• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.034 seconds

Research on Registry Analysis based Malware Detection Method (Registry 분석을 통한 악성코드 감염여부 탐지 방법 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.37-43
    • /
    • 2017
  • A registry is a hierarchy database which is designed to store information necessary for operating system and application programs in Windows operating system, and it is involved in all activities such as booting, logging, service execution, application execution, and user behavior. Digital forensic is widely used. In recent years, malicious codes have penetrated into systems in a way that is not recognized by the user, and valuable information is leaked or stolen, causing financial damages. Therefore, this study proposes a method to detect malicious code by using a shareware application without using expensive digital forensic program, so as to analysis hacking methods and prevent hacking damage in advance.

Phrase-based Topic and Sentiment Detection and Tracking Model using Incremental HDP

  • Chen, YongHeng;Lin, YaoJin;Zuo, WanLi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5905-5926
    • /
    • 2017
  • Sentiments can profoundly affect individual behavior as well as decision-making. Confronted with the ever-increasing amount of review information available online, it is desirable to provide an effective sentiment model to both detect and organize the available information to improve understanding, and to present the information in a more constructive way for consumers. This study developed a unified phrase-based topic and sentiment detection model, combined with a tracking model using incremental hierarchical dirichlet allocation (PTSM_IHDP). This model was proposed to discover the evolutionary trend of topic-based sentiments from online reviews. PTSM_IHDP model firstly assumed that each review document has been composed by a series of independent phrases, which can be represented as both topic information and sentiment information. PTSM_IHDP model secondly depended on an improved time-dependency non-parametric Bayesian model, integrating incremental hierarchical dirichlet allocation, to estimate the optimal number of topics by incrementally building an up-to-date model. To evaluate the effectiveness of our model, we tested our model on a collected dataset, and compared the result with the predictions of traditional models. The results demonstrate the effectiveness and advantages of our model compared to several state-of-the-art methods.

The Effect of BSE Education with Practice on Knowledge, Self-Efficacy and Performance in Middle-Aged Women (중년여성의 유방자가검진 교육이 유방자가검진 지식, 자기효능감 및 수행에 미치는 효과)

  • Yang, Young-Hee
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.14 no.2
    • /
    • pp.189-197
    • /
    • 2007
  • Purpose: Breast cancer is a common cancer in women in Korea. Early detection of breast cancer is very important for the protection of a woman's health. The purpose of this quasi-experimental study was to determine the effect of BSE education on knowledge, self efficacy and performance in middle-aged women. Method: The participants were 33 women who agreed to participate in the study. They responded to a questionnaire that included items on knowledge, self-efficacy and performance of BSE. The experimental group was given a 90 minute-session including a lecture and practice with a BSE practice model and their own body. Their knowledge of the BSE was measured using Choi's tool and self-efficacy was measured using the scale by Champion and Scott. Results: Homogeneity for knowledge, self-efficacy and performance of BSE between the experimental and the control groups was confirmed. After 3 months of BSE education, knowledge, self-efficacy and frequency of BSE performance in the experimental group were significantly higher than for the women in the control group. Conclusion: A BSE education program would be helpful to enhance health behavior by early detection of breast cancer in middle-age women.

  • PDF

Color Removal of Culture Broth Containing Hyaluronic by Activated Carbon (활성탄을 이용한 히아루론산 배양액의 유색물질 제거)

  • 윤종원;김덕중
    • KSBB Journal
    • /
    • v.8 no.2
    • /
    • pp.143-149
    • /
    • 1993
  • Activated carbons were used to examine their performance for the separation of undesirable colored materials from culture broth containing hyaluronic acid. Six local samples and a NORIT ROX 08 were tested, whereas the latter was mainly studied under batch and continuous modes. The optimal wavelength for the detection of colored materials was 330nm. The optimal choice of NORIT ROX 08 provided 30% colored residuals with 96% hyaluronic acid recovery of original broth in batch experiments. The nonlinear adsorption behavior of protein and colored materials with activated carbon (C) was correlated by a Langmuir equation to give 18C/24+C and 500C/892+C for protein and colored materials, respectively. It appears that colored materials were composed of 78% protein and 22% glucose residuals on the basis of clearance results. A microscopic study using a scanning electron microscope suggests that regeneration of used activated carbon with 0.1N NaOH and hot water was not satisfactory. The present study proposes that the continuous monitoring of colored materials during purification can be accomplished by Installation of a UV monitor commonly used for continuous detection of protein during the process, as resulted from the significant correlation of color (A330)=0.353protein(mg/ml)+0.1(R=99.7%).

