• Title/Summary/Keyword: 메시지 사용 패턴

Search Result 61, Processing Time 0.023 seconds

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

An Architecture of Modeler Supporting Object-Oriented Analysis and Design (객체지향 분석 및 설계를 지원하는 모델러의 구조)

  • 김영진;김대헌;유철중;장옥배;정효택;양영종;이상덕
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.475-477
    • /
    • 1999
  • 기존의 개발 방법이 절차지향 방법에서 객체지향 방법으로 변화해감에 따라 구현시의 중요성보다는 분석 및 설계 단계의 중요성이 높아지고 있고 이를 지원하는 여러 가지 모델링 도구들이 개발되었다. 그러나 이러한 도구는 사용자를 위한 기능에 더 많은 비중을 두어 도구 자체를 구조적으로 정확한 객체지향 방법을 적용하지 못하였다. 본 연구는 인터넷/인트라넷 환경에서 프레임워크를 기반으로 소프트웨어를 개발하기 위한 도구 중에서 모델러에 관한 모듈을 개발하는 것으로서, 도구 자체를 MVC 기반의 객체지향 개념을 적용하여 개발하고 있고, 플랫폼에 독립적인 Java 언어를 이용하여 개발하고 있기 때문에 이와 유사한 OMT 에디터(Java version)를 분석하여 문제점을 개선함으로써 UML 표기법을 사용할 수 있는 모델러를 설계 및 구현하였다. 본 논문은 이러한 모델러를 개발하기 이전의 도구의 구조에 관한 기초 연구로서 위임형 이벤트 모델을 사용한 컨트롤러의 독립성을 이용한 이벤트 처리 기법을 적용하였으며, 여러 개의 뷰(폼)사이의 메시지 전달을 위하여 Agent 패턴이라는 자체 설계 패턴을 개발함으로써 도구 자체를 객체지향적으로 구조화하였다. 이러한 객체지향적 설계 및 구현은 사용자의 요구가 변경되고 도구 자체의 기능 확장이 요구될 경우에 빠르고 쉽게 이를 반영할 수 있다는 장점을 가지고 있다.

  • PDF

Communication Schedule for GEN_BLOCK Redistribution (GEN_BLOCK간 재분산을 위한 통신 스케줄)

  • Yook, Hyun-Gyoo;Park, Myong-Soon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.450-463
    • /
    • 2000
  • Array redistribution is usually required to enhance algorithm performance in many parallel programs on distributed memory multicomputers. GEN_BLOCK redistribution, which is redistribution between different GEN_BLOCKs, is essential for load balancing. However, prior research on redistribution has been focused on regular redistribution, such as redistribution between different CYCLIC(N)s. GEN_BLOCK redistribution is very different from regular redistribution. Message passing in regular redistribution involves repetitions of basic message passing patterns, while message passing for GEN_BLOCK redistribution shows locality. This paper proves that two optimal condition, reducing the number of communication steps and minimizing redistribution size, are essential in GEN_BLOCK redistribution. Additionally, by adding a relocation phase to list scheduling, we make an optimal scheduling algorithm for GEN_BLOCK redistribution. To evaluate the performance of the algorithm, we have performed experiments on a CRAY T3E. According to the experiments, it was proven that the scheduling algorithm shows better performance and that the conditions are critical in enhancing the communication speed of GEN_BLOCK redistribution.

  • PDF

Review on Security Communication Environment in Intelligent Vehicle Transport System (지능형 차량 교통체계에서 보안 통신 리뷰)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.97-102
    • /
    • 2017
  • In this paper, we have interested in cooperative intelligent transport system and autonomous driving system, and focused on analysis of the characteristics of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Basis Service (DENM) message, which is key delivery message among cooperative intelligent transport system (C-ITS) characteristics for research objectivity. For research method, we also described V2X communication, and also analyzed the security certificate and header structure of CAM and DENM messages. We described CAM message, which is a message informing the position and status of the vehicle. And the DENM message is presented a message informing an event such as a vehicle accident, and analysis security communication, which is supported services. According to standard analysis result, 186 bits or 275 bits are used. In addition to the security header and the certificate format used for vehicle communication, we have gained the certificate verification procedure for vehicles and PKI characteristics for vehicles. Also We derived the characteristics and transmission capability of the security synchronization pattern required for V2X secure communication. Therefore when it is considered for communication service of DENM and CAM in the C-ITS environment, this paper may be meaningful result.

