• Title/Summary/Keyword: 한국컴퓨터

Search Result 36,172, Processing Time 0.065 seconds

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

A Study on the Cerber-Type Ransomware Detection Model Using Opcode and API Frequency and Correlation Coefficient (Opcode와 API의 빈도수와 상관계수를 활용한 Cerber형 랜섬웨어 탐지모델에 관한 연구)

  • Lee, Gye-Hyeok;Hwang, Min-Chae;Hyun, Dong-Yeop;Ku, Young-In;Yoo, Dong-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.363-372
    • /
    • 2022
  • Since the recent COVID-19 Pandemic, the ransomware fandom has intensified along with the expansion of remote work. Currently, anti-virus vaccine companies are trying to respond to ransomware, but traditional file signature-based static analysis can be neutralized in the face of diversification, obfuscation, variants, or the emergence of new ransomware. Various studies are being conducted for such ransomware detection, and detection studies using signature-based static analysis and behavior-based dynamic analysis can be seen as the main research type at present. In this paper, the frequency of ".text Section" Opcode and the Native API used in practice was extracted, and the association between feature information selected using K-means Clustering algorithm, Cosine Similarity, and Pearson correlation coefficient was analyzed. In addition, Through experiments to classify and detect worms among other malware types and Cerber-type ransomware, it was verified that the selected feature information was specialized in detecting specific ransomware (Cerber). As a result of combining the finally selected feature information through the above verification and applying it to machine learning and performing hyper parameter optimization, the detection rate was up to 93.3%.

2D Interpolation of 3D Points using Video-based Point Cloud Compression (비디오 기반 포인트 클라우드 압축을 사용한 3차원 포인트의 2차원 보간 방안)

  • Hwang, Yonghae;Kim, Junsik;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.26 no.6
    • /
    • pp.692-703
    • /
    • 2021
  • Recently, with the development of computer graphics technology, research on technology for expressing real objects as more realistic virtual graphics is being actively conducted. Point cloud is a technology that uses numerous points, including 2D spatial coordinates and color information, to represent 3D objects, and they require huge data storage and high-performance computing devices to provide various services. Video-based Point Cloud Compression (V-PCC) technology is currently being studied by the international standard organization MPEG, which is a projection based method that projects point cloud into 2D plane, and then compresses them using 2D video codecs. V-PCC technology compresses point cloud objects using 2D images such as Occupancy map, Geometry image, Attribute image, and other auxiliary information that includes the relationship between 2D plane and 3D space. When increasing the density of point cloud or expanding an object, 3D calculation is generally used, but there are limitations in that the calculation method is complicated, requires a lot of time, and it is difficult to determine the correct location of a new point. This paper proposes a method to generate additional points at more accurate locations with less computation by applying 2D interpolation to the image on which the point cloud is projected, in the V-PCC technology.

Frequency of Buccal Pits and Defective Buccal Pits in Mandibular Molars of Children and Adolescents (소아청소년의 하악 대구치에서 협측소와 및 협측소와 결함의 발생 빈도)

  • So Yung, Kim;Je Seon, Song;Ik-Hwan, Kim;Hyung-Jun, Choi
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.49 no.3
    • /
    • pp.253-263
    • /
    • 2022
  • A buccal pit is a prominent point-like depression that appears at the cervical end of the mandibular molar developmental grooves. A defective buccal pit can be defined as a buccal pit in which the continuity of the dentinoenamel junction is broken and the pit extends to the dentinal level. This study aimed to determine the frequency of buccal pits and defective buccal pits in un-erupted mandibular first and second molars using cone-beam computed tomography (CBCT). The analysis was performed on CBCT images taken from 417 Korean children and adolescents who visited the Department of Pediatric Dentistry, Yonsei University Dental Hospital between 2004 and 2020. Based on cross-sectional views of CBCT images, buccal pits were categorized into 4 classes according to the depth of the pits. The expression rate of the buccal pits was 29.1%. The prevalence of defective buccal pits was 7.9%. The buccal pits tended to develop bilaterally. To date, this is the most comprehensive study on the frequency of buccal pits with the largest sample size. This was the first attempt worldwide to analyze the depth of the buccal pit using CBCT images and to define a defective buccal pit worldwide.

