• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.031 seconds

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Implementation of Reporting Tool Supporting OLAP and Data Mining Analysis Using XMLA (XMLA를 사용한 OLAP과 데이타 마이닝 분석이 가능한 리포팅 툴의 구현)

  • Choe, Jee-Woong;Kim, Myung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.154-166
    • /
    • 2009
  • Database query and reporting tools, OLAP tools and data mining tools are typical front-end tools in Business Intelligence environment which is able to support gathering, consolidating and analyzing data produced from business operation activities and provide access to the result to enterprise's users. Traditional reporting tools have an advantage of creating sophisticated dynamic reports including SQL query result sets, which look like documents produced by word processors, and publishing the reports to the Web environment, but data source for the tools is limited to RDBMS. On the other hand, OLAP tools and data mining tools have an advantage of providing powerful information analysis functions on each own way, but built-in visualization components for analysis results are limited to tables or some charts. Thus, this paper presents a system that integrates three typical front-end tools to complement one another for BI environment. Traditional reporting tools only have a query editor for generating SQL statements to bring data from RDBMS. However, the reporting tool presented by this paper can extract data also from OLAP and data mining servers, because editors for OLAP and data mining query requests are added into this tool. Traditional systems produce all documents in the server side. This structure enables reporting tools to avoid repetitive process to generate documents, when many clients intend to access the same dynamic document. But, because this system targets that a few users generate documents for data analysis, this tool generates documents at the client side. Therefore, the tool has a processing mechanism to deal with a number of data despite the limited memory capacity of the report viewer in the client side. Also, this reporting tool has data structure for integrating data from three kinds of data sources into one document. Finally, most of traditional front-end tools for BI are dependent on data source architecture from specific vendor. To overcome the problem, this system uses XMLA that is a protocol based on web service to access to data sources for OLAP and data mining services from various vendors.

A Qualitative Study on Management Behaviors about Blood Pressure of Participants in Moxibustion Clinical Trial for Hypertension (고혈압-뜸 임상시험 참여자들의 혈압 관리행동에 대한 질적연구)

  • Moon, A-Ji;Kim, Tae-Jung;Lee, Seoung-Geun;Kim, Nam-Kwen;Lee, Key-Sang
    • The Journal of Internal Korean Medicine
    • /
    • v.33 no.4
    • /
    • pp.543-557
    • /
    • 2012
  • Objectives : The purpose of this study which adopted a qualitative method was to evaluate blood pressure management behaviors of pre- and stage 1 hypertension patients and to provide fundamental data for developing a strategy about proper oriental medical treatment through analyzing factors related to a moxibustion clinical trial. Methods : Semi-structured interviews that focused on personal experiences with hypertension and its management were conducted with 10 hypertensive patients. The interviews lasted for approximately 50 minutes. Results : Most participants recognized that the direct cause of high blood pressure was unhealthy behavior rather than inheritance. Thus, the hypertensive patient believed they could recover their blood pressure to a normal level through removing the direct cause of hypertension instead of taking drugs. The reasons for these statements were that the drugs for controlling hypertension are not natural and they may have side effects. On future management plan of patients, most of them will continue to keep moxibustion and healthy behavior in the well-controlled blood pressure group. However in the uncontrolled blood pressure group, there was an increasing tendency to begin medication. Conclusions : For developing a strategy for an individual approach to hypertension management, we need to develop a client-centered attitude and strategy. That is, we need to tailor our approach to individual cases to avoid generalizations and stereotyping when developing an adherence increasing strategy.

Design and Implementation of Integrated MapServer Based on GML (GML 기반 통합 맵서버 설계 및 구현)

  • Lee, Hye-Jin;Kim, Dong-Ho;Lee, Hyun-Ah;Kim, Jin-Suk
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.4
    • /
    • pp.71-84
    • /
    • 2003
  • This paper designs and implements an integrated map server to produce an integrated map. Two requirements for the proposed map server are as follows. First, the system should support a customization of metadata to meet user's requirements. The map server designed here will predefine information such as representations, regions required for client-side processing in the metadata. This will allow users easily acquire an integrated map in the required form of clients. Second, the system should be able to support not only the integration of spatial data but also their non-spatial data. Fusion service is realized by using the concept of linking. The integrated map server suggested in this paper can improve the quality of the fusion service by integrating the results of the map servers according to user's requests. Our experiments shows that the integrated map server reduces the response time in web mapping environments.

