• Title/Summary/Keyword: suspicious data

검색결과 105건 처리시간 0.021초

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제5권2호
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Intelligent Anti-Money Laundering Systems Development for the Korea Financial Intelligence Unit

  • Shin Kyung-Shik;Kim Hyun-Jung;Lee In-Ho;Kim Hyo-Sin;Kim Jae-Sik
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2006년도 춘계학술대회
    • /
    • pp.294-300
    • /
    • 2006
  • This case study shows constructing the knowledge-based system using a rule-based approach for detecting transactions regarding money laundering in the Korea Financial Intelligence Unit (KoFIU). To better manage the explosive increment of low risk suspicious transactions reporting from financial institutions and to conjugate data converged into the KoFIU from various organizations, the adoption of a knowledge-based system is definitely required. We designed and constructed the knowledge-based system for anti-money laundering by committing experts of each specific financial industry co-worked with a knowledge engineer. The outcome of the knowledge base implementation shows that the knowledge-based system is filtering STRs in the primary analysis step efficiently and so has made great contribution to improve efficiency and effectiveness of the analysis process. It can be said that establishing the foundation of the knowledge base under the entire framework of the knowledge-based system for consideration of knowledge creation and management is indeed valuable.

  • PDF

경부 경막외 Steroid 주입 및 차단술을 받은 환자의 분석 (Analysis of Patients with Cervical Epidural Steroid Injection and Nerve Block)

  • 정성원;전재규
    • The Korean Journal of Pain
    • /
    • 제9권1호
    • /
    • pp.98-101
    • /
    • 1996
  • Background: Lumbar epidural steroid injection for relief of low back pain and sciatica has become a popular procedure. further, cervical epidural steroid injection with nerve block (CESNB) is known to be effective for the management of acute and chronic pain of neck, shoulder and arm. However, many anesthesiologists are not familiar with CESNB. Methods: Charts of 34 patients who had undergone 60 cervical epidural steroid injections over a three year period, 1993 to 1995, were reviewed. We studied the followings: initial visit and department, injected interspaces, personal characteristics, indications for injection and complications. Results: Patients' first visits were mainly to orthopaedics (11 patients) and neurosurgery (10 patients). Epidural injection sites were: C7-T1 interspace (29 patients) and C6-C7 interspace (6 patients). Mean age of patients were 50.1 years. range 21~73 years. There were twenty male and fourteen female patients. Complications varied from dizziness after CESNB (1 patient). loss of consciousness with transient apnea (2 patients), and local infection with suspicious meningitis (1 patient). Conclusion: We conclude from the above data that CESNB is a good, safe and conservative form of therapeutic procedure in the management of patients suffering from cervical radiculopathy, and neck and shoulder pain.

  • PDF

News Article Identification Methods with Fact-Checking Guideline on Artificial Intelligence & Bigdata

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.352-359
    • /
    • 2021
  • The purpose of this study is to design and build fake news discrimination systems and methods using fact-checking guidelines. In other words, the main content of this study is the system for identifying fake news using Artificial Intelligence -based Fact-checking guidelines. Specifically planned guidelines are needed to determine fake news that is prevalent these days, and the purpose of these guidelines is fact-checking. Identifying fake news immediately after seeing a huge amount of news is inefficient in handling and ineffective in handling. For this reason, we would like to design a fake news identification system using the fact-checking guidelines to create guidelines based on pattern analysis against fake news and real news data. The model will monitor the fact-checking guideline model modeled to determine the Fact-checking target within the news article and news articles shared on social networking service sites. Through this, the model is reflected in the fact-checking guideline model by analyzing news monitoring devices that select suspicious news articles based on their user responses. The core of this research model is a fake news identification device that determines the authenticity of this suspected news article. So, we propose news article identification methods with fact-checking guideline on Artificial Intelligence & Bigdata. This study will help news subscribers determine news that is unclear in its authenticity.

