• Title/Summary/Keyword: 행위패턴

Search Result 381, Processing Time 0.028 seconds

Malware API Classification Technology Using LSTM Deep Learning Algorithm (LSTM 딥러닝 알고리즘을 활용한 악성코드 API 분류 기술 연구)

  • Kim, Jinha;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.259-261
    • /
    • 2022
  • Recently, malicious code is not a single technique, but several techniques are combined and merged, and only important parts are extracted. As new malicious codes are created and transformed, attack patterns are gradually diversified and attack targets are also diversifying. In particular, the number of damage cases caused by malicious actions in corporate security is increasing over time. However, even if attackers combine several malicious codes, the APIs for each type of malicious code are repeatedly used and there is a high possibility that the patterns and names of the APIs are similar. For this reason, this paper proposes a classification technique that finds patterns of APIs frequently used in malicious code, calculates the meaning and similarity of APIs, and determines the level of risk.

  • PDF

Correlation Between Web OPAC Use Patterns and MBTI Personality Types (Web OPAC 이용패턴과 MBTI 성격유형의 상관관계)

  • Kim, Hee-Sop
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.229-250
    • /
    • 2004
  • The purpose of this study is to investigate the correlation between users' preferences of Personality types and their attitude towards patterns of Web OPAC use mainly focus on their search behaviour and their preferences for the interface. Data res collected through the MBTI test and self-designed online questionnaire. The original MBTI personality types were re-coded into 4 categories of preferences of personality types, that is, E(Extraversion), I(Introversion), S(Sensing), N(iNtuition), T(Thinking)-F(Feeling), and J(Judging)-P(Perception) and then analysed their correlation with patterns of Web OPAC use by Person's correlation coefficient (r) in SPSS Windows Ver. 11.0. It is noteworthy that 9 out of 28 factors of Web OPAC search behaviour and preferences for interfaces show statistically significant correlation with users' MBTI preferences of personality types.

  • PDF

A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior (문서 읽기 행위를 이용한 연속적 사용자 인증 기반의 내부자 문서유출 탐지기술 연구)

  • Cho, Sungyoung;Kim, Minsu;Won, Jongil;Kwon, SangEun;Lim, Chaeho;Kang, Brent ByungHoon;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.181-192
    • /
    • 2013
  • There have been various techniques to detect and control document leakage; however, most techniques concentrate on document leakage by outsiders. There are rare techniques to detect and monitor document leakage by insiders. In this study, we observe user's document reading behavior to detect and control document leakage by insiders. We make each user's document reading patterns from attributes gathered by a logger program running on Microsoft Word, and then we apply the proposed system to help determine whether a current user who is reading a document matches the true user. We expect that our system based on document reading behavior can effectively prevent document leakage.

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

Big data, how to balance privacy and social values (빅데이터, 프라이버시와 사회적 가치의 조화방안)

  • Hwang, Joo-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.143-153
    • /
    • 2013
  • Big data is expected to bring forth enormous public good as well as economic opportunity. However there is ongoing concern about privacy not only from public authorities but also from private enterprises. Big data is suspected to aggravate the existing privacy battle ground by introducing new types of privacy risks such as privacy risk of behavioral pattern. On the other hand, big data is asserted to become a new way to by-pass tradition behavioral tracking such as cookies, DPIs, finger printing${\cdots}$ and etc. For it is not based on a targeted person. This paper is to find out if big data could contribute to catching out behavioral patterns of consumers without threatening or damaging their privacy. The difference between traditional behavioral tracking and big data analysis from the perspective of privacy will be discerned.

