• Title/Summary/Keyword: Privileged information

Search Result 39, Processing Time 0.032 seconds

Image Segmentation by Cascaded Superpixel Merging with Privileged Information (단계적 슈퍼픽셀 병합을 통한 이미지 분할 방법에서 특권정보의 활용 방안)

  • Park, Yongjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1049-1059
    • /
    • 2019
  • We propose a learning-based image segmentation algorithm. Starting from super-pixels, our method learns the probability of merging two regions based on the ground truth made by humans. The learned information is used in determining whether the two regions should be merged or not in a segmentation stage. Unlike exiting learning-based algorithms, we use both local and object information. The local information represents features computed from super-pixels and the object information represent high level information available only in the learning process. The object information is considered as privileged information, and we can use a framework that utilize the privileged information such as SVM+. In experiments on the Berkeley Segmentation Dataset and Benchmark (BSDS 500) and PASCAL Visual Object Classes Challenge (VOC 2012) data set, out model exhibited the best performance with a relatively small training data set and also showed competitive results with a sufficiently large training data set.

Secure Remote User Authentication Protocol against Privileged-Insider Attack (Privileged-Insider 공격에 안전한 원격 사용자 인증 프로토콜)

  • Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.614-628
    • /
    • 2017
  • Recently, Due to the rapid development of the internet and IT technology, users can conveniently use various services provided by the server anytime and anywhere. However, these technologies are exposed to various security threat such as tampering, eavesdropping, and exposing of user's identity and location information. In 2016, Nikooghadam et al. proposed a lightweight authentication and key agreement protocol preserving user anonymity. This paper overcomes the vulnerability of Nikooghadam's authentication protocol proposed recently. This paper suggests an enhanced remote user authentication protocol that protects user's password and provides perfect forward secrecy.

An Intrusion Detection Method by Tracing Root Privileged Processes (Root 권한 프로세스 추적을 통한 침입 탐지 기법)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.239-244
    • /
    • 2008
  • It is not enough to reduce damages of computer systems by just patching vulnerability codes after incidents occur. It is necessary to detect and block intrusions by boosting the durability of systems even if there are vulnerable codes in systems. This paper proposes a robust real-time intrusion detection method by monitoring root privileged processes instead of system administrators in Linux systems. This method saves IP addresses of users in the process table and monitors IP addresses of every root privileged process. The proposed method is verified to protect vulnerable programs against the buffer overflow by using KON program. A configuration protocol is proposed to manage systems remotely and host IP addresses are protected from intrusions safely through this protocol.

The Recognition of Occluded 2-D Objects Using the String Matching and Hash Retrieval Algorithm (스트링 매칭과 해시 검색을 이용한 겹쳐진 이차원 물체의 인식)

  • Kim, Kwan-Dong;Lee, Ji-Yong;Lee, Byeong-Gon;Ahn, Jae-Hyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.7
    • /
    • pp.1923-1932
    • /
    • 1998
  • This paper deals with a 2-D objects recognition algorithm. And in this paper, we present an algorithm which can reduce the computation time in model retrieval by means of hashing technique instead of using the binary~tree method. In this paper, we treat an object boundary as a string of structural units and use an attributed string matching algorithm to compute similarity measure between two strings. We select from the privileged strings a privileged string wIth mmimal eccentricity. This privileged string is treated as the reference string. And thell we wllstructed hash table using the distance between privileged string and the reference string as a key value. Once the database of all model strings is built, the recognition proceeds by segmenting the scene into a polygonal approximation. The distance between privileged string extracted from the scene and the reference string is used for model hypothesis rerieval from the table. As a result of the computer simulation, the proposed method can recognize objects only computing, the distance 2-3tiems, while previous method should compute the distance 8-10 times for model retrieval.

  • PDF

An Analysis on Trade Competitiveness between Korea and China (한.중간 무역경쟁력 분석 -섬유.전기전자.운송.기계산업을 중심으로-)

