• Title/Summary/Keyword: Analysis Techniques

Search Result 10,436, Processing Time 0.035 seconds

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Process analysis in Supply Chain Management with Process Mining: A Case Study (프로세스 마이닝 기법을 활용한 공급망 분석: 사례 연구)

  • Lee, Yonghyeok;Yi, Hojeong;Song, Minseok;Lee, Sang-Jin;Park, Sera
    • The Journal of Bigdata
    • /
    • v.1 no.2
    • /
    • pp.65-78
    • /
    • 2016
  • In the rapid change of business environment, it is crucial that several companies with core competence cooperate together in order to deliver competitive products to the market faster. Thus a lot of companies are participating in supply chains and SCM (Supply Chain Management) become more important. To efficiently manage supply chains, the analysis of data from SCM systems is required. In this paper, we explain how to analyze SCM related data with process mining techniques. After discussing the data requirement for process mining, several process mining techniques for the data analysis are explained. To show the applicability of the techniques, we have performed a case study with a company in South Korea. The case study shows that process mining is useful tool to analyze SCM data. On specifically, an overall process, several performance measures, and social networks can be easily discovered and analyzed with the techniques.

  • PDF

The Effect of Laser and Joint Mobilization Techniques on Tennis Elbow: A Meta-Analysis (테니스 주(tennis elbow)에 대한 레이저치료와 관절가동화기법의 효과: 메타분석)

  • Moon, Mee-Hyang;Nam, Chung-Mo;Chung, Yi-Jung
    • Physical Therapy Korea
    • /
    • v.10 no.3
    • /
    • pp.91-107
    • /
    • 2003
  • We processed meta-analysis to test if the effects of laser therapy and mobilization techniques are evidence-based practice for treating tennis elbow. By researching and collecting the results of previous studies on tennis elbow, we inquired into the difference in the effects of each treatment methods on pain, grip strength, and ROM. A total of 10 international and domestic articles on the treatments of tennis elbow were selected for this study, including 7 articles on the effect of laser therapy and 3 on mobilization techniques. According to the qualitative meta-analysis, all 7 of the articles on laser therapy and 1 of the mobilization technique were double-blinded and randomized the subjects, and all of the 10 studies were designed in a high quality research, using statistics. The results of the studies on laser therapy showed in terms of statistical significance: 4 out of 7 did not decrease pain after therapy, and 3 out of 5 did not increase grip strength after therapy. In the studies on the effects of mobilization technique, both the 2 studies significantly increased grip strength after therapy. For other studies which measured ROM and tension, the mobilization therapy increased ROM significantly, and decreased tension significantly. The results of our study are shown in a diverse form in terms of the effects of different therapy techniques. This is related to the accuracy of the measurement tools for assessments and diagnoses. Further qualitative studies on the evidence-based practice and researches on tennis elbow are needed.

  • PDF

Performance Analysis of Packet Sampling Mechanisms for DDoS Attack Detection (DDoS 공격 탐지를 위한 패킷 샘플링 기법들의 성능 분석)

  • Kang Kil-Soo;Lee Joon-Hee;Choi Kyung-Hee;Jung Gi-Hyun;Shim Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.711-718
    • /
    • 2004
  • Packet sampling is the techniques to collect a part of the packets through network and analyze the characteristicsof the traffic for managing the network and keeping security. This paper presents a study on the sampling techniques applied to DDoS traffic and on the characteristics of the sampled traffic to detect DDoS attack efficiently and improve traffic analysis capacity. Three famous sampling techniques are evaluated with different sampling rates on various DDoS traffics. To analyze traffic characteristics, one of the DDoS attack detection method. Traffic Rate Analysis (TRA) is used. Simulation results verify that using sampling techniques preserve the traffic characteristics of DDoS and do not significantly reduce the detection accuracy.

Aerodynamic Shape Optimization using Discrete Adjoint Formulation based on Overset Mesh System

  • Lee, Byung-Joon;Yim, Jin-Woo;Yi, Jun-Sok;Kim, Chong-Am
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.8 no.1
    • /
    • pp.95-104
    • /
    • 2007
  • A new design approach of complex geometries such as wing/body configuration is arranged by using overset mesh techniques under large scale computing environment. For an in-depth study of the flow physics and highly accurate design, several special overlapped structured blocks such as collar grid, tip-cap grid, and etc. which are commonly used in refined drag prediction are adopted to consider the applicability of the present design tools to practical problems. Various pre- and post-processing techniques for overset flow analysis and sensitivity analysis are devised or implemented to resolve overset mesh techniques into the design optimization problem based on Gradient Based Optimization Method (GBOM). In the pre-processing, the convergence characteristics of the flow solver and sensitivity analysis are improved by overlap optimization method. Moreover, a new post-processing method, Spline-Boundary Intersecting Grid (S-BIG) scheme, is proposed by considering the ratio of cell area for more refined prediction of aerodynamic coefficients and efficient evaluation of their sensitivities under parallel computing environment. With respect to the sensitivity analysis, discrete adjoint formulations for overset boundary conditions are derived by a full hand-differentiation. A smooth geometric modification on the overlapped surface boundaries and evaluation of grid sensitivities can be performed by mapping from planform coordinate to the surface meshes with Hicks-Henne function. Careful design works for the drag minimization problems of a transonic wing and a wing/body configuration are performed by using the newly-developed and -applied overset mesh techniques. The results from design applications demonstrate the capability of the present design approach successfully.

