Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

Home > Explore Content > All Issues > Article List

2019, Vol.15, No.1

  • 1.

    Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines

    Hyun-Jae Choi , Hyun-Soo Kim , Dong-Myung Shin | 2019, 15(1) | pp.1~9 | number of Cited : 1
    Abstract PDF
    We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.
  • 2.

    Distribution of Mobile Apps Considering Cross-Platform Development Frameworks in Android Environment

    Gyoosik Kim , Jeon SoYeon , SEONG JE CHO | 2019, 15(1) | pp.11~24 | number of Cited : 0
    Abstract PDF
    Using cross-platform development frameworks, mobile app developers can easily implement mobile apps for multiple platforms in one step. The frameworks also provides adversaries with the ability to write malicious code once, and then run it anywhere for other platforms. In this paper, we analyze the ratio of benign and malicious apps written by cross-platform development frameworks for Android apps collected from AndroZoo’s site. The analysis results show that the percentage of benign apps written in the frameworks continues to increase, accounting for 45% of all benign apps in 2018. The percentage of malicious apps written in the frameworks accounted for 25% of all malicious apps in 2015, but that percentage has declined since then. This study provides useful information to make a suitable choice when app developers face several challenges in cross platform app development.
  • 3.

    A Study on the Relationship between Weighted Value and Qualitative Standard in Substantial Similarity

    Kim, Si Yeol | 2019, 15(1) | pp.25~35 | number of Cited : 1
    Abstract PDF
    In Korea, the calculation of quantitative similarity is commonly used to gauge the substantial similarity of computer programs. Substantial similarity should be assessed by considering the quantity and quality of areas that show similarity, but in practice, qualitative aspects are reflected by multiplying the weighted value in the calculation of quantitative similarity. However, such a practical method cannot be deemed adequate, considering the fundamental characteristic of the judgment on substantial similarity, which holds that the quantitative and qualitative aspects of similar areas should be considered on an equal footing. Thus, this study pointed out the issue regarding the use of weighted value and sought appropriate ways to take into account qualitative aspects when assessing the substantial similarity of computer programs.
  • 4.

    A Study on Similarity Analysis of SNMP MIB File

    Byung-Tae Chun | 2019, 15(1) | pp.37~42 | number of Cited : 3
    Abstract PDF
    Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.
  • 5.

    Improvement of BigCloneBench Using Tree-Based Convolutional Neural Network

    Gunwoo Park , Sung-Moon Hong , Hyunha Kim and 1 other persons | 2019, 15(1) | pp.43~53 | number of Cited : 1
    Abstract PDF
    BigCloneBench has recently been used for performance evaluation of code clone detection tool using machine learning. However, since BigCloneBench is not a benchmark that is optimized for machine learning, incorrect learning data can be created. In this paper, we have shown through experiments using machine learning that the set of Type-4 clone methods provided by BigCloneBench can additionally be found. Experimental results using Tree-Based Convolutional Neural Network show that our proposed method is effective in improving BigCloneBench’s dataset.
  • 6.

    Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices

    Do Hyeun Kim , LEE KYU TAE | 2019, 15(1) | pp.55~62 | number of Cited : 2
    Abstract PDF
    The needs for small size and low power consumption of information devices is being implemented with SOC technology that implements the program on a single chip in Internet of Thing. Copyright disputes due to piracy are increasing in semiconductor chips as well, arising from disputes in the chip implementation of the design house and chip implementation by the illegal use of the source code. However, since the final chip implementation is made in the design house, it is difficult to protect the copyright. In this paper, we deal with the analysis method for extracting similarity and the criteria for setting similarity judgment in the dispute of source code written in HDL language. Especially, the chip which is manufactured based on the same specification will be divided into the same configuration and the code type.
  • 7.

    Development of deep learning-based rock classifier for elementary, middle and high school education

    Jina Park , Hwanseung Yong | 2019, 15(1) | pp.63~70 | number of Cited : 0
    Abstract PDF
    These days, as Interest in Image recognition with deep learning is increasing, there has been a lot of research in image recognition using deep learning. In this study, we propose a system for classifying rocks through rock images of 18 types of rock(6 types of igneous, 6 types of metamorphic, 6 types of sedimentary rock) which are addressed in the high school curriculum, using CNN model based on Tensorflow, deep learning open source framework. As a result, we developed a classifier to distinguish rocks by learning the images of rocks and confirmed the classification performance of rock classifier. Finally, through the mobile application implemented, students can use the application as a learning tool in classroom or on-site experience.
  • 8.

    Simulation and Examination for Beam Profile of DFB Laser

    Keeyoung Kwon , Janggeun Ki | 2019, 15(1) | pp.71~78 | number of Cited : 6
    Abstract PDF
    Lasers for optical broadband communication systems should have excellent frequency selectivity and modal stability. DFB lasers have low lasing frequency shift during high speed current modulation. In this paper, we have developed a simulation software and analysed beam profiles of a lasing mode in longitudinal direction of an 1.55um DFB laser with two mirrors and without anti-reflection coatings, that have both an index- and gain-gratings. As the phases of the index and gain gratings on the mirror faces are varied, the beam profiles and of the lasing mode with the emitted power ratio are analysed and examined. In order to reduce the threshold current of a lasing mode and enhance the frequency stability, should be greater than 8, regardless of the grating phases on the mirror faces.
  • 9.

