• Title/Summary/Keyword: 검사알고리즘

Search Result 938, Processing Time 0.031 seconds

The Design and Implementation of High Performance Intrusion Prevention Algorithm based on Signature Hashing (시그너처 해싱 기반 고성능 침입방지 알고리즘 설계 및 구현)

  • Wang, Jeong-Seok;Jung, Yun-Jae;Kwon, H-Uing;Chung, Kyu-Sik;Kwak, Hu-Keun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.209-220
    • /
    • 2007
  • IPS(Intrusion Prevention Systems), which is installed in inline mode in a network, protects network from outside attacks by inspecting the incoming/outgoing packets and sessions, and dropping the packet or closing the sessions if an attack is detected in the packet. In the signature based filtering, the payload of a packet passing through IPS is matched with some attack patterns called signatures and dropped if matched. As the number of signatures increases, the time required for the pattern matching for a packet increases accordingly so that it becomes difficult to develop a high performance US working without packet delay. In this paper, we propose a high performance IPS based on signature hashing to make the pattern matching time independent of the number of signatures. We implemented the proposed scheme in a Linux kernel module in a PC and tested it using worm generator, packet generator and network performance measure instrument called smart bit. Experimental results show that the performance of existing method is degraded as the number of signatures increases whereas the performance of the proposed scheme is not degraded.

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages (HyMES에 대한 결합 확률 분포 기반 단일 파형 분석)

  • Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1099-1112
    • /
    • 2018
  • The field of post-quantum cryptography (PQC) is an active area of research as cryptographers look for public-key cryptosystems that can resist quantum adversaries. Among those categories in PQC, code-based cryptosystem provides high security along with efficiency. Recent works on code-based cryptosystems focus on the side-channel resistant implementation since previous works have indicated the possible side-channel vulnerabilities on existing algorithms. In this paper, we recovered the secret key in HyMES(Hybrid McEliece Scheme) using a single power consumption trace. HyMES is a variant of McEliece cryptosystem that provides smaller keys and faster encryption and decryption speed. During the decryption, the algorithm computes the parity-check matrix which is required when computing the syndrome. We analyzed HyMES using the fact that the joint distributions of nonlinear functions used in this process depend on the secret key. To the best of our knowledge, we were the first to propose the side-channel analysis based on joint distributions of leakages on public-key cryptosystem.

Diagnosis Model for Closed Organizations based on Social Network Analysis (소셜 네트워크 분석 기반 통제 조직 진단 모델)

  • Park, Dongwook;Lee, Sanghoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.6
    • /
    • pp.393-402
    • /
    • 2015
  • Human resources are one of the most essential elements of an organization. In particular, the more closed a group is, the higher the value each member has. Previous studies have focused on personal attributes of individual, such as medical history, and have depended upon self-diagnosis to manage structures. However, this method has weak points, such as the timeconsuming process required, the potential for concealment, and non-disclosure of participants' mental states, as this method depends on self-diagnosis through extensive questionnaires or interviews, which is solved in an interactive way. It also suffers from another problem in that relations among people are difficult to express. In this paper, we propose a multi-faced diagnosis model based on social network analysis which overcomes former weaknesses. Our approach has the following steps : First, we reveal the states of those in a social network through 9 questions. Next, we diagnose the social network to find out specific individuals such as victims or leaders using the proposed algorithm. Experimental results demonstrated our model achieved 0.62 precision rate and identified specific people who are not revealed by the existing methods.

Dependency Label based Causing Inconsistency Axiom Detection for Ontology Debugging (온톨로지 디버깅을 위한 종속 부호 기반 비논리적 공리 탐지)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.764-773
    • /
    • 2008
  • The web ontology language(OWL) has become a W3C recommendation to publish and share ontologies on the semantic web. In order to check the satisfiablity of concepts in OWL ontology, OWL reasoners have been introduced. But most reasoners simply report check results without providing a justification for any arbitrary entailment of unsatisfiable concept in OWL ontologies. In this paper, we propose dependency label based causing inconsistency axiom (CIA) detection for debugging unsatisfiable concepts in ontology. CIA is a set of axioms to occur unsatisfiable concepts. In order to detect CIA, we need to find axiom to cause inconsistency in ontology. If precise CIA is gave to ontology building tools, these ontology tools display CIA to debug unsatisfiable concepts as suitable presentation format. Our work focuses on two key aspects. First, when a inconsistency ontology is given, it detect axioms to occur unsatisfiable and identify the root of them. Second, when particular unsatisfiable concepts in an ontology are detected, it extracts them and presents to ontology designers. Therefore we introduce a tableau-based decision procedure and propose an improved method which is dependency label based causing inconsistency axiom detection. Our results are applicable to the very expressive logic SHOIN that is the basis of the Web Ontology Language.