  • PDF

NoSQL-based User Behavior Detection System in Cloud Computing Environment (NoSQL 기반 클라우드 사용자 행동 탐지 시스템 설계)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.804-807
    • /
    • 2012
  • Cloud service provider has to protect client's information securely since all the resources are offered by the service provider, and a large number of users share the resources. In this paper, a NoSQL-based anomaly detection system is proposed in order to enhance the security of mobile cloud services. The existing integrated security management system that uses a relational database can not be used for real-time processing of data since security log from a variety of security equipment and data from cloud node have different data format with unstructured features. The proposed system can resolve the emerging security problem because it provides real time processing and scalability in distributed processing environment.

  • PDF

Efficient Multimodal Background Modeling and Motion Defection (효과적인 다봉 배경 모델링 및 물체 검출)

  • Park, Dae-Yong;Byun, Hae-Ran
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.459-463
    • /
    • 2009
  • Background modeling and motion detection is the one of the most significant real time video processing technique. Until now, many researches are conducted into the topic but it still needs much time for robustness. It is more important when other algorithms are used together such as object tracking, classification or behavior understanding. In this paper, we propose efficient multi-modal background modeling methods which can be understood as simplified learning method of Gaussian mixture model. We present its validity using numerical methods and experimentally show detecting performance.

Simulation of Water/steam into Sodium Leak Behavior for an Acoustic Noise Generation Mechanism Study

  • Kim, Tae-Joon;Hwang, Sung-Tai;Jeong, Kyung-Chai;Park, Jong-Hyeun;Valery S. Yughay
    • Nuclear Engineering and Technology
    • /
    • v.33 no.2
    • /
    • pp.145-155
    • /
    • 2001
  • This simulation first allows us to define a transition zone from a bubble to jet mode of the argon out-flow and hereinafter to define a similar area for water-steam leak in the KALIMER SG (Korea Advanced Liquid Metal Reactor Steam Generator) using a water mock-up system, taking into account the KALIMER leak classification and tube bundle design, as a simulation of a real water-steam into sodium leak. in accordance with leak conditions in the KALIMER SG, the transition from bubbling to jetting is studied by means of turbulence regime simulation for argon out-flow through a very small orifice, which has the equivalent diameter of about 0.253 mm. finally the noise generation mechanism is explained from the existing experimental data. We also confirmed the possibility of micro-leak detection from the information of the bubbling mode through simulations and the experiment in this study.

  • PDF

Detection of Dangerous Things to Infants through Image Analysis and Deep Learning (이미지 분석과 딥 러닝을 통한 영유아 위험물 탐지)

  • Kim, Hui-Joon;Park, Kil-Seop;Seo, Yeong-Hak;Kim, Kyung-Sup
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.845-848
    • /
    • 2017
  • In this paper, we implemented a system to detect dangerous situations by recognizing the dangerous elements for infants by reading 2D images of children's houses, parks, playgrounds, and living rooms where infants are present through Faster R-CNN. We have implemented a detection model based on data that can be easily obtained from real life. Currently, machine learning is commercialized based on speech recognition and behavior data. However, this model can be applied to various service fields Respectively.

Detection of thin-layered soil using CRPT in soft soil (CRPT를 이용한 연약지반 협재층 탐지)

  • Yoon, Hyung-Koo;Kim, Joon-Han;Kim, Rae-Hyun;Choi, Yong-Kyu;Lee, Jong-Sub
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.117-125
    • /
    • 2008
  • The detection of thin-layered soil is important in soft soils to evaluate the soil behavior. The smaller diameter cone penetrometer have been commonly used to detect the layer with increasing sensitivity. The objective of this study is to detect the thin-layered soil using cone resistance and electrical resistance. The cone resistivity penetration test (CRPT) is developed to evaluate the cone tip resistance and electrical resistance at the tip. The CRPT is a micro-cone which has a $0.78cm^2$ in projected area. The application test is conducted in a laboratory large-scale consolidometer (calibration chamber). The kaolinite, sand and water are mixed to make the specimen at the liquid limit of 46% using a slurry mixer. It takes two months for the consolidation of the specimen. After consolidation, the CRPT test is carried out. Furthermore the standard CPT results are compared with the electrical resistance measured at the tip in the field. This study suggests that the CRPT may be a useful tool for detecting thin-layers in soft soils.

  • PDF

Design of data mining IDS for transformed intrusion pattern (변형 침입 패턴을 위한 데이터 마이닝 침입 탐지 시스템 설계)

  • 김용호;정종근;이윤배;김판구;염순자
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.479-482
    • /
    • 2001
  • IDS has been studied mainly in the field of the detection decision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not, the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect transformed intrusion patterns. So, we propose the method using data mining that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.

  • PDF