A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family (제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법)

  • Kim, Taeyoung;Lee, Jihyun;Kim, Eunmi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Similar software is often developed with the Clone-And-Own (CAO) approach that copies and modifies existing artifacts. The CAO approach is considered as a bad practice because it makes maintenance difficult as the number of cloned products increases. Software product line engineering is a methodology that can solve the issue of the CAO approach by developing a product family through systematic reuse. Migrating product families that have been developed with the CAO approach to the product line engineering begins with finding, integrating, and building them as reusable assets. However, cloning occurs at various levels from directories to code lines, and their structures can be changed. This makes it difficult to build product line code base simply by finding clones. Successful migration thus requires unifying the source code's file path, class name, and method signature. This paper proposes a clustering method that identifies a set of similar codes scattered across product variants and some of their method full paths are different, so path unification is necessary. In order to show the effectiveness of the proposed method, we conducted an experiment using the Apo Games product line, which has evolved with the CAO approach. As a result, the average precision of clustering performed without preprocessing was 0.91 and the number of identified common clusters was 0, whereas our method showed 0.98 and 15 respectively.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

Application of Natural Dyes for Developing Colored Wood Furniture (I) - Color Variation by Extraction Methods of Natural Dyes - (색채 목가구재 개발을 위한 천연염료의 이용에 관한 연구 (제1보) - 천연염료의 추출 방법에 따른 색채 변화 연구 -)

  • Moon, Sun-Ok;Kim, Chul-Hwan;Kim, Jae-Ok;Kim, Jong-Gab
    • Journal of the Korean Wood Science and Technology
    • /
    • v.32 no.5
    • /
    • pp.75-85
    • /
    • 2004
  • The natural dyes from Gardenia jasminoides, Carthamus tinctorius L., Rhus javanica, Lithospermum erythrorhizon, Caesalpinia sappan L., and Castanea crenata were extracted under different pH in distilled water, As the pH in distilled water went from acid to alkali, the much deeper colors in the same color tone were generated from the individual plant species. Before dyeing, wood species were treated by different mordants including AI, Cu, Cr and Fe for color-fixing between wood and the natural dyes. Each mordant could develop independent color on the surface of the woods. The wood species dyed by the natural dyes created deep-tone colors according to higher pH and temperature of the dyeing solution, leading to deeper penetration of the dyes into the wood tissues. Finally through the computer modelling of natural-dyed wood furniture, it was confirmed that the colored furniture can adequately be compatible with the current interior spaces of diverse colors.

Implementation of a Transition Rule Model for Automation of Tracking Exercise Progression (운동 과정 추적의 자동화를 위한 전이 규칙 모델의 구현)

  • Chung, Daniel;Ko, Ilju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.157-166
    • /
    • 2022
  • Exercise is necessary for a healthy life, but it is recommended that it be conducted in a non-face-to-face environment in the context of an epidemic such as COVID-19. However, in the existing non-face-to-face exercise content, it is possible to recognize exercise movements, but the process of interpreting and providing feedback information is not automated. Therefore, in this paper, to solve this problem, we propose a method of creating a formalized rule to track the contents of exercise and the motions that constitute it. To make such a rule, first make a rule for the overall exercise content, and then create a tracking rule for the motions that make up the exercise. A motion tracking rule can be created by dividing the motion into steps and defining a key frame pose that divides the steps, and creating a transition rule between states and states represented by the key frame poses. The rules created in this way are premised on the use of posture and motion recognition technology using motion capture equipment, and are used for logical development for automation of application of these technologies. By using the rules proposed in this paper, not only recognizing the motions appearing in the exercise process, but also automating the interpretation of the entire motion process, making it possible to produce more advanced contents such as an artificial intelligence training system. Accordingly, the quality of feedback on the exercise process can be improved.

Core Promoter Mutation of ntC1731T and G1806A of Hepatitis B Virus Increases HBV Gene Expression (B형 간염 바이러스의 ntC1731T 및 G1806A의 core 프로모터 돌연변이에 의한 HBV 유전자 발현 증가 분석)

  • Cho, Ja Young;Yi, Yi Kyaw;Seong, Mi So;Cheong, JaeHun
    • Journal of Life Science
    • /
    • v.32 no.2
    • /
    • pp.94-100
    • /
    • 2022
  • Chronic infection by hepatitis B virus (HBV) greatly increases the risk for liver cirrhosis and hepatocellular carcinoma (HCC). The outcome of HBV infection is shaped by the complex interplay of the mode of transmission, host genetic factors, viral genotype, adaptive mutations, and environmental factors. The pregenomic RNA transcription of HBV for their replication is regulated by the core promoter activation. Core promoter mutations have been the reason for acute liver failure and are associated with HCC development. We obtained HBV genes from a patient in Myanmar who was infected with HBV and identified gene variations in the core promoter region. For measuring the relative transactivation activity of the core promoter, we prepared the core-promoter reporter construct. Among the gene variations of the core promoter, the mutations of C1731T and G1806A were associated with increase in the transactivation of the HBV core promoter. Through computer analysis for searching for a tentative transcription factor binding site, we showed that the mutations of C1713T and G1806A newly created C/EBPβ and XBP1-responsive elements of the core promoter, respectively. The ectopic expression of C/EBPβ largely increased the HBV core promoter containing the C1713T mutation and that of XBP1 activated the M95 promoter containing the G1806A mutation. Our efforts to treat and prevent HBV infections are hampered by the emergence of drug-resistant mutations and vaccine-escape mutations. Our results provide the biological properties and clinical significance of specific HBV core promoter mutations.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.