• Title/Summary/Keyword: Design of Information Systems

Search Result 7,658, Processing Time 0.038 seconds

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

Corporate Bankruptcy Prediction Model using Explainable AI-based Feature Selection (설명가능 AI 기반의 변수선정을 이용한 기업부실예측모형)

  • Gundoo Moon;Kyoung-jae Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.241-265
    • /
    • 2023
  • A corporate insolvency prediction model serves as a vital tool for objectively monitoring the financial condition of companies. It enables timely warnings, facilitates responsive actions, and supports the formulation of effective management strategies to mitigate bankruptcy risks and enhance performance. Investors and financial institutions utilize default prediction models to minimize financial losses. As the interest in utilizing artificial intelligence (AI) technology for corporate insolvency prediction grows, extensive research has been conducted in this domain. However, there is an increasing demand for explainable AI models in corporate insolvency prediction, emphasizing interpretability and reliability. The SHAP (SHapley Additive exPlanations) technique has gained significant popularity and has demonstrated strong performance in various applications. Nonetheless, it has limitations such as computational cost, processing time, and scalability concerns based on the number of variables. This study introduces a novel approach to variable selection that reduces the number of variables by averaging SHAP values from bootstrapped data subsets instead of using the entire dataset. This technique aims to improve computational efficiency while maintaining excellent predictive performance. To obtain classification results, we aim to train random forest, XGBoost, and C5.0 models using carefully selected variables with high interpretability. The classification accuracy of the ensemble model, generated through soft voting as the goal of high-performance model design, is compared with the individual models. The study leverages data from 1,698 Korean light industrial companies and employs bootstrapping to create distinct data groups. Logistic Regression is employed to calculate SHAP values for each data group, and their averages are computed to derive the final SHAP values. The proposed model enhances interpretability and aims to achieve superior predictive performance.

An Empirical Study on the Effect of CRM System on the Performance of Pharmaceutical Companies (고객관계관리 시스템의 수준이 BSC 관점에서의 기업성과에 미치는 영향 : 제약회사를 중심으로)

  • Kim, Hyun-Jung;Park, Jong-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.43-65
    • /
    • 2010
  • Facing a complex environment driven by a decade, many companies are adopting new strategic frameworks such as Customer Relationship Management system to achieve sustainable profitability as well as overcome serious competition for survival. In many business areas, CRM system advanced a great deal in a matter of continuous compensating the defect and overall integration. However, pharmaceutical companies in Korea were slow to accept them for usesince they still have a tendency of holding fast to traditional way of sales and marketing based on individual networks of sales representatives. In the circumstance, this article tried to empirically address current status of CRM system as well as the effects of the system on the performance of pharmaceutical companies by applying BSC method's four perspectives, from financial, customer, learning and growth and internal process. Survey by e-mail and post to employers and employees who were working in pharma firms were undergone for the purpose. Total 113 cases among collected 140 ones were used for the statistical analysis by SPSS ver. 15 package. Reliability, Factor analysis, regression were done. This study revealed that CRM system had a significant effect on improving financial and non-financial performance of pharmaceutical companies as expected. Proposed regression model fits well and among them, CRM marketing information system shed the light on substantial impact on companies' outcome given profitability, growth and investment. Useful analytical information by CRM marketing information system appears to enable pharmaceutical firms to set up effective marketing and sales strategies, these result in favorable financial performance by enhancing values for stakeholderseventually, not to mention short-term profit and/or mid-term potential to growth. CRM system depicted its influence on not only financial performance, but also non-financial fruit of pharmaceutical companies. Further analysis for each component showed that CRM marketing information system were able to demonstrate statistically significant effect on the performance like the result of financial outcome. CRM system is believed to provide the companies with efficient way of customers managing by valuable standardized business process prompt coping with specific customers' needs. It consequently induces customer satisfaction and retentionto improve performance for long period. That is, there is a virtuous circle for creating value as the cornerstone for sustainable growth. However, the research failed to put forward to evidence to support hypothesis regarding favorable influence of CRM sales representative's records assessment system and CRM customer analysis system on the management performance. The analysis is regarded to reflect the lack of understanding of sales people and respondents between actual work duties and far-sighted goal in strategic analysis framework. Ordinary salesmen seem to dedicate short-term goal for the purpose of meeting sales target, receiving incentive bonus in a manner-of-fact style, as such, they tend to avail themselves of personal network and sales and promotional expense rather than CRM system. The study finding proposed a link between CRM information system and performance. It empirically indicated that pharmaceutical companies had been implementing CRM system as an effective strategic business framework in order for more balanced achievements based on the grounded understanding of both CRM system and integrated performance. It suggests a positive impact of supportive CRM system on firm performance, especially for pharmaceutical industry through the initial empirical evidence. Also, it brings out unmet needs for more practical system design, improvement of employees' awareness, increase of system utilization in the field. On the basis of the insight from this exploratory study, confirmatory research by more appropriate measurement tool and increased sample size should be further examined.

