• Title/Summary/Keyword: high-speed Internet

Search Result 832, Processing Time 0.03 seconds

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Design and Implementation of the Menu Navigation using Social Network Analysis among the Menus of Management Information System (사회연결망분석을 이용한 경영정보시스템 화면들의 메뉴 네비게이션 설계 및 구현)

  • Lee, Min-Jung;Kim, Jun-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.151-160
    • /
    • 2014
  • Recently enterprises, which posses high-speed internet and high-performance computers, have tried to use MIS(management information systems) to deal with whole task efficiently. This study considers design of menu navigation using SNA(social network analysis) to be able to move between menus of MIS efficiently. We extracted the important menu lists through the high SNA measures such as degree centrality, betweenness centrality and closeness centrality, developed web-pages and investigated its application. The findings will be used for design of web menu navigation and guide of strategic planning for MIS.

A Study on an WiBro and WiFi Interworking Architecture design and performance analysis for Service Continuity (서비스 연속성 지원을 위한 WiBro-WiFi 상호연동 아키텍쳐 설계 및 성능 분석에 관한 연구)

  • Mok, Kyungyul;Lee, Gowoon;Joh, Hangki;Ryoo, Intae
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.471-479
    • /
    • 2013
  • WiBro technology provide mobile devices with a transmission speed of more than 1 Mbps even under the condition of high mobility (120 km/h). In a building, however, there is more demand for high bandwidth for various activities, and WiBro services may not be available. In order to guaranteeing a seamless service continuity and high transmission capability for mobile users within a specific establishment that has deployed WiBro network, we should secure an internetworking platform for WiBro and WiFi networks. This paper introduces WiMax forum and 3GPP standards, proposes WiBro-WiFi Interworking (WWI) architecture, its implementation details, and finally verifies validity of the proposal by using OPNet simulations.

Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System (SNMP 기반의 실시간 트래픽 폭주 공격 탐지 시스템 설계 및 구현)

  • Park, Jun-Sang;Kim, Sung-Yun;Park, Dai-Hee;Choi, Mi-Jung;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.13-20
    • /
    • 2009
  • Recently, as traffic flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network traffic. In this paper we propose an SNMP-based lightweight and fast detection algorithm for traffic flooding attacks, which minimizes the processing and network overhead of the detection system, minimizes the detection time, and provides high detection rate. The attack detection algorithm consists of three consecutive stages. The first stage determines the detection timing using the update interval of SNMP MIB. The second stage analyzes attack symptoms based on correlations of MIB data. The third stage determines whether an attack occurs or not and figure out the attack type in case of attack.

Photo-Transistors Based on Bulk-Heterojunction Organic Semiconductors for Underwater Visible-Light Communications (가시광 수중 무선통신을 위한 이종접합 유기물 반도체 기반 고감도 포토트랜지스터 연구)

  • Jeong-Min Lee;Sung Yong Seo;Young Soo Lim;Kang-Jun Baeg
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.36 no.2
    • /
    • pp.143-150
    • /
    • 2023
  • Underwater wireless communication is a challenging issue for realizing the smart aqua-farm and various marine activities for exploring the ocean and environmental monitoring. In comparison to acoustic and radio frequency technologies, the visible light communication is the most promising method to transmit data with a higher speed in complex underwater environments. To send data at a speedier rate, high-performance photodetectors are essentially required to receive blue and/or cyan-blue light that are transmitted from the light sources in a light-fidelity (Li-Fi) system. Here, we fabricated high-performance organic phototransistors (OPTs) based on P-type donor polymer (PTO2) and N-type acceptor small molecule (IT-4F) blend semiconductors. Bulk-heterojunction (BHJ) PTO2:IT-4F photo-active layer has a broad absorption spectrum in the range of 450~550 nm wavelength. Solution-processed OPTs showed a high photo-responsivity >1,000 mA/W, a large photo-sensitivity >103, a fast response time, and reproducible light-On/Off switching characteristics even under a weak incident light. BHJ organic semiconductors absorbed photons and generated excitons, and efficiently dissociated to electron and hole carriers at the donor-acceptor interface. Printed and flexible OPTs can be widely used as Li-Fi receivers and image sensors for underwater communication and underwater internet of things (UIoTs).

The Transmission of Tele-Information System using BlueTooth (블루투스를 이용한 웹으로의 원격 의료정보 전송 시스템)

  • 채희영;강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.130-133
    • /
    • 2002
  • As a society advances, an aging phenomenon and many diseases which did not exist in old times are happening. Especially, in case of the aged patient, because we cant know the time the condition of the patients health become worse, the study of the Tele-information system has been actively carried out by the necessity of a persistent observation. A ECG signal a kind of a vital signals has been widely used to the medical information system as an usual clinical diagnosis for the patients who possess heart diseases. BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self - error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, It will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present According to this, Bluetooth module transmits the medical information, which is input from the outside among the operations that use the Bluetooth to the Bluetooth module that is connected the host PC. And the system that the host PC transmits the medical information from the connected Bluetooth module to the Internet has once embedded. this study let the host PC embedded in advance of the existing system and transmit the medical information by the addition of the Tcp/Ip protocol stark under all embedded environments to internet.