A Method for Spam Message Filtering Based on Lifelong Machine Learning (Lifelong Machine Learning 기반 스팸 메시지 필터링 방법)

  • Ahn, Yeon-Sun;Jeong, Ok-Ran
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1393-1399
    • /
    • 2019
  • With the rapid growth of the Internet, millions of indiscriminate advertising SMS are sent every day because of the convenience of sending and receiving data. Although we still use methods to block spam words manually, we have been actively researching how to filter spam in a various ways as machine learning emerged. However, spam words and patterns are constantly changing to avoid being filtered, so existing machine learning mechanisms cannot detect or adapt to new words and patterns. Recently, the concept of Lifelong Learning emerged to overcome these limitations, using existing knowledge to keep learning new knowledge continuously. In this paper, we propose a method of spam filtering system using ensemble techniques of naive bayesian which is most commonly used in document classification and LLML(Lifelong Machine Learning). We validate the performance of lifelong learning by applying the model ELLA and the Naive Bayes most commonly used in existing spam filters.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Causal Order of Message Delivery for Real-Time Data (실시간 성질을 가지는 자료의 인과순서화 전달)

  • Jang, Ik-Hyeon;Do, Jae-Su
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.649-652
    • /
    • 2000
  • 실시간 데이터를 처리하는 응용에서는 유효시간이 지난 데이터를 사용할 수 없다. ${\triangle}$-인과순서화는 데이터의 유효시간 내에 메시지를 인과순서로 전달하는 추상 통신 개념이다. 인과순서를 유지하기 위해서는 순서를 유지하기 위한 제어정보를 교환하여야 하며, 전송부하를 줄이기 위하여 제어정보의 양을 최소화하기 위한 많은 노력이 계속되어 왔다. 본 논문에서는 전송부하를 줄이기 위하여 유효한 통신패턴을 분석하여 중복으로 교환되는 제어정보가 최소화되는 ${\triangle}$-인과순서화 알고리즘을 제안한다.

  • PDF

Design and Evaluation of Multicast Message Delivery Algorithm for Mobile Networks (이동통신망을 위한 멀티캐스트 메시지 전달 알고리즘의 설계 및 평가)

  • Jang, Ik-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.537-545
    • /
    • 2009
  • In this paper, we proposed an effective multicast causal order algorithm with hand-off protocol for mobile networks. Since the size of control informations needed to enforce message transfer order has much influence on the performance of hand-off and message transfer in mobile networks, size of control information need to be minimized. We reduced the size of control information by analyzing all the valid communication patterns and pruning redundant information not required to enforce causal order as early as possible, and used hand-off protocol which requires minimal amount of control information to be transferred. By simulation, we found that the proposed algorithm showed better performance than other existing algorithms.

Energy-Efficient Mobility Management Schemes in HMIPv6 (HMIPv6환경에서 에너지 효율적인 이동성 관리 기법)

  • Yang Sun Ok;Kim SungSuk;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.615-624
    • /
    • 2005
  • In Mobile IP, several types of messages - binding update, binding request and binding acknowledgement - are used to support user mobility. It is necessary to exchange those messages frequently for seamless mobility but it incurs both the increase of network overhead and poor usage of mobile node battery power Thus, we need a mechanism that the server detects users location and also copes with the problems effectively, which is our main concern in this paper Each user records all moving logs locally and periodically makes out profile based on them in HMIPv6. By using profile, estimated resident time can be computed whenever he enters an area and the time is set up as the binding update message lifetime. Of course, the more correct lifetime nay be obtained IP arrival time as well as average resident time Is considered in profile. Through extensive experiments, we measure the bandwidth usage for binding update messages by comparing the proposed schemes with that in HMIPv6. From the results, Gain gets over $80\%$ when mobile node stays more than 13 minutes in a subnet. Namely, we come to know that our schemes improve network usage and energy usage in mobile node by decreasing the number of messages while they also manage users locations like that in HMIPv6.

A Study on the impact of uncertainty of mobile internet charges on an oppsite effect (모바일 인터넷 과금의 불확실성이 사용회피라는 역효과에 미치는 영향에 관한 연구)

  • Kim, Hyoung-Joo;Han, Yoon-Sun
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.159-164
    • /
    • 2007
  • 일상생활 속에 익숙하게 자리 잡은지 오래인 모바일 폰은 이미 고유의 기능인 음성통화와 문자메시지에 대한 서비스가 포화상태 이르러 새로운 수익 창출산업으로 무선인터넷서비스가 각광받고 있는 실정이나, 초기 사용자들에게 부정적인 기대 불일치 경험을 누적시켜 소극적인 사용이나, 사용회피를 유도하는 등 아직까진 기대 이하의 성적을 거두고 있는 실정이다. 예상을 뛰어넘는 과도한 요금에 놀라 이후 무선인터넷 사용을 꺼리게 된 경험이나, 청소년들의 무분별한 무선인터넷 사용에 따른 사고 등 폐해들에 대한 기사 등은 이미 낯설거나 놀라운 뉴스가 아니며, 이러한 직 간접경험들로 인해 아예 무선인터넷을 경험해보고자 시도조차 하지 않는 잠재고객 또한 많은 것이 사실이다. 본 논문에선 설문과 실험을 통해 현재 모바일 사용자들의 무선인터넷 서비스에 대한 기대, 사용 패턴, 만족도 및 바램과 요금체계에 대한 이해도 등을 조사하고, ‘불확실성 회피성향’이 사용회피에 미치는 역효과를 증명하여, 요금체계와 관련한 서비스업계의 개선 방향 제시에 연구목적을 가진다.

  • PDF