• 제목/요약/키워드: 척도없는 네트워크

Search Result 201, Processing Time 0.026 seconds

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

Mediating Role of Social Network Support in the Relationship Between Depression and Online Social Networking (우울과 온라인 사회관계망의 관계에서 오프라인 사회관계망의 매개 역할)

  • Kim, In-Hye;Park, Hae-Yean;Nam, Sang-Hun
    • Therapeutic Science for Rehabilitation
    • /
    • v.13 no.3
    • /
    • pp.9-21
    • /
    • 2024
  • Objective : This study investigated the effects of depression on online and offline social interactions among middle-aged and older adults with the aim of enhancing their social connectivity and mental well-being. Methods : Utilizing the Patient Health Questionnaire-9 and the Lubben Social Network Scale-6, this study assessed depression and social relationships in 429 middle-aged adults. We explored the mediation effects of offline relationships on online interactions using path analysis and the Sobel test. Results : Significant links were found between depression and social relationships in a cohort of educated males averaging 63 years of age. Offline interactions mediated 32% of the influence of depression on online relationships, with strong model fit indices emphasizing the importance of offline social interactions. Conclusion : This study highlights the role of active engagement in online and offline networks in improving mental health and managing the impact of depression on social activity among older adults, helping prevent isolation.

Evaluation of Results in Recent Flexible Solar Cell Research Trends via Network Analysis Method (네트워크 분석을 이용한 플렉시블 태양전지 최근 연구동향 분석)

  • Byun, Kisik;Lim, Jae Sung;Park, Jae Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.600-613
    • /
    • 2018
  • The purpose of this research was to introduce a network analysis method for analyzing the recent trend of the flexible solar cell using a scholarly database. Based on the five years from 2013 to 2017, we used centrality analysis of research papers via measurement of degree centrality, closeness centrality, and betweenness centrality. The results of network analysis show that cell has a centrality value above 0.8, which means that cell is connected with 80% of the total keywords, so it is recognized as the center of flexible solar cell research. The analysis results also indicate that perovskite and copper indium gallium diselenide (CuInGaSe2, or CIGS) are the center of the subgroup for cell. We recognize that the result refers to recent new technology called the CIGS/perovskite tandem solar cell. We hope that the network analysis method will be the appropriate and precise tool for technology and research planning via elaboration and optimization.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Development and Validation of the Social Entrepreneurship Measurement Tools: From an Organizational-Level Behavioral Perspective (사회적기업가정신 척도 개발 및 타당화 연구: 조직차원의 행동적 관점에서)

  • Cho, Han Jun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.3
    • /
    • pp.97-113
    • /
    • 2023
  • In order to generalize the social entrepreneurship model with cooperation orientation and increase the possibility of using the model, this study developed a measurement tool and tested it with 389 executives of social enterprises. For the development of the measurement tool, preliminary measurement items were formed through review of previous studies, and a questionnaire was tentatively composed of 40 measurement items in five areas through an expert panel review of the measurement items. A total of 389 questionnaires were collected by conducting a questionnaire survey targeting Korean social enterprise managers, and exploratory and confirmatory factor analysis were conducted using 375 questionnaires that could be analyzed. Five factors for 24 items were derived through exploratory factor analysis and reliability analysis. Through a series of analysis processes including primary and secondary confirmatory factor analysis, the model fit of the newly constructed social entrepreneurship research model was confirmed, and the validity and reliability of the measurement tools were verified. As a result of this study, the model fit of the social entrepreneurship model(social value orientation; innovativeness; pro-activeness; risk-taking; cooperation orientation) is verified, thereby improving the theoretical explanatory power of social entrepreneurship research and at the same time providing the basis and basis for theoretical expansion of follow-up research. The study proved the possibility of generalizing the social entrepreneurship model with added cooperation orientation, and at the same time, the measurement tool used in this study was widely used as a tool to measure social entrepreneurship theoretically and practically. In addition, it was confirmed that the cooperation orientation is manifested in corporate decision-making and activity behaviors for resource mobilization and capacity building, opportunity and performance creation, social capital and network reinforcement, and governance establishment of social enterprises.

  • PDF

Enhancing Predictive Accuracy of Collaborative Filtering Algorithms using the Network Analysis of Trust Relationship among Users (사용자 간 신뢰관계 네트워크 분석을 활용한 협업 필터링 알고리즘의 예측 정확도 개선)

