• Title/Summary/Keyword: host-based

Search Result 1,640, Processing Time 0.032 seconds

Access Control using Secured Container-based Virtualization (보안 컨테이너 가상화 기반 접근 제어)

  • Jeong, Dong-hwa;Lee, Sunggyu;Shin, Youngsang;Park, Hyuncheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.330-334
    • /
    • 2017
  • Container-based virtualization reduces performance overhead compared with other virtualization technologies and guarantees an isolation of each virtual execution environment. So, it is being studied to block access to host resources or container resources for sandboxing in restricted system resource like embedded devices. However, because security threats which are caused by security vulnerabilities of the host OS or the security issues of the host environment exist, the needs of the technology to prevent an illegal accesses and unauthorized behaviors by malware has to be increased. In this paper, we define additional access permissions to access a virtual execution environment newly and control them in kernel space to protect attacks from illegal access and unauthorized behaviors by malware and suggest the Container Access Control to control them. Also, we suggest a way to block a loading of unauthenticated kernel driver to disable the Container Access Control running in host OS by malware. We implement and verify proposed technologies on Linux Kernel.

  • PDF

A Study on the Performance of Multicast Transmission Protocol using FEC Method and Local Recovery Method based on Receiver in Mobile Host (이동 호스트에서 FEC기법과 수신자 기반 지역복극 방식의 멀티캐스트 전송 프로토콜 연구)

  • 김회옥;위승정;이웅기
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.68-76
    • /
    • 2002
  • Multicast in mobile host has the problem of hast mobility, multicast decision, triangle routing, tunnel convergence, implosion of retransmission, and bandwidth waste. In particular, the bandwidth waste in radio is a definite factor that decreases transmission rate. To solve the problems, this paper proposes a new multicast transmission protocol called FIM(Forward Error Correction Integrated Multicast), which supports reliable packet recovery mechanism by integrating If Mobility Support for the host mobility, IGMP(Interned Group Management Protocol) for the group management, and DVMRP(Distance Vector Multicast Routing Protocol) for the multicast routing, and it also uses FEC and the local recovery method based on receiver. The performance measurement is performed by dividing the losses into the homogeneous independent loss, the heterogeneous independent loss, and the shared source link loss model.. The result shows that the performances improves in proportion to the size of local areal group when the size of transmission group exceeds designated size. This indicates FIM is effective in the environment where there are much of data and many receivers in the mobile host.

  • PDF

Re-identification of Colletotrichum gloeosporioides Species Complex Isolates in Korea and Their Host Plants

  • Le Dinh Thao;Hyorim Choi;Yunhee, Choi;Anbazhagan Mageswari;Daseul Lee;Dong-Hyun Kim;Hyeon-Dong Shin;Hyowon Choi;Ho-Jong Ju;Seung-Beom Hong
    • The Plant Pathology Journal
    • /
    • v.40 no.1
    • /
    • pp.16-29
    • /
    • 2024
  • The Colletotrichum gloeosporioides species complex includes many phytopathogenic species, causing anthracnose disease on a wide range of host plants and appearing to be globally distributed. Seventy-one Colletotrichum isolates in the complex from different plants and geographic regions in Korea were preserved in the Korean Agricultural Culture Collection (KACC). Most of them had been identified based on hosts and morphological features, this could lead to inaccurate species names. Therefore, the KACC isolates were re-identified using DNA sequence analyses of six loci, comprising internal transcribed spacer, gapdh, chs-1, his3, act, and tub2 in this study. Based on the combined phylogenetic analysis, KACC strains were assigned to 12 known species and three new species candidates. The detected species are C. siamense (n = 20), C. fructicola (n = 19), C. gloeosporioides (n = 9), C. aenigma (n = 5), C. camelliae (n = 3), C. temperatum (n = 3), C. musae (n = 2), C. theobromicola (n = 2), C. viniferum (n = 2), C. alatae (n = 1), C. jiangxiense (n = 1), and C. yulongense (n = 1). Of these, C. jiangxiense, C. temperatum, C. theobromicola and C. yulongense are unrecorded species in Korea. Host plant comparisons showed that 27 fungus-host associations are newly reported in the country. However, plant-fungus interactions need to be investigated by pathogenicity tests.

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.