Development of gamma ray scanning coupled with computed tomographic technique to inspect a broken pipe structure inside laboratory scale vessel

  • Saengchantr, Dhanaj;Srisatit, Somyot;Chankow, Nares
    • Nuclear Engineering and Technology
    • /
    • 제51권3호
    • /
    • pp.800-806
    • /
    • 2019
  • This paper presents a laboratory experiment on data acquisition technique that applied to the gamma radiation scanning coupled with computed tomography (CT) technique for inspection of broken nozzle inside the vertical vessel. The acquisition technique was developed to inspect a large diameter vessel when suspicious problem location is not easily accessed. This technique allows the installation of gamma radiation source (Cesium 137, Cs-137), and detectors (Sodium Iodine. NaI(Tl)) from the accessible location to the required location and performs the scanning by designed pattern. To demonstrate the designed technique, top opened tank which installed with six cut steel pipes diameter of 76.2 mm (3") at a certain position was selected. They were assumed to be a gas riser pipes inside the vessel. Three studied cases were performed, (a) projection of well installed six pipes, (b) projection of one out of six broken pipe and (c) one of nozzle was assumed to be failure and fell down until one out of six pipes was broken and obstructed by nozzle. Results clearly indicated the capability of developed technique to distinguish between normal situation case and abnormal situation cases.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

자동차 전조등 검색을 위한 다중지식기반의 영상검색 기법 (The Multi Knowledge-based Image Retrieval Technology for An Automobile Head Lamp Retrieval)

  • 이병일;손병환;홍성욱;손성건;최흥국
    • 융합신호처리학회논문지
    • /
    • 제3권3호
    • /
    • pp.27-35
    • /
    • 2002
  • 지식기반 영상검색은 영상이 갖는 다양한 데이터에서 추출되어진 특징값을 지식으로 하여 질의 영상에 대한 검색 결과영상을 찾아주는 방법이다. 본 연구에서 사용한 영상자료는 자동차 전조등 영상으로 전조등 영상에 대한 입력 자료는 차량마다 다양한 패턴을 갖는 영상과 문자, 숫자 및 특수문자이다. 영상에서의 정보는 화소값들의 분포상태나 통계적 분석 및 패턴의 상태 등인데, 전조등 영상에서는 이러한 정보가 영상 검색을 위한 지식 데이터로 사용된다. 영상데이터에서 추출된 다양한 정보를 다중 지식 기반으로 하여 본 논문에서는 교통사고나 기타 차량사건의 발생 시 활용할 수 있는 영상검색 시스템을 구축하였으며, 전조등 영상의 검색에 효율적으로 적용한 다중 지식기반 검색방법을 제안하였다. 다중지식 구축을 위한 특징함수는 컬러 영상에서와 그레이레벨 영상에서 각각 필요한 성분들을 추출하여 구성하였으며, 한 개나 두 개 정도의 특징값을 사용한 기존의 방법과 달리 복합적인 특징값의 사용을 통한 다중 지식 기반의 검색방법이 컬러정보나 패턴에 대한 유사성을 높여서 용의차량의 전조등 영상 검색 효율성을 향상시켰다. 소프트웨어의 제작을 위해 비쥬얼 베이직과 크리스탈리포트 그리고 MS 액세스 데이터베이스를 사용하였다. 검색 효율성 및 특성 함수의 구성을 효과적으로 발전시키면 검색시스템은 용의 차량의 추적 및 교통사고에서 효율적인 과학수사에 일조할 것으로 기대한다.

  • PDF

Causes of Delay in Seeking Treatment in Patients with Breast Cancer in Iran: a Qualitative Content Analysis Study

