• Title/Summary/Keyword: 사용자 패턴 정보

Search Result 1,286, Processing Time 0.022 seconds

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

An Optimized Sleep Mode for Saving Battery Consumption of a Mobile Node in IEEE 802.16e Networks (IEEE 802.16e 시스템에서 이동 단말의 전력 소모 최소화를 위한 취적 휴면 기법)

  • Park, Jae-Sung;Kim, Beom-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.221-229
    • /
    • 2007
  • In this paper, we propose and analyze the optimized sleep mode for a mobile node (MN) in IEEE 802.16e wireless metropolitan area networks. Because a MN in a sleep mode specified in 802.16e specification should maintain state information with the base station currently attached, it must renew sleep state with a new base station after handover which leads to unnecessary waste of battery power. Noting that the mobility pattern of a MN is independent of call arrival patterns, we propose an optimized sleep mode to eliminate unnecessary standby period of a MN in sleep state after handover. We also propose an analytical model for the proposed scheme in terms of power consumption and the initial call response time. Simulation studies that compare the performance between the sleep mode and the optimized sleep mode show that our scheme marginally increases initial call response delay with the huge reduction in power consumption.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

A Design and Implementation of Intelligent Self-directed learning APP for Considering User Learning Level (학습 수준정보를 반영한 지능형 자기 주도 학습 앱 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.4
    • /
    • pp.55-62
    • /
    • 2013
  • Most of the APP market today, it is biased in the field of games and entertainment. In contrast, market-share of the educational APP is very low. This phenomenon is due to two major problems. The first is a decrease in the reuse because of the test of simple pattern. The second is difficult to consider user-level range that was learned previously. In this case it is necessary for students to do additional effort. This paper, propose an educational intelligent educational APP to solve the problems described above and shows implementation results. This system analyzes the stored results that have been saved to determine the area of vulnerability. Time-based Re-validation module helps long-term memory of student. The proposed system in this way directly supports self-directed learning. Therefore, the students can be able to relearn weak area autonomously. It results in improved academic achievement.

  • PDF

Real-Time Object Recognition Using Local Features (지역 특징을 사용한 실시간 객체인식)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.14 no.3
    • /
    • pp.224-231
    • /
    • 2010
  • Automatic detection of objects in images has been one of core challenges in the areas such as computer vision and pattern analysis. Especially, with the recent deployment of personal mobile devices such as smart phone, such technology is required to be transported to them. Usually, these smart phone users are equipped with devices such as camera, GPS, and gyroscope and provide various services through user-friendly interface. However, the smart phones fail to give excellent performance due to limited system resources. In this paper, we propose a new scheme to improve object recognition performance based on pre-computation and simple local features. In the pre-processing, we first find several representative parts from similar type objects and classify them. In addition, we extract features from each classified part and train them using regression functions. For a given query image, we first find candidate representative parts and compare them with trained information to recognize objects. Through experiments, we have shown that our proposed scheme can achieve resonable performance.

Recognition of Various Printed Hangul Images by using the Boundary Tracing Technique (경계선 기울기 방법을 이용한 다양한 인쇄체 한글의 인식)

  • Baek, Seung-Bok;Kang, Soon-Dae;Sohn, Young-Sun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.1
    • /
    • pp.1-5
    • /
    • 2003
  • In this paper, we realized a system that converts the character images of the printed Korean alphabet (Hangul) to the editable text documents by using the black and white CCD camera, We were able to abstract the contours information of the character which is based on the structural character by using the boundary tracing technique that is strong to the noise on the character recognition. By using the contours information, we recognized the horizontal vowels and vertical vowels of the character image and classify the character into the six patterns. After that, the character is divided to the unit of the consonant and vowel. The vowels are recognized by using the maximum length projection. The separated consonants are recognized by comparing the inputted pattern with the standard pattern that has the phase information of the boundary line change. We realized a system that the recognized characters are inputted to the word editor with the editable KS Hangul completion type code.

