• Title/Summary/Keyword: Request

Search Result 2,843, Processing Time 0.023 seconds

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Difference in Requests between Koreans and Americans

  • Park, Chung-Yeol
    • English Language & Literature Teaching
    • /
    • v.12 no.2
    • /
    • pp.153-176
    • /
    • 2006
  • This paper examines "Difference in Requests." The study of speech acts is a crucial area in sociolinguistics and ethnolinguistics, and has aided in the development of TESOL. It also provides a useful means of relating linguistic form and communicative intent. This paper concentrated on 3 request strategies, which were requests made with an explanation, requests made without an explanation and no requests. The purpose of this study, and of concern in TESOL, was to discover whether Koreans framed their requests differently under different conditions. Based on these differences, I wanted to ascertain whether Koreans who spoke English as a second language, and who have lived in the United States, frame their requests as they would in their native tongues thus creating the potential for sociolinguistic failure, or use American sociolinguistic style. As the results of the study, it was found that in the majority of cases, Americans made an explanation with a request. In many cases the Koreans living in Korea would not give an explanation when making a request. Rather, they were direct in request. In many cases the Korean speaking English and living in the US had adopted the American request strategy of giving an explanation.

  • PDF

Dynamic Scheme Transition for On-Demand Video Streaming Adaptable to Variable Client Request Rate (다양한 클라이언트 요청율에 적용가능한 주문형 비디오 스트리밍을 위한 동적 스킴 트랜지션 기법)

  • Kim Hyun-Joo;Yeom Heon-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.149-159
    • /
    • 2006
  • To provide on-demand video streaming services through the network, video objects with both high and low client request rates should be served efficiently. In this paper, we propose a dynamic on-demand streaming approach for providing services efficiently regardless of the client request rate. This approach can maintain QoS by transitioning the service scheme according to the request rate. The server provides services by the Heuristic broadcasting approach when the client request rate is low and by Striping broadcast, one of many Periodic broadcast approaches, when the client request rate is high. The server knows the variations of client request rates by the number of service channels and decides the transition to more efficient service schemes on its own. We simulated this scheme transition with various client request intervals and traces from a company providing streaming services. The results show that the performance of our approach is reasonable.

Design and Implementation of Remote Procedure Call Resource Service System based on the XML Considering the Request Delegation between the Servers (서버 간 요청 위임을 고려한 XML 기반 RPC 자원 서비스 시스템 설계 및 구현)

  • 김정희;곽호영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1100-1110
    • /
    • 2003
  • Design and implementation of remote procedure cail (RPC) resource service system based on the XML considering the request delegation between the servers are described for the resource application and efficient processing of distributed environment. For this purpose, the request information about several server, which would be used by client, is encoded into XML document based on XML-DOM and transferred to server. Server classifies the client requests using objects which can deal with the XMLL-DOM. For the request delegation between the servers, server saves the request result of client in XMLL-DOM structure without replying it immediately, and makes the client request delegated to another server in XML-DOM's request information. In addition, the resource repository are managed for resource transparency of distributed environment. As a result, resource application and processing efficiency are improved by reduction of response time caused by integration of RPC and XML-RPC services and request delegation between the servers. Extension of asynchronous and average blocking time of client were reduced and information of resource which can be used by client was offered.

  • PDF

New Transient Request with Loose Ordering for Token Coherence Protocol (토큰 코히런스 프로토콜을 위한 경서열 트렌지언트 요청 처리 방법)

  • Park, Yun Kyung;Kim, Dae Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.10
    • /
    • pp.615-619
    • /
    • 2005
  • Token coherence protocol has many good reasons against snooping/directory-based protocol in terms of latency, bandwidth, and complexity. Token counting easily maintains correctness of the protocol without global ordering of request which is basis of other dominant cache coherence protocols. But this lack of global ordering causes starvation which is not happening in snooping/directory-based protocols. Token coherence protocol solves this problem by providing an emergency mechanism called persistent request. It enforces other processors in the competition (or accessing same shared memory block, to give up their tokens to feed a starving processor. However, as the number of processors grows in a system, the frequency of starvation occurrence increases. In other words, the situation where persistent request occurs becomes too frequent to be emergent. As the frequency of persistent requests increases, not only the cost of each persistent matters since it is based on broadcasting to all processors, but also the increased traffic of persistent requests will saturate the bandwidth of multiprocessor interconnection network. This paper proposes a new request mechanism that defines order of requests to reduce occurrence of persistent requests. This ordering mechanism has been designed to be decentralized since centralized mechanism in both snooping-based protocol and directory-based protocol is one of primary reasons why token coherence protocol has advantage in terms of latency and bandwidth against these two dominant Protocols.