Having Meals Together? Stories of Couples of Pre-Retirement Age (준고령층 부부의 식사관련행위)

  • Kim, Cheong-Seok
    • Korea journal of population studies
    • /
    • v.33 no.3
    • /
    • pp.123-142
    • /
    • 2010
  • This study explores the patterns of meal related activities of couples of pre-retirement age in Korea. Using 2004 Time Use Survey of Korea conducted by Korea National Statistics Office, the study examines whether the couple have breakfast and dinner together, who prepares the meal and who does the dishes after meal. The descriptive and statistical analysis, as expected, shows the patterns of such activities are heavily influenced by the working status of the couple. Currently working men or women are less likely to have meals together nor do participate in preparing meals or doing dishes. Nonetheless, it is apparent that women are more likely to involve preparation and clean-ups regardless of their working status. As a whole, the activities of meal preparation and doing the dishes remains in the domain of women's work while the proportion of married women working outside home is substantial.

Adaptive Web Search based on User Web Log (사용자 웹 로그를 이용한 적응형 웹 검색)

  • Yoon, Taebok;Lee, Jee-Hyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6856-6862
    • /
    • 2014
  • Web usage mining is a method to extract meaningful patterns based on the web users' log data. Most existing patterns of web usage mining, however, do not consider the users' diverse inclination but create general models. Web users' keywords can have a variety of meanings regarding their tendency and background knowledge. This study evaluated the extraction web-user's pattern after collecting and analyzing the web usage information on the users' keywords of interest. Web-user's pattern can supply a web page network with various inclination information based on the users' keywords of interest. In addition, the Web-user's pattern can be used to recommend the most appropriate web pages and the suggested method of this experiment was confirmed to be useful.

An Ultrasonic Vessel-Pattern Imaging Algorithm with Low Computational Complexity (낮은 연산 복잡도를 지니는 초음파 혈관 패턴 영상 알고리즘)

  • Um, Ji-Yong
    • Journal of IKEEE
    • /
    • v.26 no.1
    • /
    • pp.27-35
    • /
    • 2022
  • This paper proposes an ultrasound vessel-pattern imaging algorithm with low computational complexity. The proposed imaging algorithm reconstructs blood-vessel patterns by only detecting blood flow, and can be applied to a real-time signal processing hardware that extracts an ultrasonic finger-vessel pattern. Unlike a blood-flow imaging mode of typical ultrasound medical imaging device, the proposed imaging algorithm only reconstructs a presence of blood flow as an image. That is, since the proposed algorithm does not use an I/Q demodulation and detects a presence of blood flow by accumulating an absolute value of the clutter-filter output, a structure of the algorithm is relatively simple. To verify a complexity of the proposed algorithm, a simulation model for finger vessel was implemented using Field-II program. Through the behavioral simulation, it was confirmed that the processing time of the proposed algorithm is around 54 times less than that of the typical color-flow mode. Considering the required main building blocks and the amount of computation, the proposed algorithm is simple to implement in hardware such as an FPGA and an ASIC.

Relationship between College Dance Students' Self-Leadership and the Cognitive Flexibility (대학 무용전공자의 셀프리더십과 인지적 유연성과의 관계)

  • Sung, So-Young
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.171-180
    • /
    • 2012
  • The purpose of this study is to analyze the relationship between the self-leadership and the cognitive flexibility of the university students who are majoring in dance to provide useful information in the field of dance instruction. Participants were the students majoring in dance who are enrolled in the dance department of the four-year universities nationwide and 282 data have been used for the final analysis. The analytical method for verification of hypothesis was multiple regression analysis to be performed at a significance level of ${\alpha}$=.05. As the result, the following conclusions have been gained. First, the constructive thinking pattern among the sub-factors of self-leadership had a positive influence on the flexibility of preferred varieties which is a sub-factor of cognitive flexibility. However, the behavior-oriented and natural reward self-leadership did not have influence on the diversity preferred flexibility. Second, the natural reward and constructive thinking pattern among the sub-factors of self-leadership have positive influence on the flexibility of preferred complexity which is a sub-factor of cognitive flexibility while the constructive thinking pattern flexibility was shown as exercising a very powerful influence. But the behavior-oriented self-leadership did not have influence on the flexibility of preferred complexity.