  • Choi, Seulbi;Kwahk, Kee-Young;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.113-127
    • /
    • 2016
  • Among the techniques for recommendation, collaborative filtering (CF) is commonly recognized to be the most effective for implementing recommender systems. Until now, CF has been popularly studied and adopted in both academic and real-world applications. The basic idea of CF is to create recommendation results by finding correlations between users of a recommendation system. CF system compares users based on how similar they are, and recommend products to users by using other like-minded people's results of evaluation for each product. Thus, it is very important to compute evaluation similarities among users in CF because the recommendation quality depends on it. Typical CF uses user's explicit numeric ratings of items (i.e. quantitative information) when computing the similarities among users in CF. In other words, user's numeric ratings have been a sole source of user preference information in traditional CF. However, user ratings are unable to fully reflect user's actual preferences from time to time. According to several studies, users may more actively accommodate recommendation of reliable others when purchasing goods. Thus, trust relationship can be regarded as the informative source for identifying user's preference with accuracy. Under this background, we propose a new hybrid recommender system that fuses CF and social network analysis (SNA). The proposed system adopts the recommendation algorithm that additionally reflect the result analyzed by SNA. In detail, our proposed system is based on conventional memory-based CF, but it is designed to use both user's numeric ratings and trust relationship information between users when calculating user similarities. For this, our system creates and uses not only user-item rating matrix, but also user-to-user trust network. As the methods for calculating user similarity between users, we proposed two alternatives - one is algorithm calculating the degree of similarity between users by utilizing in-degree and out-degree centrality, which are the indices representing the central location in the social network. We named these approaches as 'Trust CF - All' and 'Trust CF - Conditional'. The other alternative is the algorithm reflecting a neighbor's score higher when a target user trusts the neighbor directly or indirectly. The direct or indirect trust relationship can be identified by searching trust network of users. In this study, we call this approach 'Trust CF - Search'. To validate the applicability of the proposed system, we used experimental data provided by LibRec that crawled from the entire FilmTrust website. It consists of ratings of movies and trust relationship network indicating who to trust between users. The experimental system was implemented using Microsoft Visual Basic for Applications (VBA) and UCINET 6. To examine the effectiveness of the proposed system, we compared the performance of our proposed method with one of conventional CF system. The performances of recommender system were evaluated by using average MAE (mean absolute error). The analysis results confirmed that in case of applying without conditions the in-degree centrality index of trusted network of users(i.e. Trust CF - All), the accuracy (MAE = 0.565134) was lower than conventional CF (MAE = 0.564966). And, in case of applying the in-degree centrality index only to the users with the out-degree centrality above a certain threshold value(i.e. Trust CF - Conditional), the proposed system improved the accuracy a little (MAE = 0.564909) compared to traditional CF. However, the algorithm searching based on the trusted network of users (i.e. Trust CF - Search) was found to show the best performance (MAE = 0.564846). And the result from paired samples t-test presented that Trust CF - Search outperformed conventional CF with 10% statistical significance level. Our study sheds a light on the application of user's trust relationship network information for facilitating electronic commerce by recommending proper items to users.

Movement Pattern Analysis based on Transmission Performance over Underwater MANET (수중 MANET에서 전송성능기반 이동패턴분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1083-1088
    • /
    • 2019
  • Even though the transmission performance is very important factor for not only study and development but also for design, implementation, and operation of underwater MANET. There is a trend of using it as a measurement factor for comparing and analyzing degree of network performance. In this paper, movement pattern using transmission performance is analyzed to enlarge the use of transmission performance in underwater MANET. The relation between transmission performance and movement pattern is firstly considered and then through this consideration, causing effects of movement pattern to transmission performance is studied. Results of this study can be used as an important base to predict and analyze movement pattern through measuring of transmission performance of moving objects in underwater environments.

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

An Adaptive Traffic Interference Control System for Wireless Home IoT services (무선 홈 IoT 서비스를 위한 적응형 트래픽 간섭제어 시스템)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • The massive traffic interferences in the wireless home IoT provides the reason for packet losses, and it degrades the QoS (Quality of Service) and throughput on the home network. This paper propose a new adaptive traffic interference control system, ATICS, for enhancing QoS and throughput for IoT services as detecting a traffic process and non-traffic process in the wireless home network. The proposed system control the traffic interferences as distinguishing the short-term traffic process and long-term traffic process by traffic characteristics in wireless home networks. The simulation results shows that the proposed scheme have more efficient traffic control performance than the other schemes.

A Method of QoS Measurement of Multimedia Data based on Digital Watermarking (멀티미디어 데이터의 QoS 보장을 위한 디지털 워터마킹 기법 적용)

  • Ryu Kyeung-Ha;Kim Min-Su;Jung Ho-Youl;Chung Hyun-Yeol
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.327-330
    • /
    • 2002
  • 디지털 워터 마킹은 일반적으로 지적 재산권의 보호를 위해서 컨텐츠 소유자가 자신의 컨텐츠에 저작권 정보를 나타내는 워터마크를 삽입하여 제 3자가 허가 없이 디지털 컨텐츠의 사용을 할 경우 불법적인 사용을 막아내는 데 사용된다. 본 논문에서는 워터마킹 기법의 새로운 적용 예로써 인터넷 또는 무선 환경을 통한 멀티미디어 데이터 전송 시 수신된 데이터의 품질을 사용자 측면에서 측정 할 수 있는 방안, 즉 디지털 워터마킹 기법의 새로운 적용 예에 대하여 고찰하였다. 제안하는 방법은 네트워크 상에서 발생하는 패킷 손실, 지연 등의 통계적 해석으로 수신 된 멀티미디어 데이터의 품질을 평가하는 척도로 사용하는 기존의 방법과는 달리 사용자 측면에서 눈으로 보이는 데이터의 일그러짐 정도나, 음질의 왜곡을 정량적인 측정치로 보여 줄 수 있음으로써, 오디오 데이터의 QoS(Quality of Service)를 보장하기 위한 수단이나 수신품질에 따른 차별화 된 과금 결정 등에 활용할 수 있을 것이다. 이를 위해 본 논문에서는 멀티미디어 데이터의 품질 측정을 위한 블라인드 워터마킹 기법을 적용하고 다양한 비트 에러율 (Bit Error Rate, BER)을 갖는 BSC(Binary Symmetric Channel)에 적용시켜 봄으로써 멀티미디어 데이터에 삽입된 워터마크 신호의 검출정도와 수신된 미디어 신호의 PSNR비가 선형적인 분포를 가지게 됨을 확인 할 수 있었다.

  • PDF