• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.022 seconds

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Review on LTE-Advanced Mobile Technology

  • Seo, Dae-woong;Kim, Yoon-Hwan;Song, Jeong-Sang;Jang, Bongseog;Bae, Sang-Hyun
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.197-203
    • /
    • 2018
  • Long Term Evolution-Advanced (LTE-A) is the next drive in the broadband mobile communication, which allows operators to improve networks performance and service capabilities. LTE-A targets the peak data rates of 1Gbps in the downlink and 500Mbps in the uplink. This requirement is only fulfilled by a transmission bandwidth of up to 100MHz. However the accessibility of such large part of the contiguous spectrum is uncommon in practice. Therefore LTE-A uses some new features on top of the existing LTE standards to provide very high data rate transmission. Some of the most significant features introduced in LTE-A are carrier aggregation, heterogeneous network enhancement, coordinated multipoint transmission and reception, enhanced multiple input and multiple output, and development relay nodes with universal frequency reuse. This review paper presents an overview of the above mentioned LTE-A key features and functionalities. Based on this review, in the conclusion we discuss the current technical challenges for future broadband mobile communication systems.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

Dynamic Virtual Organization Management System for Grid Based Information Retrieval Service (그리드 기반 정보검색 서비스를 위한 동적 가상 조직 관리 시스템)

  • Kim, Yang-Woo;Lee, Seung-Ha;Kim, Hyuk-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.1009-1016
    • /
    • 2006
  • Under foundational precepts of Grid computing, two important requirements that all Grid application systems should satisfy are to accommodate the dynamic nature of Virtual Organizations (VOs), and to enforce different levels of security among different VOs. For the research described in this paper, we developed two different use-case scenarios addressing the two requirements, and then showed how the requirements can be met by implementing a Grid information retrieval (GIR) system prototype. The dynamic nature of VO applies not only to increasing and decreasing number of users, but also to the dynamically changing requirement of computing power among the different subcomponents that consist in overall system configuration. This implies that a request to increase computing power by a certain subcomponent can be satisfied by other idling subcomponents taking advantage of overall system flexibility. This paper describes how we implemented a Grid IR system using VO and security mechanisms provided by Globus toolkit 3.0, and shows how GIR system scalability and security can be improved for dynamic VOs. In order to manage different VOs, we implemented VO management service (VOMS), and registered it to Globus as an additional service.

Forward-Secure Public Key Broadcast Encryption (전방향 안전성을 보장하는 공개키 브로드캐스트 암호 기법)

  • Park, Jong-Hwan;Yoon, Seok-Koo
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2008
  • Public Key Broadcast Encryption (PKBE) allows a sender to distribute a message to a changing set of users over an insecure channel. PKBE schemes should be able to dynamically exclude (i.e., revoke) a certain subset of users from decrypting a ciphertext, so that only remaining users can decrypt the ciphertext. Another important requirement is for the scheme to be forward-secrecy. A forward-secure PKBE (fs-PKBE) enables each user to update his private key periodically. This updated private key prevents an adversary from obtain the private key for certain past period, which property is particularly needed for pay-TV systems. In this paper, we present a fs-PKBE scheme where both ciphertexts and private keys are of $O(\sqrt{n})$ size. Our PKBE construction is based on Boneh-Boyen-Goh's hierarchical identity-based encryption scheme. To provide the forward-secrecy with our PKBE scheme, we again use the delegation mechanism for lower level identities, introduced in the BBG scheme. We prove chosen ciphertext security of the proposed scheme under the Bilinear Diffie-Hellman Exponent assumption without random oracles.

'Open Skies' Agreements and Access to the 'Single' European Sky;Legal and Economic Problems with the European Court of Justice's Judgment in 'Commission v. Germany'(2002) Striking Down the 'Nationality Clause' in the U.S.-German Agreement (항공(航空) 자유화(自由化)와 '단일(單一)' 유럽항공시장(航空市場) 접근(接近);유럽사법재판소(司法裁判所)의 미(美) ${\cdot}$ 독(獨) 항공운수협정(航空運輸協定)상 '국적요건(國籍要件)' 조항(條項)의 공동체법(共同體法)상 '내국민대우(內國民待遇)' 규정 위반(違反) 관련 '집행위원회(執行委員會) 대(對) 독일연방(獨逸聯邦)' 사건 판결(判決)(2002)의 문제점을 중심으로)

