• Title/Summary/Keyword: Signature Patterns

Search Result 69, Processing Time 0.025 seconds

Microarray Data Retrieval Using Fuzzy Signature Sets (퍼지 시그너쳐 집합을 이용한 마이크로어레이 데이터 검색)

  • Lee, Sun-A;Lee, Keon-Myung;Ryu, Keun-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.545-549
    • /
    • 2009
  • Microarray data sets could contain thousands of gene expression levels and have been considered as an important source from which meaningful patterns could be extracted for further analysis in biological studies. It is sometimes necessary to retrieve out specific genes or samples of analyst's interest in an effective way. This paper is concerned with a method to make use of fuzzy signature set in order to filter out genes or samples which satisfy complicated constraints as well as simple ones. Fuzzy signatures are an extension of vector valued fuzzy sets, in which elements of the vector are allowed to have a vector. Fuzzy signature sets are similar to fuzzy signatures except that their leaf elements are fuzzy sets defined on the interval [0,1]. This paper introduces an extension of fuzzy signature sets which specifies aggregation operators at each internal node and comparison operators for aggregation. It also shows how to use the extended fuzzy signature sets in microarray data retrieval and some examples of its usage.

A Development of Malware Detection Tool based on Signature Patterns (시그너처 패턴기반의 악성코드 탐색도구의 개발)

  • Woo Chong-Woo;Ha Kyoung-Hui
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.127-136
    • /
    • 2005
  • Recently, the damages occurring from the malware are increasing rapidly, regardless of continuous development of commercial vaccines . Generally, the vaccine detects well-known malware effectively, but it becomes helpless without any information against the unknown ones. Also, the malware generates its variations fast enough, so that the vaccine always gets behind in its updates. In this paper, we are describing a design and development of malware detection tool, which can detect such malware effectively. We first analyze the general functionality of the malware, and then extracts specific signatures. Such that, we can actively cope with a malware, which may come in previous type, a new type, and any of its mutations also.

  • PDF

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

Time-Frequency Analysis of Broadband Acoustic Scattering from Chub Mackerel Scomber japonicus, Goldeye Rockfish Sebastes thompsoni, and Fat Greenling Hexagrammos otakii (고등어(Scomber japonicus), 불볼락(Sebastes thompsoni) 및 쥐노래미(Hexagrammos otakii)에 의한 광대역 음향산란신호의 시간-주파수 분석)

  • Lee, Dae-Jae
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.48 no.2
    • /
    • pp.221-232
    • /
    • 2015
  • Broadband echoes measured in live chub mackerel Scomber japonicus, goldeye rockfish Sebastes thompsoni, and fat greenling Hexagrammos otakii with different morphologies and internal characteristics were analyzed in time and frequency domains to understand the species-specific echo feature characteristics for classifying fish species. The mean echo image for each time-frequency representation dataset obtained as a function of orientation angle was extracted to mitigate the effect of fish orientation on acoustic scattering. The joint time-frequency content of the broadband echo signals was obtained using the smoothed pseudo-Wigner-Ville distribution (SPWVD). The SPWVDs were analyzed for each echo signature of the three fish species. The results show that the time-frequency analysis provided species-specific echo structure patterns and metrics of the broadband acoustic signals to facilitate fish species classification.

A Unique Gene Expression Signature of 5-fluorouracil

  • Kim, Ja-Eun;Yoo, Chang-Hyuk;Park, Dong-Yoon;Lee, Han-Yong;Yoon, Jeong-Ho;Kim, Se-Nyun
    • Molecular & Cellular Toxicology
    • /
    • v.1 no.4
    • /
    • pp.248-255
    • /
    • 2005
  • To understand the response of cancer cells to anticancer drugs at the gene expression level, we examined the gene expression changes in response to five anticancer drugs, 5-fluorouracil, cytarabine, cisplatin, paclitaxel, and cytochalasin D in NCI-H460 human lung cancer cells. Of the five drugs, 5-fluorouracil had the most distinctive gene expression signature. By clustering genes whose expression changed significantly, we identified three clusters with unique gene expression patterns. The first cluster reflected the up-regulation of gene expression by cisplatin, and included genes involved in cell death and DNA repair. The second cluster pointed to a general reduction of gene expression by most of the anticancer drugs tested. A number of genes in this cluster are involved in signal transduction that is important for communication between cells and reception of extracellular signals. The last cluster represented reduced gene expression in response to 5-fluorouracil, the genes involved being implicated in DNA metabolism, the cell cycle, and RNA processing. Since the gene expression signature of 5-fluorouracil was unique, we investigated it in more detail. Significance analysis of microarray data (SAM) identified 808 genes whose expression was significantly altered by 5-fluorouracil. Among the up-regulated genes, those affecting apoptosis were the most noteworthy. The down-regulated genes were mainly associated with transcription-and translation-related processes which are known targets of 5-fluorouracil. These results suggest that the gene expression signature of an anticancer drug is closely related to its physiological action and the response of caner cells.