    Defect Severity-based Dimension Reduction Model using PCA

    Kwon, Ki Tae , Na-Young Lee | 2019, 15(1) | pp.79~86 | number of Cited : 0
    Abstract PDF
    Software dimension reduction identifies the commonality of elements and extracts important feature elements. So it reduces complexity by simplify and solves multi-collinearity problems. And it reduces redundancy by performing redundancy and noise detection. In this study, we proposed defect severity-based dimension reduction model. Proposed model is applied defect severity-based NASA dataset. And it is verified the number of dimensions in the column that affect the severity of the defect. Then it is compares and analyzes the dimensions of the data before and after reduction. In this study experiment result, the number of dimensions of PC4's dataset is 2 to 3. It was possible to reduce the dimension.
  • 10.

    A Survey on Public Awareness of Cyber Security

    Yun Young-Sun , Gai-il An | 2019, 15(1) | pp.87~95 | number of Cited : 1
    Abstract PDF
    In this study, we surveyed the public awareness about cyber security. Through the survey, we found the awareness for cyber threats that are easily exposed to the public, the one is felt anxiety by the people, and harmful contents in the online. As a result, we analyzed the various cyber threats, and found the internet usage environments, thoughts on unhealthy contents, person in charge of prevention and its methods. The results of the study can be considered as the bases of the extracting requirements for designing convergence research items in the cyber security, and they also suggested its utilization.
  • 11.

    A study on the Construction of Remote Status Display Software for Soft-RAID system of Linux based Server

    Na, Won Shik , Lee HyunChang | 2019, 15(1) | pp.97~102 | number of Cited : 1
    Abstract PDF
    In this paper, we propose a method to remotely intuitively identify faults found in storage devices in soft-RAID used in a server system composed of Linux. To do this, we analyze the principle and problem of fault reporting method in the soft-RAID system of Linux OS and suggest the state of storage devices in remote Internet Home-page. The proposed method consists of a method of displaying images on the Internet home-page, so that it can be arranged freely when creating a home-page, and the image data is composed of external files, so it is bery convenient to edit and replace images In order to verify the effectiveness of the proposed method, we have confirmed that the state of each storage device can be confirmed at a long distance without any major addition to the Home-page configuration.
  • 12.

    Low-area Duty Cycle Correction Circuit for Voltage-Controlled Ring Oscillator

    YU BYEONGJAE , HYUNMOOK CHO | 2019, 15(1) | pp.103~107 | number of Cited : 0
    Abstract PDF
    Recently, many technologies have been developed to realize low power high speed digital data communication and one of them is related to duty cycle correction. In this paper, a low-area duty cycle correction circuit for a voltage-controlled ring generator is proposed. The duty cycle correction circuit is a circuit that corrects the duty cycle using a 180 degree phase difference of a voltage controlled ring oscillator. The proposed low-area duty cycle circuit changes a conventional flip-flop to a true single phase clocking (TSPC) flip-flop And a low-area high-performance circuit is realized. By using TSPC flip-flop instead of general flip-flop, it is possible to realize low-area circuit compared to existing circuit, and it is expected to be used for high-performance circuit for low-power because it is easy to operate at high speed.
  • 13.

    Analysis of Electrical Performance on Probe Pin

    Moonjung Kim | 2019, 15(1) | pp.109~114 | number of Cited : 0
    Abstract PDF
    In this paper, simulations of S-parameter and characteristic impedance for the probe pin are performed and its high-frequency performance is analyzed. The probe pins are arranged with one signal pin in the center and four ground pins on the top, bottom, left and right sides. The insertion loss and return loss of the probe pin are calculated while increasing the separation between the probe pins to 0.35 mm, 0.40 mm, and 0.50 mm, respectively. It is confirmed that the probe pin has different features of the insertion loss due to its periodic resonance phenomenon. Effect of the characteristic impedance on pitch and assignment of the probe pin is also analyzed. It is verified that there are a number of ground pins whose characteristic impedance is close to 50 Ω.
  • 14.

    Structural Analysis and Derivation of Vulnerability for BlockChain based System

    Jang Hwan Kim | 2019, 15(1) | pp.115~121 | number of Cited : 0
    Abstract PDF
    I analyzed the structure of a block-chain system and a block-chain-based service system. It is a decentralized book encryption system software technology that does not require a third party to secure trust between the two parties. Block chains are structured in a linked list structure. The block chain manage transaction information by blocking the transaction information, in conjunction with other blocks. As a result, I have discovered structural weaknesses in current block-chain systems and block-chain-based service systems. Once these possible structural problems are resolved, I expect that the block-chain-based service system will make various industrial contributions.
  • 15.

    Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments

    Yukyong Kim | 2019, 15(1) | pp.123~131 | number of Cited : 0
    Abstract PDF
    The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.