  • Park, Hyun-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.15 no.1
    • /
    • pp.38-53
    • /
    • 2007
  • In a seminal judgment of November 2002 (Case C-476/98) relating to the compatibility with Community laws of the 'nationality clause' in the 1996 amending protocol to the 1955 U.S.-German Air Services Agreement, the European Court of Justice(ECJ) decided that the provision constituted a measure of an intrinsically discriminatory nature and was thus contrary to the principle of national treatment established under Art. 52 of the EC Treaty. The Court, rejecting bluntly the German government' submissions relying on public policy grounds(Art. 56, EC Treaty), seemed content to declare and rule that the protocol provision requiring a contracting state party to ensure substantial ownership and effective control by its nationals of its designated airlines had violated the requirement of national treatment reserved for other Community Members under the salient Treaty provision. The German counterclaims against the Commission, although tantalizing not only from the perusal of the judgment but from the perspective of international air law, were nonetheless invariably correct and to the point. For such a clause has been justified to defend the 'fundamental interests of society from a serious threat' that may result from granting operating licenses or necessary technical authorizations to an airline company of a third country. Indeed, the nationality clause has been inserted in most of the liberal bilaterals to allow the parties to enforce their own national laws and regulations governing aviation safety and security. Such a clause is not targeted as a device for discriminating against the nationals of any third State. It simply acts as the minimum legal safeguards against aviation risk empowering a party to take legal control of the designated airlines. Unfortunately, the German call for the review of such a foremost objective and rationale underlying the nationality clause landed on the deaf ears of the Court which appeared quite happy not to take stock of the potential implications and consequences in its absence and of the legality under international law of the 'national treatment' requirement of Community laws. Again, while US law limits foreign shareholders to 24.9% of its airlines, the European Community limits non-EC ownership to 49%, precluding any ownership and effective control by foreign nationals of EC airlines, let alone any foreign takeover and merger. Given this, it appears inconsistent and unreasonable for the EC to demand, $vis-{\grave{a}}-vis$ a non-EC third State, national treatment for all of its Member States. The ECJ's decision was also wrongly premised on the precedence of Community laws over international law, and in particular, international air law. It simply is another form of asserting and enforcing de facto extraterritorial application of Community laws to a non-EC third country. Again, the ruling runs counter to an established rule of international law that a treaty does not, as a matter of principle, create either obligations or rights for a third State. Aside from the legal problems, the 'national treatment' may not be economically justified either, in light of the free-rider problem and resulting externalities or inefficiency. On the strength of international law and economics, therefore, airlines of Community Members other than the designated German and U.S. air carriers are neither eligible for traffic rights, nor entitled to operate between or 'free-ride' on the U.S. and German points. All in all and in all fairness, the European Court's ruling was nothing short of an outright condemnation of established rules and principles of international law and international air law. Nor is the national treatment requirement justified by the economic logic of deregulation or liberalization of aviation markets. Nor has the requirement much to do with fair competition and increased efficiency.

  • PDF

A Recognition for community Based Rehabilitation by Public Health Center Physical Therapists in Seoul Province (서울시 보건소 물리치료사들의 지역사회중심재활에 대한 인식)