  • Lee, Sung-Ah;Shin, Kyung-Soo
    • International Commerce and Information Review
    • /
    • v.8 no.4
    • /
    • pp.45-69
    • /
    • 2006
  • First, the trade competitiveness of the textile industries in South Korea has been weakening, whereas, the counterpart in China has been growing as the main export industries. Second, the trade competitiveness of the mechanics industries in South Korea has been increasing and appearing as the new promising strategic export industries. And, the counterpart in China also shows that it has been rising, while the country’s level of the imports specialization index has been weakening. Third, the trade competitiveness of the transportation industries in South Korea has been rising as the export-oriented and at the same time, privileged industries. And, China has also been rising as South Korea has been in the case, whereas, imports specialization index has been weakening. Fourth, the trade competitiveness of the electrical and electronic industries in South Korea has relatively been at the very high level, giving rise to the core export-privileged industries in the South Korea. And, China has been emerging as the new strategic export industries, as its industry structure has been shifted from the import- specialization and export-specialization industries. Fifth, it is indicated that the trade in the both South Korean and Chinese industries of fable materials, mechanics goods for computer & office, and goods for electric mechanics has been going favorable and brisk.

  • PDF

An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones (루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법)

  • Jeong, Youn-sik;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.352-362
    • /
    • 2017
  • This paper analyzes security threats in Security Enhanced (SE) Android and proposes a new technique to efficiently protect application data including private information on rooted Android phones. On an unrooted device, application data can be accessed by the application itself according to the access control models. However, on a rooted device, a root-privileged shell can disable part or all of the access control model enforcement procedures. Therefore, a root-privileged shell can directly access sensitive data of other applications, and a malicious application can leak the data of other applications outside the device. To address this problem, the proposed technique allows only some specific processes to access to the data of other applications including private information by modifying the existing SEAndroid Linux Security Module (LSM) Hook function. Also, a new domain type of process is added to the target system to enforce stronger security rules. In addition, the proposed technique separates the directory type of a newly installed application and the directory type of previously installed applications. Experimental results show that the proposed technique can effectively protect the data of each application and incur performance overhead up to or less than 2 seconds.

Intrusion Detection based on Intrusion Prediction DB using System Call Sequences (시스템 호출을 이용한 침입예상 데이터베이스 기반 침입탐지)

  • Ko, Ki-Woong;Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.927-930
    • /
    • 2002
  • 본 논문에서는 중요 프로세스(privileged process)의 시스템 호출 순서(system call sequence)를 이용한 침입탐지 시스템을 제안한다. 기존 연구의 정상행위 기반 침입탐지 시스템은 정상행위를 모델링하여 시스템을 구성하고, 이와 비교를 통해 프로세스의 이상(anomaly) 여부를 결정한다. 이러한 방법은 모델링되지 않은 미지의 행위에 대한 적절한 판단을 행할 수 없으므로, 높은 오류율(false-positive/negative)을 보인다. 본 논문에서는 현재까지 알려진 공격에서 공통적으로 나타나는 윈도우들을 수집하여 침입예상윈도우를 구축하고, 이를 기존의 침입탐지 시스템에 부가적으로 사용하여 효과적으로 오류율(false-positive/negative)을 낮출 수 있음을 보인다. 실험 결과 제안된 방법을 통한 침입탐지는 기존의 방법에 비해 공격 탐지율은 증가하고 정상행위에 대한 오류율은 감소하였다.

  • PDF

2-Subset Difference Scheme for Broadcast Encryption (효율적인 동보메시지 암호화를 위한 2-부분 차집합 기법)

  • Jang Ji-Yong;Song Joo-Seok;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.27-32
    • /
    • 2006
  • Broadcast Encryption allows a center to broadcast encrypted message to a set of users so that only privileged users can decrypt them. In this paper, we propose an efficient broadcast encryption scheme based on the 'Subset Difference' (SD) scheme. It reduces the transmission overhead by 50 percent while the storage overhead remains the same but the computational overhead somewhat increases.

Penetration Testing and Network Auditing: Linux

  • Stiawan, Deris;Idris, Mohd. Yazid;Abdullah, Abdul Hanan
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.104-115
    • /
    • 2015
  • Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.

On-line Data Analysis for Marketing Service including Golf Image Contents (골프공 영상콘텐츠를 포함한 마케팅서비스를 위한 온라인 자료분석에 관한 연구)

  • Lee, Hyun-chang;Jin, Chan-Yong;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.379-381
    • /
    • 2016
  • Among the various sports, recognition of golf sport is changing the privileged classes sport into a popular sport. In this kind of sport area, there are many loyal customers of golf sport relatively compared to the other marketing products or sports. Therefore, in this paper, we have analyzed the online buying pattern of customers through the popularization of golf such as golf ball or accessories and want to promote activation marketing in the online environment. For these, we suggest the way to promote marketing activation by analyzing online data.

  • PDF