• Title/Summary/Keyword: 정보복제

Search Result 781, Processing Time 0.03 seconds

Design and Implementation of Internet Worm Spreading Prevention System (인터넷 웜 확산방지 시스템의 설계 및 구현)

  • 최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.327-331
    • /
    • 2004
  • The new cyber world has created by Internet that is prosperous rapidly. But with the expansion of Internet the hacking and intrusion are also increased very much. Actually there were many incidents in Internet, but the damage was restricted within a local area and local system. However, the Great 1.25 Internet Disturbance has paralyzed the national wide Internet environment. It because the Slammer Worm. The worm is a malformed program that uses both of the hacking and computer virus techniques. It autonomously attacks the vulnerability of Windows system, duplicates and spreads by itself. Jus like the Slammer Worm, almost every worms attack the vulnerability of Windows systems that installed in personal PC. Therefore, the vulnerability in personal PC could destroy the whole Internet world. So, in this paper we propose a Internet Worm Expanding Prevention System that could be installed in personal PC to prevent from expanding the Internet Worm. And we will introduce the results of developed system.

  • PDF

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

A sample survey design for service satisfaction evaluation of regional education offices (지역교육청 수요자 만족도조사를 위한 표본설계에 관한 연구)

  • Heo, Sun-Yeong;Chang, Duk-Joon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.669-679
    • /
    • 2010
  • A sample survey design is suggested for the service satisfaction evaluation of regional education offices based on the sample size of 2009 Gyeongnam regional education offices's customer satisfaction survey. The sample design is developed to fit the goal of evaluation of individual regional offices and allocate at least the minimum sample size to each city or county in Gyeongnam to achieve the goal of the survey. The population is stratified according to the regions and the types of schools, and the sample of schools is selected with proportional to the size of classes within each stratum. Finally, each sample student is selected according to two-stage cluster sampling within each sample school. Weighting averages, weighting totals and so on can be evaluated for analysis purposes. Their variance estimates can be evaluated using re-sampling methods like BBR, Jackknife, linearization-substitution methods, which are generally used for the data from a complex sample.

Efficient Duplication Based Task Scheduling with Communication Cost in Heterogeneous Systems (이질 시스템에서 통신 시간을 고려한 효율적인 복제 기반 태스크 스케줄링)

  • Yoon, Wan-Oh;Baek, Jueng-Kuy;Shin, Kwang-Sik;Cheong, Jin-Ha;Choi, Sang-Bang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.219-233
    • /
    • 2008
  • Optimal scheduling of parallel tasks with some precedence relationship, onto a parallel machine is known to be NP-complete. The complexity of the problem increases when task scheduling is to be done in a heterogeneous environment, where the processors in the network may not be identical and take different amounts of time to execute the same task. This paper introduces a Duplication based Task Scheduling with Communication Cost in Heterogeneous Systems (DTSC), which provides optimal results for applications represented by Directed Acyclic Graphs (DAGs), provided a simple set of conditions on task computation and network communication time could be satisfied. Results from an extensive simulation show significant performance improvement from the proposed techniques over the Task duplication-based scheduling Algorithm for Network of Heterogeneous systems(TANH) and General Dynamic Level(GDL) scheduling algorithm.

A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment (M-IoT 환경에서 PUF 기술을 활용한 안전한 통신채널 구성 기법)

  • Kim, Sumin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.107-118
    • /
    • 2019
  • Based on the Internet of Things technology, one of the core technologies of the fourth industrial revolution, our Ministry of Defense is also pushing to establish M-IoT in defense area to improve management efficiency, innovate military culture and strengthen military power. However, devices connected to the Military Internet of Things can be easily exposed to various of cyber threats as most of them are developed and with a focus on improving sensing and communication skills that collect and transmit data. And it is not easy to uniquely identify the numerous heterogeneous devices, and to establish a secure communication channel between devices or between devices and management servers. In this paper, based on PUF technology, we propose a novel key management scheme that can uniquely identify the various devices, and generate the secret keys needed for the establishment of a secure communication channel using non-replicable information generated by the PUF. We also analyze the efficiency of our proposed scheme through comparison with existing key management scheme and verify the logic and security using BAN Logic.