Comparison of HMM and SVM schemes in detecting mobile Botnet (모바일 봇넷 탐지를 위한 HMM과 SVM 기법의 비교)

  • Choi, Byungha;Cho, Kyungsan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.4
    • /
    • pp.81-90
    • /
    • 2014
  • As mobile devices have become widely used and developed, PC based malwares can be moving towards mobile-based units. In particular, mobile Botnet reuses powerful malicious behavior of PC-based Botnet or add new malicious techniques. Different from existing PC-based Botnet detection schemes, mobile Botnet detection schemes are generally host-based. It is because mobile Botnet has various attack vectors and it is difficult to inspect all the attack vector at the same time. In this paper, to overcome limitations of host-based scheme, we compare two network-based schemes which detect mobile Botnet by applying HMM and SVM techniques. Through the verification analysis under real Botnet attacks, we present detection rates and detection properties of two schemes.

The Influence of the Relationship between Consumer and Tie-in Promotion on Loyalty: Focusing on the Difference between Target Customers and Non-target Customers of Tie-in Promotion

  • Lee, Eun Mi;Park, Hyun Hee;Jeon, Jung Ok
    • Asia Marketing Journal
    • /
    • v.16 no.2
    • /
    • pp.39-57
    • /
    • 2014
  • There has been recognition of the increasing importance of cooperation as an element of marketing strategy. Such cooperation is confined to four levels based on product development, sales promotion, pricing arrangements, and place (or distribution) mechanisms as the usual marketing 4Ps mixed (Varadarajan 1986). At present, however, little is known about the nature of tie-in promotion as a cooperative sales promotion comparing three other levels. The primary goal of this study is to examine the effect of consumer - tie-in promotion relationship on loyalty. The construct of consumer - tie-in promotion relationship is based on the previous research on consumer-brand relationship. In addition, this study divides the concept of loyalty into host brand loyalty and partner brand loyalty to reflect the characteristics of tie-in promotion including program in order to determine the effect of the consumer - tie-in promotion relationship on loyalty. The results showed that the three dimensions of the consumer - tie-in promotion relationship (i.e., commitment, intimacy, and interdependence) had significantly positive effect on program loyalty. The effect of program loyalty is significantly on both host and partner brand loyalty. This study empirically tested the relationships among consumer - tie-in promotion relationship, program loyalty, host brand loyalty, and partner brand loyalty, and then compared with the difference in the suggested model for the target customers and non-target customers. As a result, for target customers, intimacy and interdependence among dimensions of consumer - tie-in promotion relationship had significantly positive influence on program loyalty. In case of non-target customers, however, commitment and interdependence among dimensions of consumer - tie-in promotion relationship had significantly positive influence on program loyalty. Also, program loyalty had significantly positive impact on host brand loyalty and partner brand loyalty in both target and non-target customers. This study has significance in that it addresses the need to identify research and academic implications by analyzing the consumer - tie-in promotion relationship to determine the relationship between tie-in promotion and loyalty, which has not been clearly described by previous studies. Furthermore, this study builds a foundation for firms and managers actively using tie-in promotion to establish tie-in promotion strategies that can maximize loyalty for both host and partner brands from the consumers' point of view.

  • PDF

EVOLUTION OF LUMINOUS INFRARED GALAXIES REVEALED BY NEAR-INFRARED MULTI-BAND IMAGING OF THEIR HOSTS

  • Oi, Nagisa;Imanishi, Masatoshi
    • Publications of The Korean Astronomical Society
    • /
    • v.27 no.4
    • /
    • pp.301-303
    • /
    • 2012
  • We present the result of our near infrared J- (${\lambda}=1.25{\mu}m$), H- (${\lambda}=1.63{\mu}m$), and $K_s$-band (${\lambda}=2.14{\mu}m$) imaging of ultraluminous ($L_{IR}$ > $10^{12}L_{\odot}$) and luminous ($L_{IR}=10^{11-12}L_{\odot}$) infrared galaxies (ULIRGs and LIRGs), to investigate their relationship through properties of their host galaxies. We find that (1) for single-nucleus ULIRGs and LIRGs, their spheroidal host galaxies have similar properties, but ULIRGs display a substantially higher level of nuclear activity than LIRGs, suggesting that their infrared luminosity difference comes primarily from the different level of current nuclear activity. We infer that LIRGs and ULIRGs have similar progenitor galaxies, follow similar evolutionary processes, and may evolve into optically-selected QSOs. (2) Largely-separated multiple-nuclei ULIRGs have significantly brighter host galaxies than single-nucleus ULIRGs and LIRGs in $K_s$-band, indicating that multiple-nuclei ULIRGs have a bias towards mergers of intrinsically large progenitor galaxies, in order to produce high infrared luminosity ($L_{IR}$ > $10^{12}L_{\odot}$) even at the early merging stage. (3) We derive dust extinction of host galaxies of ULIRGs and LIRGs to be $A_V$ ~ 14 mag in the optical or equivalently $A_K$ ~ 0.8 mag in the near-infrared $K_s$-band, based on the comparison of host galaxy's luminosities in the J-, H-, and $K_s$-bands.