A pictorial review of signature patterns living in musculoskeletal ultrasonography

  • Kim, Su Young;Cheon, Ji Hyun;Seo, Won Jun;Yang, Geun Young;Choi, Yun Mi;Kim, Kyung Hoon
    • The Korean Journal of Pain
    • /
    • v.29 no.4
    • /
    • pp.217-228
    • /
    • 2016
  • The musculoskeletal system is mainly composed of the bones, muscles, tendons, and ligaments, in addition to nerves and blood vessels. The greatest difficulty in an ultrasonographic freeze-frame created by the examiner is recognition of the targeted structures without indicators, since an elephant's trunk may not be easily distinguished from its leg. It is not difficult to find descriptive ultrasonographic terms used for educational purposes, which help in distinguishing features of these structures either in a normal or abnormal anatomic condition. However, the terms sometimes create confusion when describing common objects, for example, in Western countries, pears have a triangular shape, but in Asia they are round. Skilled experts in musculoskeletal ultrasound have tried to express certain distinguishing features of anatomic landmarks using terms taken from everyday objects which may be reminiscent of that particular feature. This pictorial review introduces known signature patterns of distinguishing features in musculoskeletal ultrasound in a normal or abnormal condition, and may stir the beginners' interest to play a treasure-hunt game among unfamiliar images within a boundless ocean.

The Design and Implementation of High Performance Intrusion Prevention Algorithm based on Signature Hashing (시그너처 해싱 기반 고성능 침입방지 알고리즘 설계 및 구현)

  • Wang, Jeong-Seok;Jung, Yun-Jae;Kwon, H-Uing;Chung, Kyu-Sik;Kwak, Hu-Keun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.209-220
    • /
    • 2007
  • IPS(Intrusion Prevention Systems), which is installed in inline mode in a network, protects network from outside attacks by inspecting the incoming/outgoing packets and sessions, and dropping the packet or closing the sessions if an attack is detected in the packet. In the signature based filtering, the payload of a packet passing through IPS is matched with some attack patterns called signatures and dropped if matched. As the number of signatures increases, the time required for the pattern matching for a packet increases accordingly so that it becomes difficult to develop a high performance US working without packet delay. In this paper, we propose a high performance IPS based on signature hashing to make the pattern matching time independent of the number of signatures. We implemented the proposed scheme in a Linux kernel module in a PC and tested it using worm generator, packet generator and network performance measure instrument called smart bit. Experimental results show that the performance of existing method is degraded as the number of signatures increases whereas the performance of the proposed scheme is not degraded.

An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems (실시간 네트워크 침입탐지 시스템을 위한 아웃라이어 클러스터 검출 기법)

  • Chang, Jae-Young;Park, Jong-Myoung;Kim, Han-Joon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2007
  • Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.

  • PDF

A Malware Variants Detection Method based on Behavior Similarity (행위 유사도 기반 변종 악성코드 탐지 방법)

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.25-32
    • /
    • 2019
  • While the development of the Internet has made information more accessible, this also has provided a variety of intrusion paths for malicious programs. Traditional Signature-based malware-detectors cannot identify new malware. Although Dynamic Analysis may analyze new malware that the Signature cannot do, it still is inefficient for detecting variants while most of the behaviors are similar. In this paper, we propose a detection method using behavioral similarity with existing malicious codes, assuming that they have parallel patterns. The proposed method is to extract the behavior targets common to variants and detect programs that have similar targets. Here, we verified behavioral similarities between variants through the conducted experiments with 1,000 malicious codes.

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.