants when the target users move to a new LI jurisdiction via a roaming service. Our proposed model is a seamless LI handover mechanism in 3G IMS to support mobility detection of the target users. The LI warrants are transferred to the new LI agent automatically with the target users when they move to a new LI jurisdiction. Thus, time-lag human intervention of reissuance of the LI warrants is removed and enables the LI authorities to continue monitoring. In the simulation of our proposed mechanism, the quality of lawful interception achieves a mean score of over 97.5% out of the possible 100% maximum score, whereas the quality of the existing mechanism has a mean score of 22.725%.

Survey on Health Effects among Workers in the Humidifier Disinfectant Manufacturing Process (가습기 살균제 제조 공정 근로자 건강영향 조사)

  • Kang, Young Joong;Park, Soon Woo;Eom, Huisu;Kim, Eun-A
    • Journal of Environmental Health Sciences
    • /
    • v.44 no.5
    • /
    • pp.409-420
    • /
    • 2018
  • Objectives: An outbreak of humidifier disinfectant-related respiratory disease has not only been a massive disaster for end users, but it is also a concern for the workers of the manufacturers. This study presents the results of a questionnaire survey on the health effects among workers involved in the manufacture of humidifier disinfectants. Methods: Seven sites where humidifier disinfectants were manufactured were identified. A questionnaire survey was conducted to assess the physical symptoms experienced by workers related to humidifier disinfectants. Among a total of 177 workers, 42 subjects were available for the survey. Results: Twenty-one of the 42 respondents reported that they experienced respiratory or skin and mucosal irritation symptoms during work. Of the respondents who experienced symptoms, 14 believed that their symptoms were related to the work process and reported that the symptoms were experienced while working. However, no respondents reported ongoing symptoms or sequelae during the investigation period, and this result could not minimize selection bias due to low response rates. We then compared the characteristics of the group who experienced suspicious symptoms with those of the group without any symptoms. There was no statistically significant difference between two groups. Conclusions: We could not find significant health effects related to the humidifier disinfectant manufacturing process, although 21 respondents experienced stimulant symptoms and 14 respondents believed that the symptoms were related to the work process. Due to the long period of time after occupational exposure and the lack of data, there were many limitations to this study. However, this is one of the few follow-up investigations of workers related to this large-scale disaster in South Korea and the limitations of this study highlight the need to follow up with a nationwide database rather than an occasional survey.