Identification of Factors Influencing the Operability of Precast Concrete Construction Shipment Request Forms

  • Jeong, Eunbeen;Jang, Junyoung;Kim, Tae Wan
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.145-152
    • /
    • 2022
  • Recently, interest in the precast concrete (PC) construction method has been increasing. The PC construction process consists of i) design, ii) production, iii) transportation, and iv) installation. A PC field manager at the site submits a shipment request form to the factory one to three days before the installation of the PC component. Numerous matters should be considered in writing a shipment request form. Incorrect shipment request forms may cause standby resources, waste of resources, premature work conclusion, or excessive work. These issues can lead to an increase in construction costs, replanning of PC component installation, or rework. In order to prevent such problems, PC component installation should be simulated based on the shipment request form. Accordingly, this study aims to identify factors influencing the operability of shipment request forms for PC construction. To this end, this study derived factors influencing i) initiation of the activity, ii) addition or deletion of activities, and iii) an increase or decrease in the activity execution time. As a result, this study identified flow, the features of PC components, condition of PC components, unloading location, installation location, input equipment and labor, number of anchors, number of supports, weather, strike, and accident. Further studies should verify the factors derived in this study based on focus group interviews.

  • PDF

Selection Method of Remodeling Based on User Request (사용자 요구에 따른 공동주택 리모델링 선정방법)

  • 임재현;윤여완;양극영
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2003.05a
    • /
    • pp.119-124
    • /
    • 2003
  • Lately Construction industry tends to prefer remodeling of existing building rather then new construction or reconstruction of buildings due to strengthening of several restriction related to real estates along with prolonged depression. Specially in case of Apartment houses, since vagueness on ownership and management authority on common part exists. So in this study we are to present the procedure of analyzing apartment house remodeling method through user request by approaching to several considerable factors in user request side.

  • PDF

Stochastic models for random request availability

  • Lee, Kang-W.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1992.04b
    • /
    • pp.180-186
    • /
    • 1992
  • A system is considered which is required to perform several tasks which arrive randomly during the fixed mission duration.

  • PDF

Properties and Approximation Method of the Random - Request Availability (임의 요구 가용도의 성질과 근사방법)

  • Lee, Kang-W.;Park, Jung-W.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.3
    • /
    • pp.260-266
    • /
    • 2001
  • The characteristic of the random-request availability is that random task arrival is included as one of system elements. If the mean number of task arrivals grows, the computational complexity for deriving the random-request availability becomes extremely high. Using a simulation method, the effect of 'random task arrival' elements on the random-request availability is investigated. Some approximation methods are also discussed.

  • PDF

A Study on the Communicative Functions of Prosodic Contours: in Children with Single Word Sentences (억양의 의사소통적 기능에 대한 연구: 일어문 시기의 아동을 대상으로)

  • Ahn, Mi-Lee;Kim, Tae-Kyung
    • Speech Sciences
    • /
    • v.11 no.2
    • /
    • pp.151-164
    • /
    • 2004
  • This study examined the use of intonation in children with single word sentences and investigated the communicative functions of pitch range and pitch direction. Two children aged 13months were observed in interaction with their mothers for 10 months. The vocalizations were coded separately for communicative function and for prosodic feature. Results show that level tones are used most frequently, and pitch range is higher for request than declaration or answer and lower for answer than request or declaration. And trends in prosodic contours were observed in request, declaration, and answer respectively. For one child, rising tones were frequently associated with request whereas rising-falling tone with declaration. For the other child, rising-level tones were more frequently associated with request whereas falling-level appeared more often in conjunction with declaration. These trends appeared more distinct in proportion as they grow in months. This result indicate that the way to express communicative functions transfer gradually from differentiating pitch range to diversify pitch direction.

  • PDF