• Title/Summary/Keyword: ID4

Search Result 764, Processing Time 0.03 seconds

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

A Case Report of Left Ventricular Remodeling Surgery on End-Stage Dilated Cardiomyopatty (말기 심부전 환자의 좌심실 개조수술 1례보고)

  • 임창영;기주이
    • Journal of Chest Surgery
    • /
    • v.30 no.6
    • /
    • pp.613-616
    • /
    • 1997
  • We present a case of 58-year-old (tamale with dilated cardiomyopathy(DCMP) in whom we performed left ventricular(LV) remodeling surgery(Batista operation) to reduce the left ventricle diameter and improve left ventricular unction. The patient was admitted September 1996 with heart failure NYHA class IV. There was severe orthopnea and peripheral edema. 2-D echocardiography(Echo) showed DCMP with the ejection fraction(EF) I5%, LV end diastolic dimension(LVEDD) 80mm, mitral regurgitation(MR) grade IV, tricuspid regurgitation ('m) grade ll. Preoperative cardiac output(CO) was 1.5/L/min and cardiac index(Cl) was 1.0 L/min/m2. We proceeded with LV remodeling surgery by resection a part of LV lateral wall between both papillary muscle, from the mitral annulus to the LV apex. Size of resected LV wall was 90 $\times$ 100 $\times$ 15 mm. At the mean time, mitral valve and tricuspid valve were repaired. Postoperative 2-D Echo showed the EF 37%, LVEDD 50 mna, trivial MR, no TR. CO was 3.SL/min and Cl was 2.3 L/min/m2. Her fuctional NYHA class was 1.

  • PDF

Efficient Query Indexing for Short Interval Query (짧은 구간을 갖는 범위 질의의 효율적인 질의 색인 기법)

  • Kim, Jae-In;Song, Myung-Jin;Han, Dae-Young;Kim, Dae-In;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.507-516
    • /
    • 2009
  • In stream data processing system, generally the interval queries are in advance registered in the system. When a data is input to the system continuously, for realtime processing, a query indexing method is used to quickly search queries. Thus, a main memory-based query index with a small storage cost and a fast search time is needed for searching queries. In this paper, we propose a LVC-based(Limited Virtual Construct-based) query index method using a hashing to meet the both needs. In LVC-based query index, we divide the range of a stream into limited virtual construct, or LVC. We map each interval query to its corresponding LVC and the query ID is stored on each LVC. We have compared with the CEI-based query indexing method through the simulation experiment. When the range of values of input stream is broad and there are many short interval queries, the LVC-based indexing method have shown the performance enhancement for the storage cost and search time.

Electrical and Retention Properties of MFSFET Device (MFSFET 소자의 전기적 및 리텐션 특성)

  • Chung, Yeun-Gun;Kang, Seong-Jun;Joung, Yang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.570-576
    • /
    • 2007
  • In this study, the characteristics of metal-ferroelectric-semiconductor FET (MFSFET) device is investigated using field-dependent polarization and square-law FET models. From drain current with the gate voltage variation, when coercive voltages of ferroelectric thin film are 0.5 and 1V, the memory windows are 1 and 2V, respectively. When the gate voltages are 0, 0.1, 0.2 and 0.3V, the difference of saturation drain currents of the MFSFET device at two threshold voltages in ID-VD curve are 1.5, 2.7, 4.0, and 5.7mA, respectively. As a result of the analysis for drain currents after tine lapse, which is based on the simulation for hysteresis loop and the fitting of retention properties of ferroelectric thin films such as PLZT(10/30/70), PLT(10) and PZT(30/70) thin film shows excellent reliability that the decrease of saturation current is about 18% after 10 years.

Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

  • Kim, Kwang-Il;Kim, Joo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.65-70
    • /
    • 2019
  • In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.

A report on 53 unrecorded bacteria species in Korea in the class Gammaproteobacteria