  • Rastad, Hadis;Khanjani, Narges;Khandani, Behjat Kalantari
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제13권9호
    • /
    • pp.4511-4515
    • /
    • 2012
  • Background: In the Middle East, including Iran, breast cancer is the most frequent malignancy among women. Without treatment, a malignant breast tumor advances in stage, diminishing a woman's chances of survival. In this study we aimed to gain insight into the causes of delay in seeking treatment in patients with breast cancer. Methods: The participants in this qualitative, content analysis study were 10 women in whom a diagnosis of breast cancer in the stages of II b, III or IIV had been made. They were selected from patients of a major oncology clinic in Kerman, Iran. Data were collected by means of semi-structured interviews that lasted between 20 to 30 minutes. Sampling was discontinued when data saturation was achieved. Content analysis was conducted by classifying the data into themes and sub-themes. Results: The results of our study revealed several factors that interfered with patients' professional consultation seeking and prompt treatment. These factors included; lack of knowledge, fear of being diagnosed with cancer, not seeing oneself at risk, mental preoccupation and wrong diagnosis by physicians. Conclusions: This study suggests that women and even physicians need further information about breast cancer symptoms. Women need encouragement to seek medical advice when they encounter suspicious symptoms. Additionally, women may benefit from awareness of the pros of early detection and reassurance about the improvements in the success of breast cancer treatment.

원양어선 조업 데이터의 혼합 극단분포를 이용한 이상점 탐색 연구 (A Study of Outlier Detection Using the Mixture of Extreme Distributions Based on Deep-Sea Fishery Data)

  • 이정진;김재경
    • 응용통계연구
    • /
    • 제28권5호
    • /
    • pp.847-858
    • /
    • 2015
  • 남극해에서는 우리나라를 포함한 연안 강대국들의 원양어업이 활발히 성행하고 있다. 주인 없는 남극해의 생태계를 보호하기 위해 조업 국가들은 남극해양생물자원보존위원회를 만들고 협약을 맺어 일정한 어획량만 조업하고 금지기간과 금지구역을 설정하여 불법조업을 방지하고 있다. 남극해에서 조업하는 어종 중의 하나가 이빨고기(tooth fish)인데 비싼 값 때문에 불법조업이 있는 경우가 많다. 한 배의 조업성과는 CPUE(catch per unit effort)로 나타낼 수 있고, 한 지역에서 조업한 배들의 CPUE는 단일 또는 혼합 극단분포 형태를 가진다. 단일 극단분포일 경우 이상점 탐색은 상위 백분위수를 이용하면 된다. 본 논문은 자료가 혼합 극단분포인 경우 이상점 탐색을 위한 통계적 방법을 연구하고자 한다. 본 연구에서는 자료에 적합한 혼합 극단분포 모형을 EM 알고리즘으로 추정한 후 로그 가능도함수 값을 이용하거나 사후 확률을 이용한 이상점 탐색 알고리즘을 제안한다. 이 방법을 남극해 조업 데이터에 적용하여 시뮬레이션 한 결과 통계적 방법 적용의 가능성을 보여주었다.

영상의학에서 폐영상 판독과 자료체계: 강점, 단점, 그리고 개선 (Lung Imaging Reporting and Data System (Lung-RADS) in Radiology: Strengths, Weaknesses and Improvement)

  • 진공용
    • 대한영상의학회지
    • /
    • 제84권1호
    • /
    • pp.34-50
    • /
    • 2023
  • 미국방사선의학회는 효과적인 국가 폐암 검진 시행을 위해 2019년도에 Lung CT Screening Reporting & Data System (이하 Lung-RADS) 1.0보다 폐암의 위양성을 줄이기 위해 개편된 Lung-RADS 1.1을 발표하였고, 2022년 12월에 새로운 Lung-RADS 1.1 개선안 Lung-RADS 2022를 발표하였다. Lung-RADS 2022은 Lung-RADS 1.0과 비교했을 때 결절의 크기는 소수점 첫째 자리까지 측정하고, 늑막근처 결절의 크기가 10 mm 미만인 경우까지 범주 2로 하며, 범주 2에서 간유리 결절의 크기 기준을 30 mm로 높이고, 범주 4B와 4X는 매우 의심으로 변경하며, 기도 결절의 위치와 비정형 폐 낭종의 형태와 벽 두께에 따라 범위를 나누었다. 이에 영상의학과 의사들의 개선된 Lung-RADS 2022에 대한 이해를 돕고자, 이 종설에서는 Lung-RADS 2022의 장점, 단점, 그리고 향후 개선점에 대해서 기술하고자 한다.