  • PDF

An Efficient Dual Queue Strategy for Improving Storage System Response Times (저장시스템의 응답 시간 개선을 위한 효율적인 이중 큐 전략)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • Recent advances in large-scale data processing technologies such as big data, cloud computing, and artificial intelligence have increased the demand for high-performance storage devices in data centers and enterprise environments. In particular, the fast data response speed of storage devices is a key factor that determines the overall system performance. Solid state drives (SSDs) based on the Non-Volatile Memory Express (NVMe) interface are gaining traction, but new bottlenecks are emerging in the process of handling large data input and output requests from multiple hosts simultaneously. SSDs typically process host requests by sequentially stacking them in an internal queue. When long transfer length requests are processed first, shorter requests wait longer, increasing the average response time. To solve this problem, data transfer timeout and data partitioning methods have been proposed, but they do not provide a fundamental solution. In this paper, we propose a dual queue based scheduling scheme (DQBS), which manages the data transfer order based on the request order in one queue and the transfer length in the other queue. Then, the request time and transmission length are comprehensively considered to determine the efficient data transmission order. This enables the balanced processing of long and short requests, thus reducing the overall average response time. The simulation results show that the proposed method outperforms the existing sequential processing method. This study presents a scheduling technique that maximizes data transfer efficiency in a high-performance SSD environment, which is expected to contribute to the development of next-generation high-performance storage systems

The QoS guaranteed seamless mobile multicast handover mechanism using probing based CAC and PMIPv6 (Probing 기반 수락제어와 PMIPv6를 이용한 품질보장 Seamless 모바일 멀티캐스트 핸드오버 메커니즘)

  • Kang, Hyun-Myoung;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1018-1033
    • /
    • 2010
  • Recently, as the use of mobile terminal is generalized, the needs of high-speed Internet mobile service is increased. Also users want to receive the multimedia contents what they want through the various terminals in anywhere, anytime via wired and wireless integrated environment. Therefore, various mechanisms that support the mobility are proposed. However, these mechanisms are difficult to support seamless mobility and QoS awareness on the mobile multicast environment. In this paper, we propose a QoS aware handover mechanism that is able to provide the high-quality and real-time services such as mobile IPTV in an integrated environment for these requests of users. Proposed mechanism manages the multicast admission control and multicast handover using the 2-layer multicast information management at the wired and wireless integrated network that extended the service guaranteed methods through the probing based admission control of the wired network to the wireless network based on PMIPv6. We present a performance evaluation results and features analyzed by the simulations using the ㎱-2.

Methods of High-speed Data Copy and Key Performance Indicator Enhancement for Minimizing the Transfer Delay in the Public Safety Push-To-Talk Service (Push-To-Talk 재난 서비스 환경에서 전송 지연 최소화를 위한 고속 데이터 복사 및 키 성능 지표 개선 방안)

  • Chae, Yongdoo;Choi, Youknow;Jeong, Wooseok;Nam, Baeksan;Kim, Juyeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1481-1489
    • /
    • 2016
  • A art from the typical data services based on 1:1 data communications, various new services based on 1:N communications have recently appeared. These services are becoming to require advanced 1:N communication schemes which can transfer the same data to many receivers efficiently and in high-performance. Especially, a Push-To-Talk (PTT) service, which is an important service in public safety communication system, requires a service server to disseminate the same voice media data to multiple receivers in a group in real-time and low latency. In this paper, we propose an efficient scheme to disseminate the same data to multiple receivers in low latency. In addition, we provide an analysis which gives a guide the performance of the 1:N communications in practical wired/wireless system environments in the perspective of the PTT service index.

CBT/Anycast Routing Strategy for The Distribution of MMORPG Traffic (MMORPG 트래픽의 분산을 위한 CBT/Anycast 라우팅 전략)

  • Jurng, Jin-Tae;Lee, Kwang-Jae
    • Journal of Korea Game Society
    • /
    • v.4 no.4
    • /
    • pp.3-9
    • /
    • 2004
  • Expansion of internet and construction of high speed network which require multimedia services like MMORPG are exceeding the infra-structure. In this work, CBT is analyzed by focusing on the multicast routing protoco and the algorithm which is transformable to Anycast scheme from CBT scheme is suggested to adapt game traffic. Anycast routing scheme is suitable to distribute high density traffic. Simulation model was set per a number of group and group member, which enabled to reflect real environments. Performance evaluation of routing based on the characteristics of end-to-end delay of CBT and Anycast was mainly focused, The result showed that Anycast method was improved up 8.7%, 25.5%, 34.0%, 38.6% and 51.8%, 56.6% comparing with PIM-DM and CBT routing when packet site was 128, 512 and 1K byte respectively. From the simulation, CBT/Anycast routing scheme can be presented as a flexible and solid solution for the MMORPG traffic to improve the delay characteristics of game packets.

  • PDF