  • PDF

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

A Study on the Construction Method of Collaboration Environment for Web (Web에서의 협력 환경 구축 방안 연구)

  • Lee, Jae-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.74-81
    • /
    • 1997
  • The World Wide Web (Web) is one of the most popular internet tool on now, In this reason most of common user, they understand the Web is internet and Web content is also important issues on this side. However, commonly Web content created by one of Web content creator and sometime they refer the another document and link. In these kinds of environments cause tile delivery of incorrect information or linking to another Web user. There are lots of way to protect the incorrect information deliveries to Web user and the most famous one is Computer Supported Cooperation Work (CSCW). This supports the multi-user environment on single system environment, but this needs more additional things in the current internet environment Current internet defined as distributed information network not tile traditional client-server environment. Specially, Intranet environments need to support the heterogeneous system environment like several Rinds of database, systems like PC, Mac and UNIX workstation, and etc. In this reason, we need collaboration and this would serve the common user interface to all of Web user. In these paper, we review the current concept of CSCW and grouoware that are major concept of collaboration and definition, classification and problem analysis of the collaboration. Finally, we suggest the construction method of collaboration environment for Web.

  • PDF

Effective 3D Inner Model Visualization for GIS Web Service (GIS 표준 웹 서비스 적용을 위한 3차원 실내모델의 효율적 시각화)

  • Jeong, Jang-Yoon;Yom, Jae-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.1
    • /
    • pp.701-711
    • /
    • 2009
  • The inner space of building is increasingly becoming complex as urban activities increase in variety, and the actual space size also increases. This trend necessitate the utilization of three dimensional position information within the inner space of buildings. Standard GIS web service technology and visualization technology are applied to 3D inner space building data to share these information for better decision making in building related applications such as fire evacuation, facilities management and market analysis. This study aims to effectively model and visualize the three dimensional space of building interiors in the GIS aspect, and to be able to share the information through standard GIS web service. The various elements of inner model was assigned and stored into pre-designed spatial database tables respectively. GIS web server was then configured to service the database which was populated with 3D inner model data. On the client side, 3D visualization modules was developed using a 3D graphic rendering S/W engine.

Managing and Modeling Strategy of Geo-features in Web-based 3D GIS

  • Kim, Kyong-Ho;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.75-79
    • /
    • 1999
  • Geo-features play a key role in object-oriented or feature-based geo-processing system. So the strategy for how-to-model and how-to-manage the geo-features builds the main architecture of the entire system and also supports the efficiency and functionality of the system. Unlike the conventional 2D geo-processing system, geo-features in 3B GIS have lots to be considered to model regarding the efficient manipulation and analysis and visualization. When the system is running on the Web, it should also be considered that how to leverage the level of detail and the level of automation of modeling in addition to the support for client side data interoperability. We built a set of 3D geo-features, and each geo-feature contains a set of aspatial data and 3D geo-primitives. The 3D geo-primitives contain the fundamental modeling data such as the height of building and the burial depth of gas pipeline. We separated the additional modeling data on the geometry and appearance of the model from the fundamental modeling data to make the table in database more concise and to allow the users more freedom to represent the geo-object. To get the users to build and exchange their own data, we devised a file format called VGFF 2.0 which stands for Virtual GIS File Format. It is to describe the three dimensional geo-information in XML(eXtensible Markup Language). The DTD(Document Type Definition) of VGFF 2.0 is parsed using the DOM(Document Object Model). We also developed the authoring tools for. users can make their own 3D geo-features and model and save the data to VGFF 2.0 format. We are now expecting the VGFF 2.0 evolve to the 3D version of SVG(Scalable Vector Graphics) especially for 3D GIS on the Web.

  • PDF

Design and implementation of e-mail extraction engine for mobile with image conversion facilities. (이미지 변환 엔진을 탑재한 모바일용 전자우편 추출 엔진의 설계 및 구현)

  • 정영지
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.638-645
    • /
    • 2003
  • In existing internet, e-mail protocols including POP3 and IMAP4, provide e-mail services fir exchanging messages with texts, hypertext and images as well. For the e-mail services in wireless mobile network, mobile e-mail service providers have to install a mobile exclusive e-mail server or have to convert e-mail to mobile exclusive e-mail with wireless application format in case of POP3 protocol. In the e-mail service of IMAP4 case known as web-mail, it is difficult to view e-mail directly from server without IMAP4 mobile client because e-mail is stored in mail server side with remote file server. In either case, it also has the problems of viewing the e-mail of hypertext and image information at mobile. This paper provides e-mail extraction engine with image and hypertext conversion facilities that can be applied in wireless mobile internet and it is optimized in mobile communication environments such as a small display, small size of memory with web-mail protocol based on IMAP4 as well as POP3 mail protocol.