Differences in self-efficacy between block and textual language in programming education using online judge (자동평가시스템을 활용한 프로그래밍 교육에서 블록형 언어와 텍스트형 언어 간 자기효능감의 차이)

  • Chang, Won-Young;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.4
    • /
    • pp.23-33
    • /
    • 2020
  • Online judge provides compilation, execution, and immediate feedback on the source submitted by the learner, and ensures the accuracy and reliability of the evaluation, but it's difficult to select the language according to the level of the learner because most of them provide only textual language. In this study, a block language for online judge was developed and applied to high school classes, and the difference in self-efficacy between the block language and the textual language group was confirmed. It was found that Block language group have more ability expectation to overcome disgust experience than textual language group and Textual language group have significant decrease in ability expectation to start activity and to continue activity. It implies that Block language has an effect on self-efficacy for afterward programming activities, and methods of teaching, learning and evaluation should be devised in the case of textual language so that student's self-efficacy does not deteriorate at the initial and ongoing stage of activity. The results of this study are meaningful in that it provide various implications of methods for enhancing self-efficacy in high school class of programming.

FPGA Mapping Incorporated with Multiplexer Tree Synthesis (멀티플렉서 트리 합성이 통합된 FPGA 매핑)

  • Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.37-47
    • /
    • 2016
  • The practical constraints on the commercial FPGAs which contain dedicated wide function multiplexers in their slice structure are incorporated with one of the most advanced FPGA mapping algorithms based on the AIG (And-Inverter Graph), one of the best logic representations in academia. As the first step of the mapping process, cuts are enumerated as intermediate structures. And then, the cuts which can be mapped to the multiplexers are recognized. Without any increased complexity, the delay and area of multiplexers as well as LUTs are calculated after checking the requirements for the tree construction such as symmetry and depth limit against dynamically changing mapping of neighboring nodes. Besides, the root positions of multiplexer trees are identified from the RTL code, and annotated to the AIG as AOs (Auxiliary Outputs). A new AIG embedding the multiplexer tree structures which are intentionally synthesized by Shannon expansion at the AOs, is overlapped with the optimized AIG. The lossless synthesis technique which employs FRAIG (Functionally Reduced AIG) is applied to this approach. The proposed approach and techniques are validated by implementing and applying them to two RISC processor examples, which yielded 13~30% area reduction, and up to 32% delay reduction. The research will be extended to take into account the constraints on the dedicated hardware for carry chains.

Clinical Applications of Neuroimaging with Susceptibility Weighted Imaging: Review Article (SWI의 신경영상분야의 임상적 이용)

  • Roh, Keuntak;Kang, Hyunkoo;Kim, Injoong
    • Investigative Magnetic Resonance Imaging
    • /
    • v.18 no.4
    • /
    • pp.290-302
    • /
    • 2014
  • Purpose : Susceptibility-weighted magnetic resonance (MR) sequence is three-dimensional (3D), spoiled gradient-echo pulse sequences that provide a high sensitivity for the detection of blood degradation products, calcifications, and iron deposits. This pictorial review is aimed at illustrating and discussing its main clinical applications. Materials and Methods: SWI is based on high-resolution, 3D, fully velocity-compensated gradient-echo sequences using both magnitude and phase images. To enhance the visibility of the venous structures, the magnitude images are multiplied with a phase mask generated from the filtered phase data, which are displayed at best after post-processing of the 3D dataset with the minimal intensity projection algorithm. A total of 200 patients underwent MR examinations that included SWI on a 3 tesla MR imager were enrolled. Results: SWI is very useful in detecting multiple brain disorders. Among the 200 patients, 80 showed developmental venous anomaly, 22 showed cavernous malformation, 12 showed calcifications in various conditions, 21 showed cerebrovascular accident with susceptibility vessel sign or microbleeds, 52 showed brain tumors, 2 showed diffuse axonal injury, 3 showed arteriovenous malformation, 5 showed dural arteriovenous fistula, 1 showed moyamoya disease, and 2 showed Parkinson's disease. Conclusion: SWI is useful in detecting occult low flow vascular lesions, calcification and microbleed and characterising diverse brain disorders.

