摘要:
A system for detecting a global harmful video includes: a video determination policy generation unit for determining harmfulness of learning video segments from video learning information to analyze occurrence information of harmful learning video segments, and generating a global harmfulness determination policy based on the occurrence information; and a video determination policy execution unit for determining harmfulness of input video segments from information of an input video to analyze occurrence information of harmful input video segments, and determining whether the input video is harmful or not based on the occurrence information of the harmful input video segments and the global harmfulness determination policy.
摘要:
Provided are an apparatus and method for blocking an objectionable image on the basis of multimodal and multiscale features. The apparatus includes a multiscale feature analyzer for analyzing multimodal information extracted from image training data to generate multiscale objectionable and non-objectionable features, an objectionability classification model generator for compiling statistics on the generated objectionable and non-objectionable features and performing machine learning to generate multi-level objectionability classification models, an objectionability determiner for analyzing multimodal information extracted from image data input for objectionability determination to extract at least one of multiscale features of the input image, and comparing the extracted feature with at least one of the multi-level objectionability classification models to determine objectionability of the image, and an objectionable image blocker for blocking the input image when it is determined that the image is objectionable.
摘要:
Disclosed is a probe of an electrical measuring instrument including a handle and at least one loop antenna coupled to the handle. A plane defined by the loop antenna is oriented to face an object to be inspected, to detect electrical characteristics in the vicinity of the object. Enhanced accessibility of the probe with respect to the object to be inspected results in an improvement in the accuracy of measured electrical characteristics information and use convenience of the probe by an inspector.
摘要:
A method for determining harmful multimedia content by using multimedia content playback characteristics includes: determining a local harmfulness of each basic unit section of multimedia content to generate a local determination result; and generating global determination results to complement an error of the local determination result based on the multimedia content playback characteristics. The global determination results are generated by using a continuous determination value which has a meaning of harmful or harmless and is updated depending on each local determination result and the number of continuous determination results is counted or initialized depending on continuity of the local determination results.
摘要:
Provided is a method of generating and searching for a single ternary content addressable memory (TCAM) entry for range search and exact-match search. First, it is determined whether an entry to be added is a range search entry or an exact-match search entry. When the entry is the range search entry, a bit at a predetermined position in the upper m bits corresponding to a range represented by the entry is set to “1” and the remaining bits including lower n bits is set to a “don't care” bit x, based on a range table for representing position information of one of the upper m bits which is set to “1” in ranges. When the entry is the exact-match search entry, the upper m bits is set to “don't care” bit x and the lower n bits is set to the entry value. By generating and searching for a single TCAM entry for a range search and an exact-match search, a space for storing the TCAM entry can be optimized and efficiency thereof can be improved.
摘要:
An apparatus and method for detecting an attack packet in Internet Protocol version 6 (IPv6) are provided. The apparatus includes a control unit, a preprocessing unit, an attack determining unit, and a packet processing unit. The control unit sets a rule for attack determination and a rule for processing of an attack packet. The preprocessing unit decodes an IPv6 packet and a tunneling packet, and divides the decoded packet into each header and payload. The attack determining unit determines possibility of attack of the divided packet according to the rule for attack determination by using information of the divided packet. The packet processing unit performs at least one function of packet filtering, packet deleting, packet forwarding, and intrusion alarming according to a result of the determination of the attack determining unit, and the rule for processing of an attack packet.
摘要:
A method of blocking network attacks using information included in a packet, and an apparatus thereof are provided. The method includes: receiving a packet containing information on the packet including at least information on a source from which the packet is sent, and information on a destination to which the packet is sent; and extracting the information on the packet included in the packet, comparing the information with a predetermined access control condition, and blocking or passing the packet. By doing so, a packet being transferred with a routing header capable of bypassing a security device as in an Internet Protocol version 6 (IPv6) network can be appropriately blocked or passed. Accordingly, security problems caused by the routing header can be overcome, and as a result, usage of the routing header can be promoted. Also, since a routing header can be used for transmitting a packet along a desired path, the routing header can be widely used without security problems, and can ease network security concerns relating to IPv6 networks that are expected to come into increasingly wide use.
摘要:
Disclosed is an access control method using a token having security attributes in a computer system when a user gains access to a specific file. The computer system adopts a token having encryption, modification, execution, and provision attributes to determine access permission or access denial between a user and a file in such a way that a file access request is controlled. The access control method enciphers a file and stores the enciphered file in a storage unit, so that it can maintain security of the file even though the storage unit is stolen. The access control method enables a system manager to read only enciphered contents of the file when the system manager performs a data backup operation, thereby eliminating limitations in commonly operating a system simultaneously with maintaining file security. The access control method enables programs for executing operations on behalf of a user to automatically obtain a corresponding token, confirms authority to execute the file, and prevents that the authority is stolen or drained due to a program error.