Breast Cancer Diagnosis using Naive Bayes Analysis Techniques (Naive Bayes 분석기법을 이용한 유방암 진단)

  • Park, Na-Young;Kim, Jang-Il;Jung, Yong-Gyu
    • Journal of Service Research and Studies
    • /
    • v.3 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • Breast cancer is known as a disease that occurs in a lot of developed countries. However, in recent years, the incidence of Korea's modern woman is increased steadily. As well known, breast cancer usually occurs in women over 50. In the case of Korea, however, the incidence of 40s with young women is increased steadily than the West. Therefore, it is a very urgent task to build a manual to the accurate diagnosis of breast cancer in adult women in Korea. In this paper, we show how using data mining techniques to predict breast cancer. Data mining refers to the process of finding regular patterns or relationships among variables within the database. To this, sophisticated analysis using the model, you will find useful information that is easily revealed. In this paper, through experiments Deicion Tree Naive Bayes analysis techniques were compared using analysis techniques to diagnose breast cancer. Two algorithms was analyzed by applying C4.5 algorithm. Deicison Tree classification accuracy was fairly good. Naive Bayes classification method showed better accuracy compared to the Decision Tree method.

  • PDF

An Automatically Extracting Formal Information from Unstructured Security Intelligence Report (비정형 Security Intelligence Report의 정형 정보 자동 추출)

  • Hur, Yuna;Lee, Chanhee;Kim, Gyeongmin;Jo, Jaechoon;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.233-240
    • /
    • 2019
  • In order to predict and respond to cyber attacks, a number of security companies quickly identify the methods, types and characteristics of attack techniques and are publishing Security Intelligence Reports(SIRs) on them. However, the SIRs distributed by each company are huge and unstructured. In this paper, we propose a framework that uses five analytic techniques to formulate a report and extract key information in order to reduce the time required to extract information on large unstructured SIRs efficiently. Since the SIRs data do not have the correct answer label, we propose four analysis techniques, Keyword Extraction, Topic Modeling, Summarization, and Document Similarity, through Unsupervised Learning. Finally, has built the data to extract threat information from SIRs, analysis applies to the Named Entity Recognition (NER) technology to recognize the words belonging to the IP, Domain/URL, Hash, Malware and determine if the word belongs to which type We propose a framework that applies a total of five analysis techniques, including technology.

A Study on Use Case Analysis and Adoption of NLP: Analysis Framework and Implications (NLP 활용 사례 분석 및 도입에 관한 연구: 분석 프레임워크와 시사점)

  • Park, Hyunjung;Lim, Heuiseok
    • Journal of Information Technology Services
    • /
    • v.21 no.2
    • /
    • pp.61-84
    • /
    • 2022
  • With the recent application of deep learning to Natural Language Processing (NLP), the performance of NLP has improved significantly and NLP is emerging as a core competency of organizations. However, when encountering NLP use cases that are sporadically reported through various online and offline channels, it is often difficult to come up with a big picture of how to understand and interpret them or how to connect them to business. This study presents a framework for systematically analyzing NLP use cases, considering the characteristics of NLP techniques applicable to almost all industries and business functions, environmental changes in the era of the Fourth Industrial Revolution, and the effectiveness of adopting NLP reflecting all business functional areas. Through solving research questions based on the framework, the usefulness of it is validated. First, by accumulating NLP use cases and pivoting them around the business function dimension, we derive how NLP techniques are used in each business functional area. Next, by synthesizing related surveys and reports to the accumulated use cases, we draw implications for each business function and major NLP techniques. This work promotes the creation of innovative business scenarios and provides multilateral implications for the adoption of NLP by systematically viewing NLP techniques, industries, and business functional areas. The use case analysis framework proposed in this study presents a new perspective for research on new technology use cases. It also helps explore strategies that can dramatically improve organizational performance through a holistic approach that encompasses all business functional areas.

A comparison of the quality of manual and mechanical chest compressions in a moving rescue boat (이동 중인 구조보트 내에서 수기가슴압박과 기계가슴압박의 질 비교)

  • Kim, Hwang-Lim;Yun, Jong-Geun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.77-84
    • /
    • 2020
  • Purpose: This study was conducted to determine effective chest compression methods that could be used when performing cardiopulmonary resuscitation in rocking boats. Methods: Tests were conducted for four minutes using manual and mechanical chest compressions on two mannequins, placed in boats, and moving at a speed of 35km/hours on calm sea surfaces with wave heights of 0.5m and wind speeds of 2-3m/s (testing for two minutes, followed by rest, then a second round of testing for two minutes). To compare the quality of the chest compressions, data were analyzed using mannequins (Resusci Anne Q-CPR, Laerdal, Norway) and then statistically processed. Results: When chest compressions were administered in the moving rescue boat, an accuracy analysis showed that the pressure speed of the hand and mechanical techniques were normal, h owever, the pressure depth accuracies were 49.04% for manual techniques and 0% for mechanical techniques. The relaxation accuracies during compressions were 2.07% for manual techniques and 95.4% for mechanical techniques. Conclusion: When administering chest compressions in rocking rescue boats, mechanical rather than manual techniques should be preferentially considered.