• Title/Summary/Keyword: Robustness Testing

Search Result 85, Processing Time 0.024 seconds

An Arbitrary Disk Cluster Manipulating Method for Allocating Disk Fragmentation of Filesystem (파일시스템의 클러스터를 임의로 할당하여 디스크를 단편화하기 위한 방법)

  • Cho, Gyu-Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.11-25
    • /
    • 2020
  • This study proposes a method to manipulate fragmentation of disks by arbitrarily allocating and releasing the status of a disk cluster in the NTFS file system. This method allows experiments to be performed in several studies related to fragmentation problems on disk cluster. Typical applicable research examples include testing the performance of disk defragmentation tools according to the state of fragmentation, establishing an experimental environment for fragmented file carving methods for digital forensics, setting up cluster fragmentation for testing the robustness of data hiding methods within directory indexes, and testing the file system's disk allocation methods according to the various version of Windows. This method suggests how a single file occupies a cluster and presents an algorithm with a flowchart. It raises three tricky problems to solve the method, and we propose solutions to the problems. Experiments for allocating the disk cluster to be fragmented to the maximum extent possible, it then performs a disk defragmentation experiment to prove the proposed method is effective.

Histogram Enhancement for Robust Speaker Verification (강인한 화자 확인을 위한 히스토그램 개선 기법)

  • Choi, Jae-Kil;Kwon, Chul-Hong
    • MALSORI
    • /
    • no.63
    • /
    • pp.153-170
    • /
    • 2007
  • It is well known that when there is an acoustic mismatch between the speech obtained during training and testing, the accuracy of speaker verification systems drastically deteriorates. This paper presents the use of MFCCs' histogram enhancement technique in order to improve the robustness of a speaker verification system. The technique transforms the features extracted from speech within an utterance such that their statistics conform to reference distributions. The reference distributions proposed in this paper are uniform distribution and beta distribution. The transformation modifies the contrast of MFCCs' histogram so that the performance of a speaker verification system is improved both in the clean training and testing environment and in the clean training and noisy testing environment.

  • PDF

A Methodology for Evaluating Intrusion Detection System (침입탐지시스템 평가 방법론)

  • Yoo, Shin-Geun;Lee, Nam-Hoon;Shim, Young-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3445-3461
    • /
    • 2000
  • Although many different intrusion detectionsystems have been developed there have not been enough researches on the methodology for evaluating these intrusion delection systems. With this understanding,in this paper we present a methodology for evaluating infrusion detection systems from the view point of performance and robustness, both of which are considered the most important criteria Current research on evaluating the performance f intrusion detection systems mostly foduson the in issuse detection but not on the anormaly detection. Regarding evalieting robustness it is not easy to apply off -line methodologies and methods for testing robustness hae not been proposed in on -line methodolomes, In this paper we provide an systematic way of classifyin and generating anomalies and using this reult, present an methodology for evaluating the pertormance of intrusion detection systems in detecting anomaalies ans well as misuses . Moreover, ww study the factors that can damage the robustness of intrusion detection systems and suggest an methodology for assessing the robustness of intrusion detection systems.

  • PDF

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

Tests of Hypotheses in Multiple Samples based on Penalized Disparities

  • Park, Chanseok;Ayanendranath Basu;Ian R. Harris
    • Journal of the Korean Statistical Society
    • /
    • v.30 no.3
    • /
    • pp.347-366
    • /
    • 2001
  • Robust analogues of the likelihood ratio test are considered for testing of hypotheses involving multiple discrete distributions. The test statistics are generalizations of the Hellinger deviance test of Simpson(1989) and disparity tests of Lindsay(1994), obtained by looking at a 'penalized' version of the distances; harris and Basu (1994) suggest that the penalty be based on reweighting the empty cells. The results show that often the tests based on the ordinary and penalized distances enjoy better robustness properties than the likelihood ratio test. Also, the tests based on the penalized distances are improvements over those based on the ordinary distances in that they are much closer to the likelihood ratio tests at the null and their convergence to the x$^2$ distribution appears to be dramatically faster; extensive simulation results show that the improvement in performance of the tests due to the penalty is often substantial in small samples.