  • Kanjanasuntree, Rungravee;Cha, Chang-Jun;Cho, Jang-Cheon;Im, Wan-Taek;Kim, Myung Kyum;Jeon, Che-Ok;Joh, Kiseong;Kim, Seung-Bum;Seong, Chi-Nam;Yi, Hana;Lee, Soon Dong;Bae, Jin-Woo;Kim, Wonyong
    • Journal of Species Research
    • /
    • v.8 no.4
    • /
    • pp.319-336
    • /
    • 2019
  • During an investigation of unrecorded prokaryotic species in Republic of Korea, a total of 53 bacterial strains belonging to the class Gammaproteobacteria were isolated from soil, seawater, tidal flats, rhizosphere, salt ponds, beach sand, urine, manure, sediment, and animal intestine (Russian grayling butterfly [Hipparchia autonoe], mouse [Mus musculus], and sea bass [Lateolabrax japonicus]). Strains were identified to species using the 16S rRNA gene sequence, showing high similarity (>98.7%) with the closest bacterial species and forming a robust clade in the neighbor-joining phylogenetic tree. The 53 strains of Gammaproteobacteria in this study have not been report previously in Korea. Therefore, we describe 27 genera of 16 families in 7 orders: 13 strains in the order Alteromonadales, 1 strain in the order Chromatiales, 11 strains in the order Enterobacterales, 7 strains in the order Oceanospirillales, 10 strains in the order Pseudomonadales, 8 strains in the order Vibrionales, and 3 strains in the order Xanthomonadales. Gram reaction, strain ID, isolation source, and morphological and basic biochemical characteristics are described for each species.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Synthesis and evaluation of 64Cu-labeled avidin for lymph node imaging

  • Kang, Choong Mo;Kim, Hyunjung;Lee, Yong Jin;Choe, Yearn Seong
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.5 no.1
    • /
    • pp.54-60
    • /
    • 2019
  • Sentinel lymph node (SLN) imaging plays an important role in surgery of patients with breast cancer and melanoma. In this study, avidin (Av), a tetrameric protein glycosylated with mannose and N-acetylglucosamine molecules, was labeled with $^{64}Cu$ and then evaluated for LN imaging. $^{64}Cu$-Labeled $NeutrAvidin^{TM}$ (NAv), a non-glycosylated form of Av, was used for comparison. 1,4,7,10-Tetraazacyclododecane-N,N',N'',N'''-tetraacetic acid (DOTA)-conjugated Av and NAv were prepared from the corresponding proteins and DOTA-NHS ester, which were then labeled with copper-64 and purified using PD-10 columns. The numbers of DOTA molecules conjugated to Av and NAv were 4.9 and 3.3, respectively. [$^{64}Cu$]Cu-DOTA-conjugated Av and NAv were prepared in 93% and 73% radiochemical yields, respectively. In vitro serum stability study showed that copper-64 remained stable on all radiotracers for 24 h (>97%). MicroPET/CT images showed that high radioactivity was accumulated in LNs within 15 min after footpad-injection of radiotracers. Tissue distribution data of mice demonstrated significantly higher uptake in the popliteal (PO) LN than lumbar (LU) LN for $^{64}Cu$-labeled Av (relative % ID/g excluding the injection sites: 66.2% and 26.0%, respectively) compared with those of $^{64}Cu$-labeled NAv (43.0% and 49.2%, respectively). The results of this study suggest that mannose molecules on Av enabled the radiotracer to retain in the first LN after mouse footpad-injection.

Authenticated Identity-based Key Agreement Protocols in a Multiple Independent PKG Environment (다중 독립 PKG환경에서 인증된 신원기반 키 동의 프로토콜)

  • Lee Hoonjung;Kim Hyunsook;Kim Sangjin;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.11-27
    • /
    • 2005
  • To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla proposed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses distinct master key. However, it is more realistic to assume that each PKG uses different system parameters including the PKG's master key. In this paper, we propose a new two party key agreement protocol between users belonging to different PKGs that do not share system parameters. We also extend this protocol to two types of tripartite key agreement protocols. We show that our two party protocol requires minimal amount of pairing computation for a multiple PKG environment and our tripartite protocol is more efficient than existing protocols. We also show that the proposed key agreement protocols satisfy every security requirements of key agreement protocol.

Design of image encryption system using multiple chaotic maps (다중 카오스 사상을 이용한 영상 암호시스템 설계)

  • 이성우;신재호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.183-194
    • /
    • 2004
  • The proliferation of the Internet and the rapid progress of wire/wireless communication technology makes security of digital images more and more important since the exchanges of digital images occur more and more frequently. And as the tight relationship between chaos theory and cryptography, many researches for development of new encryption systems based on chaotic maps have been widely progressed recently. In this paper, we propose a digital image encryption system based on both one-dimensional PLCM(Piecewise Linear Chaotic Map) and two-dimensional baker map. This proposed system is a product cipher that contains a perturbance-based chaotic stream cipher based on ID PLCM and a chaotic block cipher based on 2D baker map and is very high secure and easily implementable cipher having both a good confusion property and a good diffusion property. And with test results, we showed this system is very secure against statistical attacks.