Diversity of Bacteriophages Infecting Xanthomonas oryzae pv. oryzae in Paddy Fields and Its Potential to Control Bacterial Leaf Blight of Rice

  • Chae, Jong-Chan;Nguyen, Bao Hung;Yu, Sang-Mi;Lee, Ha Kyung;Lee, Yong Hoon
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.6
    • /
    • pp.740-747
    • /
    • 2014
  • Bacterial leaf blight (BLB) caused by Xanthomonas oryzae pv. oryzae (Xoo) is a very serious disease in rice-growing regions of the world. In spite of their economic importance, there are no effective ways of protecting rice plants from this disease. Bacteriophages infecting Xoo affect the population dynamics of the pathogen and consequently the occurrence of the disease. In this study, we investigated the diversity, host range, and infectivity of Xoo phages, and their use as a bicontrol agent on BLB was tested. Among the 34 phages that were isolated from floodwater in paddy fields, 29 belonged to the Myoviridae family, which suggests that the dominant phage in the ecosystem was Myoviridae. The isolated phages were classified into two groups based on plaque size produced on the lawn of Xoo. In general, there was a negative relationship between plaque size and host range, and interestingly the phages having a narrow host range had low efficiency of infectivity. The deduced protein sequence analysis of htf genes indicated that the gene was not a determinant of host specificity. Although the difference in host range and infectivity depending on morphotype needs to be addressed, the results revealed deeper understanding of the interaction between the phages and Xoo strains in floodwater and damp soil environments. The phage mixtures reduced the occurrence of BLB when they were treated with skim milk. The results indicate that the Xoo phages could be used as an alternative control method to increase the control efficacy and reduce the use of agrochemicals.

Proteome Changes in Penicillium expansum Grown in a Medium Derived from Host Plant

  • Xia, Xiaoshuang;Li, Huan;Liu, Fei;Zhang, Ye;Zhang, Qi;Wang, Yun;Li, Peiwu
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.3
    • /
    • pp.624-632
    • /
    • 2017
  • Penicillium expansum causes blue mold rot, a prevalent postharvest disease of pome fruit, and is also the main producer of the patulin. However, knowledge on the molecular mechanisms involved in this pathogen-host interaction remains largely unknown. In this work, a two-dimensional gel electrophoresis-based proteomic approach was applied to probe changes in P. expansum 3.3703 cultivated in apple juice medium, which was used to mimic the in planta condition. The results showed that the pH value and reducing sugar content in the apple juice medium decreased whereas the patulin content increased with the growing of P. expansum. A total of 28 protein spots that were up-regulated in P. expansum when grown in apple juice medium were identified. Functional categorization revealed that the identified proteins were mainly related to carbohydrate metabolism, secondary metabolism, protein biosynthesis or degradation, and redox homeostasis. Remarkably, several induced proteins, including glucose dehydrogenase, galactose oxidase, and FAD-binding monooxygenase, which might be responsible for the observed medium acidification and patulin production, were also detected. Overall, the experimental results provide a comprehensive interpretation of the physiological and proteomic responses of P. expansum to the host plant environment, and future functional characterization of the identified proteins will deepen our understanding of fungi-host interactions.

A Study on the Validity of Host Call Service in the Family Restaurant using Fishbein Model (Fishbein 모델을 이용한 패밀리 레스토랑의 호스트 호명제 서비스 타당성에 대한 연구)

  • Seo Kwang-Kyu;Ahn Beum-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.753-758
    • /
    • 2006
  • The recent drastic increase of imported foreign restaurants provided the importance of service quality and the customer satisfaction is considered as the most important factors for the business activity. In order to identify the important factors for the customer satisfaction of the family restaurant in Korea, we attempt to test the validity of host call service as a significant variable in the family restaurant using Fishbein behaviour model. Based on literature review, the empirical study was conducted using the questionnaires for customers of the family restaurant in Seoul. Descriptive statistics, t-test, F-test and regression analysis were made of the gathered questionnaires using SPSS programs. The results shows that four hypotheses established in this study were significant. Therefore, host call service in the family restaurant should be introduced to increase the customer satisfaction. In conclusion, it proved that host call service in the family were the important factors that could satisfy the customers and the family restaurants will have to make a great effort to develop the differentiated service so as to enhance their competitiveness.

  • PDF