  • PDF

Small scale experimental testing to verify the effectiveness of the base isolation and tuned mass dampers combined control strategy

  • Petti, Luigi;Giannattasio, Giovanni;De Iuliis, Massimiliano;Palazzo, Bruno
    • Smart Structures and Systems
    • /
    • v.6 no.1
    • /
    • pp.57-72
    • /
    • 2010
  • This paper presents the most significant results obtained within a broad-ranging experimental program aiming to evaluate both the effectiveness and the robustness of a Base Isolation (BIS) and a Tuned Mass Damper (TMD) combined control strategy (BI & TMD). Following a brief description of the experimental model set-up and the adopted kinematic scaling technique, this paper describes the identification procedures carried out to characterize the system''s model. The dynamic response of a small-scale model to recorded earthquake excitations, which has been scaled by using the Buckingham pi-theorem, are later presented and discussed. Finally, the effectiveness and robustness of the combined control strategy is evaluated by comparing the model's dynamic response. In particular, reduction in relative displacements and absolute accelerations due to the application of different mass damping systems is investigated.

HMnet Evaluation for Phonetic Environment Variations of Traning Data in Speech Recognition

  • Kim, Hoi-Rin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.4E
    • /
    • pp.28-36
    • /
    • 1996
  • In this paper, we propose a new evaluation methodology which can more clearly show the performance of the allophone modeling algorithm generally used in large vocabulary speech recognition. The proposed evaluation method shows the running characteristics and limitations of the modeling algorithm by testing how the variation of phonetic environments of training data affects the recognition performance and the desirable number of free parameters to be estimated. Using the method, we experiment results, we conclude that, in vocabulary-independent recognition task, the phonetic diversity of training data greatly affects the robustness of model, and it is necessary to develop a proper measure which can determine the number of states compromizing the robustness and the precision of the HMnet better than the conventional modeling efficiency.

  • PDF

Demonstration of Alternative Fabrication Techniques for Robust MEMS Device

  • Chang, Sung-Pil;Park, Je-Young;Cha, Doo-Yeol;Lee, Heung-Shik
    • Transactions on Electrical and Electronic Materials
    • /
    • v.7 no.4
    • /
    • pp.184-188
    • /
    • 2006
  • This work describes efforts in the fabrication and testing of robust microelectromechanical systems (MEMS). Robustness is typically achieved by investigating non-silicon substrates and materials for MEMS fabrication. Some of the traditional MEMS fabrication techniques are applicable to robust MEMS, while other techniques are drawn from other technology areas, such as electronic packaging. The fabrication technologies appropriate for robust MEMS are illustrated through laminated polymer membrane based pressure sensor arrays. Each array uses a stainless steel substrate, a laminated polymer film as a suspended movable plate, and a fixed, surface micromachined back electrode of electroplated nickel. Over an applied pressure range from 0 to 34 kPa, the net capacitance change was approximately 0.14 pF. An important attribute of this design is that only the steel substrate and the pressure sensor inlet is exposed to the flow; i.e., the sensor is self-packaged.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

A Design of the Remote Test Tool for Software Based on VxWorks (VxWorks 기반 소프트웨어를 위한 원격 테스트 도구의 설계)

  • Park, Song-Hwa;Lee, Hyung-Soo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.3
    • /
    • pp.135-142
    • /
    • 2012
  • The Quality of embedded system depends on the embedded software. As the complexity and the size of embedded software have been increasing, it is more likely that the software may include faults, and the reliability and stability issues are getting more important. In this paper, we propose a remote test tool for software based on VxWorks by using fault injection method. The test tool consists of test server and test client for testing on the cross development environment. The test server operates in the host system and user can not only test but also monitor the software by using it. The test client operates in the target system and it controls kernel objects and sends the input data into the software when receiving the control and data from the test server. We developed the prototype software and demonstrated the ability of testing software robustness by injecting faults.