  • Kim, Chan-Mun;Hong, Wan-Sung;Bae, Sung-Il
    • Journal of Korean Physical Therapy Science
    • /
    • v.5 no.1
    • /
    • pp.549-556
    • /
    • 1998
  • To survey the recognition of Community Based Rehabilitation(CBR) by Public Health Center(PHC) Physical Therapists in Seoul Province. This study analysed general characteristic of Physical Therapists and cognition, participation, education, problems and requirements for CBR. The subjects of this study were 31 therapists who work at PHC in Seoul Province and Seoul City Childerns Municipal Hospital. Data was collected for 18 days from April 13 to 31, 1998 and results computed from 25 responses. First, Female therapists outnumber males. The age category 30 to 35 old represented 44.0% of the total number studied. 48.0% of therapists had worked more than 7 years and therapists usually 84.0% worked from 3 to 4 years at the PHC. Junior colleage graduates were 72.0%, and respondents with family responsibility were 52.0%. Second, Recently pain control and therapeutic exercises has become the major requirement of patients at PHC(56.0%). If the offered expanded services, a rehabilitation programe at PHC(36.0%) was highly. When asked about a working guide book, nobody had one. Third, 64.0% of therapists were aware of the present level of CBR, 28.0% of them had gotten an information from newspaper and mass media. Fourth, For CBR, 72.0% had positive ideas in which they could participate. 56.0% wished to compose a team of various rehabilitation specialists. 52.0% wished for the meeting day to be flexible and 64.0% desired to meet once or twice a week. Fifth, Almost all(92.0%) desired more educational opportunity about CBR. Example, once or twice a year(48.0%) and training period of 4 to 7 day(44.0%). They wanted to learn theory and parctice together(88.0%) and 48.0% wanted national mutirehabilitation center as a educational managing organization. Sixth, The most important requirement for accomplishing CBR by Physical Therapists was job security and adequate number of therapists(48.0%). Required number of physical therapists in the PHC was 3(52.0%). The cooperative agency should be the distict govement(32.0%) and community welfare center of the disabled persons(32.0%). Factors inhibiting the execution of CBR were lack of physical therapists(56.0%), and equipments for pain control and for therapeutic exercises(68.0%).

  • PDF

A Study on Methods of the use of Coastal Station for the Analysis of Marine Contamination - Focusing on Busan Coastal Sea Area - (해양오염도 분석을 위한 연안 정점 데이터의 활용방안에 관한 연구 - 부산연안해역을 중심으로 -)

  • Hwang, Jin-Wook;Kim, Ho-Yong;Lee, Sung-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.71-80
    • /
    • 2006
  • The land area, which is on the inner side of the water line, is controlled to a certain degree due to the purposes of space utilities controllers' respective roles, but the sea area is not so much controlled as the land area. However, as interest in the security and utility of the marine space, as well as that in the consistent development of the land space, has increased, there has been increase of the requirement for information about marine data and environment. The object of this study, Busan, plays various roles such as a harbor and bay, a tourist resort, and a port unlike coastal seas of other areas, and thus needs systematic control because it has numerous environmental factors. However, there are limitations in the number of data about Busan coastal sea constantly provided while the acquisition of data from main points and many areas is important for the analysis of marine contamination in Busan coastal sea area. Thus, using nautical charts with numerical values in preparing increase of the demand of them according to the degree of information requirement for the analysis of the changes in coastal areas, this study constructs property data and space data by combining vertex data about Busan's 17 coastal sea areas provided by NFRDI, and tries to present the analytical techniques for grasping the environmental conditions and continuity of the coastal areas and methods of their utilities, using GIS Geostatistical Analysis Technique.

  • PDF

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Review of Consultation Requirements Under Military Air Base Law (군용 항공기지법상의 협의제도에 대한 법적고찰)

  • Lee, Kwan-Hyoung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.385-444
    • /
    • 2003
  • Current Military Airbase Law, in an effort to promote safety of military aircraft and security of military airbase, requires an administrative agency or its empowered branch to consult with the Secretary of Defense or the commander of the airbase before they issue a certain administrative approval or decision related to the installation. Although this consultation process purports itself in simplifying what can be an protracted administrative procedure, and in unifying objectives of the military and the administrative services, such procedural requirement is vulnerable inevitability of various legal problems whenever there is a conflict of interests among civil, military, government services. Nor is there sufficient studies done by academian in the area of bureaucratic issues of administrative resolution, and certainly not in the area of the military consultation procedure. This article, with such reality in mind attempts to constructively examine 1) when a consultation application is submitted, whether the discretionary power of the commander of the affected airbase is acknowledged at the outset; 2) if the content of the consultation is deemed unlawful, whether a civilian can institute an administrative lawsuit against it; 3) problems about the subject matters of the consultation requirement within the framework of military airbase law; 4) whether the issuing administrative agency must abide by and issue approval or decision in accordance with the opinion proposed by the said commander; 5) the legal problems of the remedial measure such as an order of removal, appellate review, notion to challenge authority, and etc. in cases such as administrative agency ignoring the commanders proposal or issuing final approval or decision that is inconsistent with what was consulted and agreed upon between both parties.

  • PDF