• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.027 seconds

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF

An improvement for the employment rate of the S/W and H/W majors (소프트웨어와 하드웨어 전공자들의 취업률 제고 방안)

  • Lee, Seung-Woo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.3
    • /
    • pp.525-534
    • /
    • 2012
  • The purpose of this study is to increase the employment rate of graduates in the fields of the S/W and H/W. In order to seek employment in various major fields of the S/W and H/W, firstly, this paper proposes the educational case study that increases the concern about employment and develops learner's ability in the unfavorable major fields. Secondly, this paper presents the future driving improvement for the employment rate on the basis of the department's special characteristics and the actual circumstances in the fields of the S/W and H/W. This paper conducts the surveys of each 40 seniors majoring in S/W and H/W respectively in order to measure the understanding of probability/statistics which has been used as tools in the unfavorable major fields. With the purpose of increasement on the employment rate, the paper is designed to have 3 steps, that is, a preliminary questionnaire for employment preference, major courses connecting probability/statistics and a post-questionnaire for employment preference, which eventually investigates the changes of the perception on employment. This paper is verified by the multiple regression analysis to approve the effect on improving learner's academic achievement.

API Grouping Based Flow Analysis and Frequency Analysis Technique for Android Malware Classification (안드로이드 악성코드 분류를 위한 Flow Analysis 기반의 API 그룹화 및 빈도 분석 기법)

  • Shim, Hyunseok;Park, Jungsoo;Doan, Thien-Phuc;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1235-1242
    • /
    • 2019
  • While several machine learning technique has been implemented for Android malware categorization, there is still difficulty in analyzing due to overfitting problem and including of un-executable code, etc. In this paper, we introduce our implemented tool to address these problems. Tool is consists of approximately 1,500 lines of Java code, and perform Flow analysis on set of APIs, or on control flow graph. Our tool groups all the API by its relationship and only perform analysis on actually executing code. Using our tool, we grouped 39032 APIs into 4972 groups, and 12123 groups with result of including class names. We collected 7,000 APKs from 7 families and evaluated our feature reduction technique, and we also reduced features again with selecting APIs that have frequency more than 20%. We finally reduced features to 263-numbers of feature for our collected APKs.

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

Development of 3D Image Processing Software using EMD for Ultrasonic NDE (EMD를 이용한 초음파 비파괴 평가용 3차원 영상처리 소프트웨어 개발)

  • Nam, Myung-Woo;Lee, Young-Seock;Yang, Ok-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1569-1573
    • /
    • 2008
  • This paper describes a development of Ultrasonic NDE software to analyze steam generator of nuclear power plant. The developed software includes classical analysis method such as A, B, C and D-scan images. And it can analyze the detected internal cracks using 3D image processing method. To do such, we obtain raw data from specimens of real pipeline of power plants, and get the envelope signal using Empirical Mode Decomposition from obtained ultrasonic 1-dimensional data. The reconstructed 3D crack images offer useful information about the location, shape and size of cracks, even if there is no special 2D image analysis technique. The developed analysis software is applied to specimens containing various cracks with known dimensions. The results of application showed that the developed software provided accurate and enhanced 2D images and reconstructed 3D image of cracks.

An Experience Type Virtual Reality Training System for CT(Computerized Tomography) Operations (컴퓨터 단층 촬영기(CT)의 가상 실습을 위한 3차원 체험형 교육 시스템)

  • Shin, Yong-Min;Kim, Young-Ho;Kim, Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.501-508
    • /
    • 2007
  • Simulation system was introduced and used a lot in the fields of aviation, vessel, and medical treatment. 3D Simulation system has been used quite insufficiently as it requires a lot of system resource and huge amount of computer calculation. As the graphic card performance and simulation function developed, however, PC based simulation has been activated and is verified of its possibility as an educational software. However, educational institutions need to invest huge amount of budget and manpower to purchase and maintain CT Equipment. For such a reason, educational institutions entrust their students to hospitals for indirect experience of operation or for mere observation. This study, therefore, developed a CT Virtual reality education system with which medical CT Equipment can be directly operated in PC based 3D Virtual environment.

