• Title/Summary/Keyword: user state transition

Search Result 43, Processing Time 0.026 seconds

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.

A Multimedia Contents Recommendation System using Preference Transition Probability (선호도 전이 확률을 이용한 멀티미디어 컨텐츠 추천 시스템)

  • Park, Sung-Joon;Kang, Sang-Gil;Kim, Young-Kuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.164-171
    • /
    • 2006
  • Recently Digital multimedia broadcasting (DMB) has been available as a commercial service. The users sometimes have difficulty in finding their preferred multimedia contents and need to spend a lot of searching time finding them. They are even very likely to miss their preferred contents while searching for them. In order to solve the problem, we need a method for recommendation users preferred only minimum information. We propose an algorithm and a system for recommending users' preferred contents using preference transition probability from user's usage history. The system includes four agents: a client manager agent, a monitoring agent, a learning agent, and a recommendation agent. The client manager agent interacts and coordinates with the other modules, the monitoring agent gathers usage data for analyzing the user's preference of the contents, the learning agent cleans the gathered usage data and modeling with state transition matrix over time, and the recommendation agent recommends the user's preferred contents by analyzing the cleaned usage data. In the recommendation agent, we developed the recommendation algorithm using a user's preference transition probability for the contents. The prototype of the proposed system is designed and implemented on the WIPI(Wireless Internet Platform for Interoperability). The experimental results show that the recommendation algorithm using a user's preference transition probability can provide better performances than a conventional method.

AN INTERACTIVE BUILDING MODELING SYSTEM BASED ON THE LEGO CONCEPT

  • Chen, Sheng-Yi;Lin, Cong-Kai;Tai, Wen-Kai
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.128-135
    • /
    • 2009
  • In this paper, we proposed an interactive GUI (Graphical User Interface) system to model buildings with an editable script. Our system also provides probabilistic finite-state machine (PFSM) to define the relationships of sub-models with transformation matrices and transition probabilities for constructing new novel building models automatically. User can not only get various building models by PFSM but also adjust the probabilities of sub-models from PFSM to get desired building models. As shown in the results, the various and vivid building models can be constructed easily and quickly for non-expert users. Besides, user can also edit the script file which is provided by our system to modify the properties directly.

  • PDF

Fast Distributed Network File System using State Transition Model in the Media Streaming System (미디어 스트리밍 시스템에서의 상태 천이 모델을 활용한 고속 분산 네트워크 파일 시스템)

  • Woo, Soon;Lee, Jun-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.145-152
    • /
    • 2012
  • Due to the large sizes of streaming media, previous delivery techniques are not providing optimal performance. For this purpose, video proxy server is employed for reducing the bandwidth consumption, network congestion, and network traffic. This paper proposes a fast distributed network file system using state transition model in the media streaming system for efficient utilization of video proxy server. The proposed method is composed of three steps: step 1. Training process using state transition model, step 2. base and decision probability generation, and step 3. storing and deletion based on probability. In addition, storage space of video proxy server is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, the proposed method provides the lowest user start-up latency and the highest bandwidth saving significantly.

Computer Aided Design of Sequential Logic Circuits (Case of Synchronous Sequential Logic Circuits) (컴퓨터를 이용한 순차 논리 회로의 설계 (동기식 순차 논리 회로의 경우))

  • 김경식;조동섭;황희영
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.33 no.4
    • /
    • pp.134-139
    • /
    • 1984
  • This paper presents the computer program to design the synchronous sequential logic circuit. The computer program uses the MASK method to get the circuit of optimal cost. The computer program takes as an input, the minimal reduced state transition table where each state has its internal code. As an output,the optimal design of synchronous sequential logic circuit is generated for each flipflop type of JK,T,D, and RS respectively. And these circuits for 4 flipflop types are evaluated and sorted in ascending order of their costs, so that the user can select the proper flipflop type and its circuit. Furthermore,the proposed computer program may be applied to state assignment with its facility of cost evaluation.

  • PDF

Navigational Structure and User Behavior Modeling for Restructuring of Web-based Information Systems (웹기반 정보시스템의 재구성을 위한 항해구조 및 사용자행동 모델링)

  • 박학수;황성하;이강수
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.730-744
    • /
    • 2002
  • A Web-Based Information System(WBIS), a typical structure of recently information systems, should be dynamically restructured in order to satisfy user's need and make a profit. Thus, we should analyze and modelize the navigational structure of WBIS and utilize it by modeling the navigational structure of behavior of user through log-file as system restructuring. In this paper, we propose the modeling method for navigational structure and user behavior to restructure WBIS including shopping mall. Also, we suggest the structural model, state transition model, Petri net model and analysis method and analyze and implement modeling algorithm for user behavior to analyze log-file of it. Then, we propose some restructuring heuristic and apply the methods to the example of WBIS.

  • PDF

Proposal and Design of a Novel SNA Protocol for the Power Control System (전력제어 시스템을 위한 SNA 프로토콜 제안 및 설계)

  • Park, Min-Ji;Lee, Dong-Min;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1122-1128
    • /
    • 2010
  • In this paper, we proposed and designed a novel SNA protocol which operates in the way of a server and a client in the power control system. The proposed SNA protocol includes the information about the mode switching, the saving position of context information, the user trigger, and so forth, which are needed in the power management devices. We consider the application of the SNA protocol to the home network, where message flows between the SNA server and the SNA client. To verify the operation of the SNA protocol, the state transition diagrams of the server in the home gateway and the client in the network device are shown. Hence, we can conclude the SNA can operate without malfuction.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

Development Method and Design of B-ISDN Protocol embedded IP-PBX System for Multimedia Communication (B-ISDN프로토콜 내장의 멀티미디어통신용 IP-PBX 시스템의 개발방법 및 설계)

  • Choi Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1700-1709
    • /
    • 2006
  • In this raper we researched on the development methods and design of the B-ISDN protocol embedded IP-PBX System with the computers interconnected by the Internet for the previous telephone exchange and communication. We designed the structure of the user terminal and exchange sewer of the IP-PBX System, defined message and data structure for call control, and designed call control state transition and call control message flows for user's communication. And we researched on the message flows for supplementary services and the call control for multiple calls.

TCP Throughput Analysis in the Portable Internet Wireless Environment with Consideration of Mobility (휴대 인터넷 무선 환경에서 이동성을 고려한 TCP 처리율 분석)

  • 원기섭;조용범;노재성;조성준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.399-403
    • /
    • 2004
  • In this paper, we have analyzed the TCP throughput of Portable Internet system in 2.3GHz wireless environment with considering user's mobility speed. As the Portable Internet uses large cells compared to wireless LAM and supports user's nobility, we have adapted different wireless channel model to derive the TCP throughput of the system. We have assumed wireless channel is Rayleigh fading channel and the channel is modeled as two-state Markov model with which user's nobility speed can be considered by varying transition matrix of the model. from the simulation results, we have known that higher TCP throughput under the slow fading than under the fast fading. Because the TCP throughput is closely related to the sender's congestion control, the more congestion control is done by the sender, the lower TCP throughput we have. The more congestion control is caused in the sender under the fast fading than the slow fading so the lower TCP throughput is resulted in the fast fading environment.

  • PDF