• Title/Summary/Keyword: Internet tools

Search Result 669, Processing Time 0.02 seconds

Anomaly Detection in Smart Homes Using Bayesian Networks

  • Saqaeeyan, Sasan;javadi, Hamid Haj Seyyed;Amirkhani, Hossein
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1796-1816
    • /
    • 2020
  • The health and safety of elderly and disabled patients who cannot live alone is an important issue. Timely detection of sudden events is necessary to protect these people, and anomaly detection in smart homes is an efficient approach to extracting such information. In the real world, there is a causal relationship between an occupant's behaviour and the order in which appliances are used in the home. Bayesian networks are appropriate tools for assessing the probability of an effect due to the occurrence of its causes, and vice versa. This paper defines different subsets of random variables on the basis of sensory data from a smart home, and it presents an anomaly detection system based on various models of Bayesian networks and drawing upon these variables. We examine different models to obtain the best network, one that has higher assessment scores and a smaller size. Experimental evaluations of real datasets show the effectiveness of the proposed method.

Security Model for Intranet Environment (안전한 인트라넷을 위한 보안 모델)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.166-175
    • /
    • 1999
  • Since the intranet is a combination of open internet technologies and private information systems, various technologies for information security are essentially needed. On recent, a lot of firewall systems are being constructed to be secure the informations from external networks such as Internet in many private companies. Even though internal attacks are more frequently happened than external ones in the intranet environments, there are quite few researches on secure intranet and the internal threats are underestimated so far. In this paper, we study the security threats for each service in the intranet and propose the security models appropriate to the intranet environments by using several cryptographic tools and protocols. Furthermore, we implement the proposed security models in Java applications through computer simulation.

  • PDF

A Study on The Application of WEB-Site to Rent-a-car (차량대여업체 웹사이트 활용방안에 관한 연구)

  • 강태석
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1445-1452
    • /
    • 2001
  • Internet system is now essential part of modern human life to get useful information totally by network. Moreover, in terms of travel agency business, the application of electronic commerce system using Internet is extremely important, because that providing and getting proper information is the focus to success in the business. They don't provide enough sub tools like keyboard searching function, sitemap and real-online reservation system. The bulletin board usually has a big role to gather visitors opinion, provide new information and Promotion their company to everyone.

  • PDF

The Effects of Customer Experience at the Banks on Customer loyalty (은행에서의 고객경험이 고객충성도에 미치는 영향)

  • Jeon, Gilgu;Yoo, Hanjoo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.2
    • /
    • pp.357-372
    • /
    • 2016
  • Purpose: The paper aims to measure customer experience at banks in South Korea. This study examines six factors of customer experience and identifies their impacts on customer loyalty. Methods: The collected data with surveys were analyzed by using multi-regression analysis. The measurement tools used for this study were categorized into six dimensions: Customization, Employees, Servicescape, Internet Banking, Value addition, and the Presence of other customers. Results: Customer experience has an influence on customer satisfaction: The effects of Customization, Employees, Servicescape, Internet Banking and Value addition were found. However, the presence of other customers was not significant on customer satisfaction. Interestingly, it was found that customer satisfaction made a statistically significant influence on customer loyalty. Conclusion: This study focuses on a bank sector of customer experience. Thus, six factors of measuring customer experience were found. The results of this study will predict customers' experience and also build up effective strategies for the utmost satisfaction of the customers.

Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism

  • Cui, Chaoyuan;Wu, Yun;Li, Yonggang;Sun, Bingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1722-1741
    • /
    • 2017
  • Intrusion detection techniques based on virtual machine introspection (VMI) provide high temper-resistance in comparison with traditional in-host anti-virus tools. However, the presence of semantic gap also leads to the performance and compatibility problems. In order to map raw bits of hardware to meaningful information of virtual machine, detailed knowledge of different guest OS is required. In this work, we present VDSM, a lightweight and general approach based on driver separation mechanism: divide semantic view reconstruction into online driver of view generation and offline driver of semantics extraction. We have developed a prototype of VDSM and used it to do intrusion detection on 13 operation systems. The evaluation results show VDSM is effective and practical with a small performance overhead.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

RAS: Request Assignment Simulator for Cloud-Based Applications

  • Rajan, R. Arokia Paul;Francis, F. Sagayaraj
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2035-2049
    • /
    • 2015
  • Applications deployed in cloud receive a huge volume of requests from geographically distributed users whose satisfaction with the cloud service is directly proportional to the efficiency with which the requests are handled. Assignment of user requests based on appropriate load balancing principles significantly improves the performance of such cloud-based applications. To study the behavior of such systems, there is a need for simulation tools that will help the designer to set a test bed and evaluate the performance of the system by experimenting with different load balancing principles. In this paper, a novel architecture for cloud called Request Assignment Simulator (RAS) is proposed. It is a customizable, visual tool that simulates the request assignment process based on load balancing principles with a set of parameters that impact resource utilization. This simulator will help to ascertain the best possible resource allocation technique by facilitating the designer to apply and test different load balancing principles for a given scenario.

GeoMaTree : Geometric and Mathematical Model Based Digital Tree Authoring System

  • Jung, Seowon;Kim, Daeyeoul;Kim, Jinmo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3284-3306
    • /
    • 2018
  • This study proposes a method to develop an authoring system(GeoMaTree) for diverse trees that constitute a virtual landscape. The GeoMaTree system enables the simple, intuitive production of an efficient structure, and supports real-time processing. The core of the proposed system is a procedural modeling based on a mathematical model and an application that supports digital content creation on diverse platforms. The procedural modeling allows users to control the complex pattern of branch propagation through an intuitive process. The application is a multi-resolution 3D model that supports appropriate optimization for a tree structure. The application and a compatible function, with commercial tools for supporting the creation of realistic synthetic images and virtual landscapes, are implemented, and the proposed system is applied to a variety of 3D image content.

Development of Internet tools and web site for the visual disabled (시각장애인을 위한 Web Site 구축에 관한 연구)

  • 고민수;김보성;길세기;김낙환;장영건;홍승홍
    • Proceedings of the IEEK Conference
    • /
    • 2000.06e
    • /
    • pp.214-217
    • /
    • 2000
  • To help the blind to find the information easily on World Wide Web, this research has tried to develop the device which enables us to convert HTML for the general into HTML for the blind. This program consists of the items as follows: 1. Web Robot to gather the internet browser and the general HTML. 2. Restoring DB by Parsing process 3. Multimedia editor for the use of web DB to add the literal and acoustic description to the editing function. 4. Convertor which gathers the DB and then changes into HTML for the blind. This project is designed to make it easy for the manager to establish the web site for the blind. We expect that this program will basically help the blind to overcome the inequality in the common information.

  • PDF

Penetration Testing and Network Auditing: Linux

  • Stiawan, Deris;Idris, Mohd. Yazid;Abdullah, Abdul Hanan
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.104-115
    • /
    • 2015
  • Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.