Design and Implementation of Multi-dimensional Learning Path Pattern Analysis System (다차원 학습경로 패턴 분석 시스템의 설계 및 구현)

  • Baek, Jang-Hyeon;Kim, Yung-Sik
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.461-470
    • /
    • 2005
  • In leaner-controlled environment where learners can decide and restructure the contents, methods and order of learning by themselves, it is possible to apply individualized learning in consideration of each learner's characteristics. The present study analyzed learners' learning path pattern, which is one of learners' characteristics important in Web-based teaching-learning process, using the Apriori algorithm and grouped learners according to their learning path pattern. Based on the result, we designed and implemented a multi-dimensional learning path pattern analysis system to provide individual learners with teaming paths, learning contents, learning media, supplementary teaming contents, the pattern of material presentation, etc. multi-dimensionally. According to the result of surveying satisfaction with the developed system satisfaction with supplementary learning contents was highest (Highly satisfied '$24.5\%$, Satisfied'$35.7\%$). By learners' level, satisfaction was higher in low-level learners (Highly satisfied'$20.2\%$, Satisfied'$31.2\%$) than in high-level learners (Highly satisfied'$18.4\%$, 'Satisfied'$28.54\%$). The developed system is expected to provide learners with multi-dimensionally meaningful information from various angles using OLAP technologies such as drill-up and drill-down.

Construction of 3D Digital Maps Using 3D Symbols (3차원 심볼을 활용한 3차원 수치지도 제작에 관한 연구)

  • Park, Seung-Yong;Lee, Jae-Bin;Yu, Ki-Yun;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.24 no.5
    • /
    • pp.417-424
    • /
    • 2006
  • Despite of many researches related to create 3D digital maps, it is still time-consuming and costly because a large part of 3D digital mapping is conducted manually. To circumvent this limitation, we proposed methodologies to create 3D digital maps with 3D symbols automatically. For this purpose, firstly, the 3D symbol library to represent 3D objects as 3D symbols was constructed. In this library, we stored the attribute and geometry information of 3D objects which define types and shapes of symbols respectively. These information were used to match 3D objects with 3D symbols and extracted from 2D digital maps and LiDAR(Light Detection and Ranging) data. Then, to locate 3D symbols into a base map automatically, we used predefined parameters such as the size, the height, the rotation angle and the center of gravity of 3D objects which are extracted from LiDAR data. Finally, the 3D digital map in urban area was constructed and the results were tested. Through this research, we can identify that the developed algorithms can be used as effective techniques for 3D digital mapping.

Vehicle Headlight and Taillight Recognition in Nighttime using Low-Exposure Camera and Wavelet-based Random Forest (저노출 카메라와 웨이블릿 기반 랜덤 포레스트를 이용한 야간 자동차 전조등 및 후미등 인식)

  • Heo, Duyoung;Kim, Sang Jun;Kwak, Choong Sub;Nam, Jae-Yeal;Ko, Byoung Chul
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.282-294
    • /
    • 2017
  • In this paper, we propose a novel intelligent headlight control (IHC) system which is durable to various road lights and camera movement caused by vehicle driving. For detecting candidate light blobs, the region of interest (ROI) is decided as front ROI (FROI) and back ROI (BROI) by considering the camera geometry based on perspective range estimation model. Then, light blobs such as headlights, taillights of vehicles, reflection light as well as the surrounding road lighting are segmented using two different adaptive thresholding. From the number of segmented blobs, taillights are first detected using the redness checking and random forest classifier based on Haar-like feature. For the headlight and taillight classification, we use the random forest instead of popular support vector machine or convolutional neural networks for supporting fast learning and testing in real-life applications. Pairing is performed by using the predefined geometric rules, such as vertical coordinate similarity and association check between blobs. The proposed algorithm was successfully applied to various driving sequences in night-time, and the results show that the performance of the proposed algorithms is better than that of recent related works.