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

An Adaptive Watermarking Scheme for Three-Dimensional Mesh Models (3차원 메쉬 모델의 적응형 워터마킹 방법)

  • 전정희;호요성
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.41-50
    • /
    • 2003
  • For copyright protection of digital contents, we employ watermarking techniques to embed watermark signals into digital host data. In this paper we propose an adaptive watermarking algorithm for three-dimensional (3-D) mesh models. Watermark signals are inserted into vertex coordinates adaptively according to changes of their position values. While we embed strong watermarks in the areas of large variations, watermarks are weakly inserted in other areas. After we generate triangle strips by traversing the 3-D model and convert the Cartesian coordinates to the spherical coordinate system, we calculate variations of vertex positions along the traversed strips. Then, we insert watermark signals into the vertex coordinates adaptively according to the calculated variations. We demonstrate that imperceptibility of the inserted watermark is significantly improved and show the bit error rate (BER) for robustness.

Web Service Migration based on Contexts (컨텍스트에 기반한 웹 서비스 이동)

  • Kim, Yeon-Seok;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.106-116
    • /
    • 2008
  • It is difficult to provide Web services on a mobile environment because of the intermittent disconnection of a wireless network and the frequent change of context information. To resolve this, Web services must be migrate to devices, which can provide services to users seamlessly. However, researches on hosting, migrating, and replicating Web services on mobile devices are still in an early stage. This paper presents a lightweight Web service framework and an efficient method for establishing a policy of migrating Web services. Based on the WS-Policy standard, the proposed method defines a policy schema, which provides constructs for describing various kinds of contextual information. Specifically, the schema is designed to be extensible enough for different service providers to use different vocabularies to describe their policies. To show the validity, the proposed method for establishing a migration policy has been applied to our mobile Web services framework, resulting in a seamless provisioning of services.

  • PDF

Parametric and Non Parametric Measures for Text Similarity (텍스트 유사성을 위한 파라미터 및 비 파라미터 측정)

  • Mlyahilu, John;Kim, Jong-Nam
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.193-198
    • /
    • 2019
  • The wide spread of genuine and fake information on internet has lead to various studies on text analysis. Copying and pasting others' work without acknowledgement, research results manipulation without proof has been trending for a while in the era of data science. Various tools have been developed to reduce, combat and possibly eradicate plagiarism in various research fields. Text similarity measurements can be manually done by using both parametric and non parametric methods of which this study implements cosine similarity and Pearson correlation as parametric while Spearman correlation as non parametric. Cosine similarity and Pearson correlation metrics have achieved highest coefficients of similarity while Spearman shown low similarity coefficients. We recommend the use of non parametric methods in measuring text similarity due to their non normality assumption as opposed to the parametric methods which relies on normality assumptions and biasness.

The Musculoskeletal Tumors of Werner's Syndrome (워너 증후군에 발생하는 근골격계 종양)

  • Lee, Sang-Hoon;Suh, Sung-Wook;Yoo, Kwang-Hyun;Kim, Han-Soo;Ishikawa, Yuichi;Goto, Makoto
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2002
  • Werner's syndrome is a rare autosomal recessive disorder manifesting as premature aging. It is also known to be characterized by a high frequency of malignant tumors, especially sarcomas. However, Werner's syndrome may be not only a premature aging disease but also a cancer syndrome, because the malignant tumors in these patients are different from those of normal population with respect to involved site, histological type, and age of onset. Recent studies found Werner's syndrome was caused by a mutation of Werner helicase suggesting that WRN helicase may participate in metabolism and repair of DNA. And a dysfunction of WRN helicase may induce the genomic instability causing somatic mutations. Further studies of Werner's syndrome associated with sarcoma might give much informations about the normal aging process and the pathogenesis of sarcomas.

  • PDF