• Title/Summary/Keyword: online algorithm

Search Result 587, Processing Time 0.032 seconds

A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering (MITM 공격과 리버스 엔지니어링을 이용한 OTP 적용환경의 취약점 연구)

  • Kang, Byung-Tak;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.83-99
    • /
    • 2011
  • OTP (One Time Password) is widely used for protecting accounts on Internet banking, portal services and online game services in Korea. OTP is very strong method for enforcing account security but there are several ways for exploiting vulnerabilities caused by implementation errors. These attacks can work because of the weakness from OTP enabled system's vulnerabilities, not for OTP's algorithm itself. In this paper, we present the known attack scenarios such as MITM (Man-in-the-Middle) attack and various reverse engineering techniques; also, we show the test result of the attacks and countermeasures for these attacks.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

Research Trends in Wi-Fi Performance Improvement in Coexistence Networks with Machine Learning (기계학습을 활용한 이종망에서의 Wi-Fi 성능 개선 연구 동향 분석)

  • Kang, Young-myoung
    • Journal of Platform Technology
    • /
    • v.10 no.3
    • /
    • pp.51-59
    • /
    • 2022
  • Machine learning, which has recently innovatively developed, has become an important technology that can solve various optimization problems. In this paper, we introduce the latest research papers that solve the problem of channel sharing in heterogeneous networks using machine learning, analyze the characteristics of mainstream approaches, and present a guide to future research directions. Existing studies have generally adopted Q-learning since it supports fast learning both on online and offline environment. On the contrary, conventional studies have either not considered various coexistence scenarios or lacked consideration for the location of machine learning controllers that can have a significant impact on network performance. One of the powerful ways to overcome these disadvantages is to selectively use a machine learning algorithm according to changes in network environment based on the logical network architecture for machine learning proposed by ITU.

Particle Swarm Optimization in Gated Recurrent Unit Neural Network for Efficient Workload and Resource Management (효율적인 워크로드 및 리소스 관리를 위한 게이트 순환 신경망 입자군집 최적화)

  • Ullah, Farman;Jadhav, Shivani;Yoon, Su-Kyung;Nah, Jeong Eun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.45-49
    • /
    • 2022
  • The fourth industrial revolution, internet of things, and the expansion of online web services have increased an exponential growth and deployment in the number of cloud data centers (CDC). The cloud is emerging as new paradigm for delivering the Internet-based computing services. Due to the dynamic and non-linear workload and availability of the resources is a critical problem for efficient workload and resource management. In this paper, we propose the particle swarm optimization (PSO) based gated recurrent unit (GRU) neural network for efficient prediction the future value of the CPU and memory usage in the cloud data centers. We investigate the hyper-parameters of the GRU for better model to effectively predict the cloud resources. We use the Google Cluster traces to evaluate the aforementioned PSO-GRU prediction. The experimental shows the effectiveness of the proposed algorithm.

Real-Time Correction Based on wheel Odometry to Improve Pedestrian Tracking Performance in Small Mobile Robot (소형 이동 로봇의 사람 추적 성능 개선을 위한 휠 오도메트리 기반 실시간 보정에 관한 연구)

  • Park, Jaehun;Ahn, Min Sung;Han, Jeakweon
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.2
    • /
    • pp.124-132
    • /
    • 2022
  • With growth in intelligence of mobile robots, interaction with humans is emerging as a very important issue for mobile robots and the pedestrian tracking technique following the designated person is adopted in many cases in a way that interacts with humans. Among the existing multi-object tracking techniques for pedestrian tracking, Simple Online and Realtime Tracking (SORT) is suitable for small mobile robots that require real-time processing while having limited computational performance. However, SORT fails to reflect changes in object detection values caused by the movement of the mobile robot, resulting in poor tracking performance. In order to solve this performance degradation, this paper proposes a more stable pedestrian tracking algorithm by correcting object tracking errors caused by robot movement in real time using wheel odometry information of a mobile robot and dynamically managing the survival period of the tracker that tracks the object. In addition, the experimental results show that the proposed methodology using data collected from actual mobile robots maintains real-time and has improved tracking accuracy with resistance to the movement of the mobile robot.

A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems

  • Su, Haoru;Yuan, Xiaoming;Tang, Yujie;Tian, Rui;Sun, Enchang;Yan, Hairong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4385-4399
    • /
    • 2021
  • The Internet of Things (IoT) eHealth systems composed by Wireless Body Area Network (WBAN) has emerged recently. Sensor nodes are placed around or in the human body to collect physiological data. WBAN has many different applications, for instance health monitoring. Since the limitation of the size of the battery, besides speed, reliability, and accuracy; design of WBAN protocols should consider the energy efficiency and time delay. To solve these problems, this paper adopt the end-edge-cloud orchestrated network architecture and propose a transmission based on reinforcement algorithm. The priority of sensing data is classified according to certain application. System utility function is modeled according to the channel factors, the energy utility, and successful transmission conditions. The optimization problem is mapped to Q-learning model. Following this online power control protocol, the energy level of both the senor to coordinator, and coordinator to edge server can be modified according to the current channel condition. The network performance is evaluated by simulation. The results show that the proposed power control protocol has higher system energy efficiency, delivery ratio, and throughput.