An Experimental Study of Generality of Software Defects Prediction Models based on Object Oriented Metrics (객체지향 메트릭 기반인 결함 예측 모형의 범용성에 관한 실험적 연구)

  • Kim, Tae-Yeon;Kim, Yun-Kyu;Chae, Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.407-416
    • /
    • 2009
  • To support an efficient management of software verification and validation activities, much research has been conducted to predict defects in early phase. And defect prediction models have been proposed to predict defects. But the generality of the models has not been experimentally studied for other software system. In other words, most of prediction models were applied only to the same system that had been used to build the prediction models themselves. Therefore, we performed an experiment to explore generality of major prediction models. In the experiment, we applied three defects prediction models to three different systems. As a result, we cannot find their generality of defect prediction capability. The cause is analyzed to result from a different metric distribution between the systems.

Image Edge Detection Technique for Pathological Information System (병리 정보 시스템을 위한 이미지 외곽선 추출 기법 연구)

  • Xiao, Xie;Oh, Sangyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.10
    • /
    • pp.489-496
    • /
    • 2016
  • Thousands of pathological images are produced daily per hospital and they are stored and managed by a pathology information system (PIS). Since image edge detection is one of fundamental analysis tools for pathological images, many researches are targeted to improve accuracy and performance of image edge detection algorithm of HIS. In this paper, we propose a novel image edge detection method. It is based on Canny algorithm with adaptive threshold configuration. It also uses a dividing ruler to configure the two threshold instead of whole image to improve the detection ratio of ruler itself. To verify the effectiveness of our proposed method, we conducted empirical experiments with real pathological images(randomly selected image group, image group that was unable to detect by conventional methods, and added noise image group). The results shows that our proposed method outperforms and better detects compare to the conventional method.

An Efficient Angular Space Partitioning Based Skyline Query Processing Using Sampling-Based Pruning (데이터 샘플링 기반 프루닝 기법을 도입한 효율적인 각도 기반 공간 분할 병렬 스카이라인 질의 처리 기법)

  • Choi, Woosung;Kim, Minseok;Diana, Gromyko;Chung, Jaehwa;Jung, Soonyong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Given a multi-dimensional dataset of tuples, a skyline query returns a subset of tuples which are not 'dominated' by any other tuples. Skyline query is very useful in Big data analysis since it filters out uninteresting items. Much interest was devoted to the MapReduce-based parallel processing of skyline queries in large-scale distributed environment. There are three requirements to improve parallelism in MapReduced-based algorithms: (1) workload should be well balanced (2) avoid redundant computations (3) Optimize network communication cost. In this paper, we introduce MR-SEAP (MapReduce sample Skyline object Equality Angular Partitioning), an efficient angular space partitioning based skyline query processing using sampling-based pruning, which satisfies requirements above. We conduct an extensive experiment to evaluate MR-SEAP.

Survey the Researches of "Programming Curriculum" and Evaluation with Outcome Criterion (「프로그래밍 교육 과정」 연구에 대한 분석과 성취기준 부합도 평가)

  • Kim, JiSoo;Kim, JeongAh
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.235-244
    • /
    • 2017
  • As creativity and problem-solving ability become core competencies, the main objectives of programming subjects in the elementary and secondary educational curriculum is 'computational thinking'. This goal can not be achieved at the level of understanding the characteristics of the programming language and the simple utilization abilities of the computer. The abilities to write algorithms and solve problems in real life situations using programming languages are required. In order to cultivate these abilities, the curriculum of the programming area was strengthened in the elementary and middle education curriculum, and the criteria for evaluating the achievement level were also prepared. However, the curriculum that can be used in actual education field is not yet established. In this study, we analyzed the researches on the existing programming curriculum and evaluated how well the curriculum meets the achievement criteria. Also, we can suggest the aspects to be considered in the study of programming curriculum and to verify whether the results of curriculum operation are in line with achievement criteria. In addition, future directions in elementary and middle school programming curriculum are suggested.