Development of Human-machine Interface based on EMG and EOG (근전도와 안전도 기반의 인간-기계 인터페이스기술)

  • Gang, Gyeong Woo;Kim, Tae Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.129-137
    • /
    • 2013
  • As the usage of computer based systems continues to increase in our normal life, there are constant efforts to enhance the accessibility of information for handicapped people. For this, it is essential to develop new interface ways for physical disabled peoples by means of human-computer interface (HCI) or human-machine interface (HMI). In this paper, we developed HMI using electromyogram (EMG) and electrooculogram (EOG) for people with physical disabilities. Developed system is composed of two modules, hardware module for signal sensing and software module for feature extraction and pattern classification. To maximize ease of use, only two skin contact electrodes are attached on both ends of brow, and EOG and EMG are measured simultaneously through these two electrodes. From measured signal, nine kinds of command patterns are extracted and defined using signal processing and pattern classification method. Through Java based real-time monitoring program, developed system showed 92.52% of command recognition rate. In addition, to show the capability of the developed system on real applications, five different types of commands are used to control ER1 robot. The results show that developed system can be applied to disabled person with quadriplegia as a novel interface way.

Analysis of Activities of Daily Living for Silver Generations with an IoT-Based Telecare System (사물 인터넷 기반 텔레케어 시스템을 활용한 실버 세대의 활동량 분석)

  • Park, Young-Soo;Park, Kyoung-Yong;Kim, Min-Sun;Lee, Seung-Youp;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.85-90
    • /
    • 2015
  • In this paper, a novel Internet-of-things (IoT) based telecare system is proposed to provide high-quality care services to silver generations. It consists of various sensor nodes including activity sensors, wearable emergency pagers, emergency telephone as a home gateway, and a server as a telecare service platform. Especially, an activity index as a qualification method is presented to analyze the activities of daily living. By using the activity index, the daily/weekly/monthly activity information can be obtained, from which we infer the activity pattern, notice the abrupt change of the activity, and take appropriate actions in abnormal situations.

An Efficient MAC Protocol for Supporting Multimedia Services in APON (APON에서 멀티미디어 전송을 위한 효율적인 MAC 프로토콜)

  • 은지숙;이호숙;윤현정;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.132-141
    • /
    • 2000
  • In this paper, we proposed the MAC protocol of APON supporting multi-class traffic such as CBBUVBR, ABR, UBR, to guarantee the required QoS of each service. For this, we analyze the performance of variousrequest mechanisms and employee the different request mechanism for each traffic classes. Upstream anddownstream frame structures to minimize transmission overhead are proposed based on our request mechanism.The proposed MAC protocol applies the different priority to permit distribution process. CBBWBR traffic, withthe stringent requirements on CDV or delay, is allocated prior to any other class. ABR traffic, which hasnon-strict CDV or delay criteria, uses flexibly the available bandwidth but ensures a minimum cell rate (MCR).UBR traffic is allocated with lowest priority for the remaining capacity. The performance of proposed protocol isevaluated in terms of transfer delay and 1-point CDV with various offered load. The result of simulation showsthat the proposed protocol guarantees the required QoS of the corresponding category, while making use of theavailable resources in both an efficient and dynamical way.

  • PDF

The input method of the Hangul and Alphanumeric characters for the PDAs (휴대형 정보기기의 한글 및 영숫자 필기 입력 방안)

  • 홍성민;국일호;조원경
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.53-60
    • /
    • 1998
  • In this paper, we proposed a set of ANSI-Korean character patterns for handwriting recognition that can be used as an input method of mobile computers like PDA (Personal Digital Assistant). In the case of bilinguals, two kinds of alphabets are written alternatively So the method of input character mode change must be provided, and this cause discomfort of writing. Our proposed written character patterns have some constraint but permit ANSI-Korean mixed writing without mode change keeping original form of alphabets and can be recognized with simple algorithm relatively. For ANSI character we analysis Graffiti and propose new writing pattern, which is more similar to original form. There are many researches about input method of unpacking Korean character and writing patterns. But they are not widely used because it's excessively contrary to original form of Korean characters. To show our proposed writing patterns usefulness, we studied the satisfaction and easiness of writing and the recognition rates. Writers are divided into two groups; PDA users, familiar to Graffiti, and others. The results satisfy usefulness in the both groups.

  • PDF