The Effects of Self-Congruity and Functional Congruity on e-WOM: The Moderating Role of Self-Construal in Tourism (중국 관광객의 온라인 구전에 대한 자아일치성과 기능일치성의 효과: 자기해석의 조절효과를 중심으로)

  • Yang, Qin;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.25 no.1
    • /
    • pp.1-23
    • /
    • 2016
  • Purpose Self-congruity deals with the effect of symbolic value-expressive attributes on consumer decision and behavior, which is the theoretical foundation of the "non-utilitarian destination positioning". Functional congruity refers to utilitarian evaluation of a product or service by consumers. In addition, recent years, social network services, especially mobile social network services have created many opportunities for e-WOM communication that enables consumers to share personal consumption related information anywhere at any time. Moreover, self-construal is a hot and popular topic that has been discussed in the field of modem psychology as well as in marketing area. This study aims to examine the moderating effect of self-construal on the relationship between self-congruity, functional congruity and tourists' positive electronic word of mouth (e-WOM). Design/methodology/approach In order to verify the hypotheses, we developed a questionnaire with 32 survey items. We measured all the items on a five-point Likert-type scale. We used Sojump.com to collect questionnaire and gathered 218 responses from whom have visited Korea before. After a pilot test, we analyzed the main survey data by using SPSS 20.0 and AMOS 18.0, and employed structural equation modeling to test the hypotheses. We first estimated the measurement model for its overall fit, reliability and validity through a confirmatory factor analysis and used common method bias test to make sure that whether measures are affected by common-method variance. Then we tested the hypotheses through the structural model and used regression analysis to measure moderating effect of self-construal. Findings The results reveal that the effect of self-congruity on tourists' positive e-WOM is stronger for tourists with an independent self-construal compared with those with interdependent self-construal. Moreover, it shows that the effect of functional congruity on tourists' positive e-WOM becomes salient when tourists' self-construal is primed to be interdependent rather than independent. We expect that the results of this study can provide important implications for academic and practical perspective.

Finite Element Model Updating Based on Data Fusion of Acceleration and Angular Velocity (가속도 및 각속도 데이터 융합 기반 유한요소모델 개선)

  • Kim, Hyun-Jun;Cho, Soo-Jin;Sim, Sung-Han
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.2
    • /
    • pp.60-67
    • /
    • 2015
  • The finite element (FE) model updating is a commonly used approach in civil engineering, enabling damage detection, design verification, and load capacity identification. In the FE model updating, acceleration responses are generally employed to determine modal properties of a structure, which are subsequently used to update the initial FE model. While the acceleration-based model updating has been successful in finding better approximations of the physical systems including material and sectional properties, the boundary conditions have been considered yet to be difficult to accurately estimate as the acceleration responses only correspond to translational degree-of-freedoms (DOF). Recent advancement in the sensor technology has enabled low-cost, high-precision gyroscopes that can be adopted in the FE model updating to provide angular information of a structure. This study proposes a FE model updating strategy based on data fusion of acceleration and angular velocity. The usage of both acceleration and angular velocity gives richer information than the sole use of acceleration, allowing the enhanced performance particularly in determining the boundary conditions. A numerical simulation on a simply supported beam is presented to demonstrate the proposed FE model updating approach.