Deep Learning-Based Roundabout Traffic Analysis System Using Unmanned Aerial Vehicle Videos (드론 영상을 이용한 딥러닝 기반 회전 교차로 교통 분석 시스템)

  • Janghoon Lee;Yoonho Hwang;Heejeong Kwon;Ji-Won Choi;Jong Taek Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.3
    • /
    • pp.125-132
    • /
    • 2023
  • Roundabouts have strengths in traffic flow and safety but can present difficulties for inexperienced drivers. Demand to acquire and analyze drone images has increased to enhance a traffic environment allowing drivers to deal with roundabouts easily. In this paper, we propose a roundabout traffic analysis system that detects, tracks, and analyzes vehicles using a deep learning-based object detection model (YOLOv7) in drone images. About 3600 images for object detection model learning and testing were extracted and labeled from 1 hour of drone video. Through training diverse conditions and evaluating the performance of object detection models, we achieved an average precision (AP) of up to 97.2%. In addition, we utilized SORT (Simple Online and Realtime Tracking) and OC-SORT (Observation-Centric SORT), a real-time object tracking algorithm, which resulted in an average MOTA (Multiple Object Tracking Accuracy) of up to 89.2%. By implementing a method for measuring roundabout entry speed, we achieved an accuracy of 94.5%.

Peer to Peer Search Algorithm based on Advanced Multidirectional Processing (개선된 다방향 프로세싱 기반 P2P 검색 알고리즘)

  • Kim, Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.133-139
    • /
    • 2009
  • A P2P technology in distributed computing fields is presented various methods to share resources between network connected peers. This is very efficient that a degree of resources to good use as compared with peers by using centralized network by a few servers. However peers to compose P2P system is not always online status, therefore it is difficult to support high reliability to user. In our previous work of this paper, it is contributing to reduce the loading rates to select of new resource support peer but a selection method the peers to share works to download resources is very simple that it is just selected about peer to have lowest job. In this paper, we reduced frequency offline peers by estimate based on a average value of success rates for peers.

Development of Algorithm for Online Handwriting Hangul Recognition (온라인 한글 필기 인식 알고리즘 개발)

  • Jeong, Dabin;Lee, Kang Eun;Jeong, Min Jin;Moon, Changjin;Kim, Sungsuk;Kim, Jaehyun;Yang, Sun Ok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.1000-1003
    • /
    • 2020
  • 본 논문은 기계학습 기반 온라인 한글 필기 인식 시스템의 첫 구현 결과를 담고 있다. 한글의 글자는 최소한 하나의 모음을 포함하고 있으며, 이 모음은 대개 직선으로 필기한다는 사전 지식을 활용하여 인식에 적용하고자 한다. 이를 위해 사용자가 온라인으로 필기하면 획 데이터를 획득하여 중성에 해당하는 모음을 찾는 알고리즘을 개발하였다. 제안한 알고리즘에서는, 우선 필기한 글자를 포함하는 사각형 R과 각 획을 둘러싸는 사각형 SR을 생성한 후, 직선을 판별하고, 이 직선들이 모음을 구성하는 후보군을 찾는 과정으로 구성되어 있다. 아직 초기 연구이므로, 다양한 경우에 대한 분석이나 실험 결과는 없지만, 이를 활용하여 온라인 필기 인식 모델에 적용하여 인식 성능을 높이기 위한 추후 연구의 기반으로 활용하고자 한다.

Comparative Analysis of Prediction Performance of Aperiodic Time Series Data using LSTM and Bi-LSTM (LSTM과 Bi-LSTM을 사용한 비주기성 시계열 데이터 예측 성능 비교 분석)

  • Ju-Hyung Lee;Jun-Ki Hong
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.217-224
    • /
    • 2022
  • Since online shopping has become common, people can easily buy fashion goods anytime, anywhere. Therefore, consumers quickly respond to various environmental variables such as weather and sales prices. Therefore, utilizing big data for efficient inventory management has become very important in the fashion industry. In this paper, the changes in sales volume of fashion goods due to changes in temperature is analyzed via the proposed big data analysis algorithm by utilizing actual big data from Korean fashion company 'A'. According to the simulation results, it was confirmed that Bidirectional-LSTM(Bi-LSTM) compared to LSTM(Long Short-Term Memory) takes more simulation time about more than 50%, but the prediction accuracy of non-periodic time series data such as clothing product sales data is the same.