Design and Implementation of a Spatio-Temporal Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 시공간 미들웨어의 설계 및 구현)

  • Kim, Jeong-Joon;Jeong, Yeon-Jong;Kim, Dong-Oh;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.43-54
    • /
    • 2009
  • As R&D(Research and Development) is going on actively to develop technologies for the ubiquitous computing environment, which Is the human-oriented future computing environment, GIS dealing with spatio-temporal data is emerging as a promising technology. This also increases the necessity of the middleware for providing services to give interoperability in various heterogeneous environments. The core technologies of the middleware are real-time processing technology of data streams coming unceasingly from positioning systems and data stream processing technology developed for non-spatio-temporal data. However, it has problems in processing queries on spatio-temporal data efficiently. Accordingly, this paper designed and implemented the spatio-temporal middleware that provides interoperability between a mobile spatio-temporal DBMS(DataBase Management System) and a server spatio-temporal MMDBMS(Main Memory DataBase Management System). The spatio-temporal middleware maintains interoperability among heterogeneous devices and guarantees data integrity in query processing through real-time processing of unceasing spatio-temporal data streams and two way synchronization of spatio-temporal DBMSs. In addition, it manages session for the connection of each spatio-temporal DBMS and manages resources for its stable operation. Finally, this paper proved the usability of the spatio-temporal middleware by applying it to a real-time position tracking system.

  • PDF

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.

A Design and Implementation of Floor Detection Application Using RC Car Simulator (RC카 시뮬레이터를 이용한 바닥 탐지 응용 설계 및 구현)

  • Lee, Yoona;Park, Young-Ho;Ihm, Sun-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.12
    • /
    • pp.507-516
    • /
    • 2019
  • Costs invested in road maintenance and road development are on the rise. However, due to accidents such as portholes and ground subsidence, the risks to the drivers' safety and the material damage caused by accidents are also increasing. Following this trend, we have developed a system that determines road damage, according to the magnitude of vibration generated without directly intervening the driver when driving. In this paper, we implemented the system using a remote control car (RC car) simulator due to the limitation of the environment in which the actual vehicle is not available in the process of developing the system. In addition, we attached a vibration sensor and GPS sensor to the body of the RC car simulator to measure the vibration value and location information generated by the movement of the vehicle in real-time while driving, and transmitting the corresponding data to the server. In this way, we implemented a system that allows external users to check the damage of roads and the maintenance of the repaired roads based on data more easily than the existing systems. By using this system, we can perform early prediction of road breakage and pattern prediction based on the data. Further, for the RC car simulator, commercialization will be possible by combining it with business in other fields that require flatness.

A Multicast Middleware for the Remote Educational Systems (원격 교육 시스템을 위한 멀티캐스트 미들웨어)

  • Byun, Sang-Seon;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.100-108
    • /
    • 2003
  • By choosing Multicast for transmission of educational contents in the Remote Educational System, we can reduce the server load and increase network bandwidth utilization. We design and implement Multicast Middleware for the Remote Educational System in this paper. There are three characteristics in this Multicast Middleware: 1) Through Centralized Multicast Group Management for passive members, it allows a host to make multicast group, which is composed of receivers, called Group Member and who are chosen by the host, called group Maker. Because, all groups are created by the Group Maker in Centralized Group Management, Group Member's join action will be passive 2) Maintenance and recovery of multicast group information in order to restore from exception and crash; the maintenance and recovery mechanism of Group Maker is distinct from that of Group Member. 3) The mechanism which enables to transmit large size multimedia data through multicasting and remove additional copy operation through shared buffer. Fragmentation/de-fragmentation for large data delivery results in additional copy operation in user level. But by using user level shared buffer, it can be done without user Bevel copy operation. By applying to Remote Educational environment which consists of 30 PCs and Fast Ethernet, we can examine the efficiency of this middleware, which can transmit 18frames/sec movie which resolution 320 $\times$ 120 pixels, 128Kbps encoded sound data and some text data.