• Title/Summary/Keyword: 동적 탐지

Search Result 298, Processing Time 0.031 seconds

A Study on Vulnerability Analysis Techniques for Secure Weapon System Software (안전한 무기체계 소프트웨어를 위한 취약점 분석 기법에 관한 연구)

  • Kim, Jong-Bok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.459-468
    • /
    • 2018
  • Cyberattacks on information systems used by applications related to weapon system and organizations associated with national defense put national security at risk. To reduce these threats, continuous efforts such as applying secure coding from the development stage or managing detected vulnerabilities systematically are being made. It also analyzes and detects vulnerabilities by using various analysis tools, eliminates at the development stage, and removes from developed applications. However, vulnerability analysis tools cause problems such as undetected, false positives, and overdetected, making accurate vulnerability detection difficult. In this paper, we propose a new vulnerability detection method to solve these problems, which can assess the risk of certain applications and create and manage secured application with this data.

A Malware Variants Detection Method based on Behavior Similarity (행위 유사도 기반 변종 악성코드 탐지 방법)

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.25-32
    • /
    • 2019
  • While the development of the Internet has made information more accessible, this also has provided a variety of intrusion paths for malicious programs. Traditional Signature-based malware-detectors cannot identify new malware. Although Dynamic Analysis may analyze new malware that the Signature cannot do, it still is inefficient for detecting variants while most of the behaviors are similar. In this paper, we propose a detection method using behavioral similarity with existing malicious codes, assuming that they have parallel patterns. The proposed method is to extract the behavior targets common to variants and detect programs that have similar targets. Here, we verified behavioral similarities between variants through the conducted experiments with 1,000 malicious codes.

Damage Detection in Steel Box Girder Bridge using Static Responses (강박스 거더교에서 정적 거동에 의한 손상 탐지)

  • Son, Byung Jik;Huh, Yong-Hak;Park, Philip;Kim, dong Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4A
    • /
    • pp.693-700
    • /
    • 2006
  • To detect and evaluate the damage present in bridge, static identification method is known to be simple and effective, compared to dynamic method. In this study, the damage detection method in steel box girder bridge using static responses including displacement, slope and curvature is examined. The static displacement is calculated using finite element analysis and the slope and curvature are determined from the displacement using central difference method. The location of damage is detected using the absolute differences of these responses in intact and damaged bridge. Steel box girder bridge with corner crack is modeled using singular element in finite element method. The results show that these responses were significantly useful in detecting and predicting the location of damage present in bridge.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.

Key Re-distribution Scheme of Dynamic Filtering Utilizing Attack Information for Improving Energy Efficiency in WSNs (무선 센서 네트워크에서 에너지 효율성 향상을 위해 공격정보를 활용한 동적 여과 기법의 키 재분배 기법)

  • Park, Dong-Jin;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.2
    • /
    • pp.113-119
    • /
    • 2016
  • Wireless sensor networks are vulnerable to an adversary due to scarce resources and wireless communication. An adversary can compromise a sensor node and launch a variety of attacks such as false report injection attacks. This attack may cause monetary damage resulting in energy drain by forwarding the false reports and false alarms at the base station. In order to address this problem, a number of en-route filtering schemes has been proposed. Notably, a dynamic en-route filtering scheme can save energy by filtering of the false report. In the key dissemination phase of the existing scheme, the nodes closer to the source node may not have matching keys to detect the false report. Therefore, continuous attacks may result in unnecessary energy wastage. In this paper, we propose a key re-distribution scheme to solve this issue. The proposed scheme early detects the false report injection attacks using initially assigned secret keys in the phase of the key pre-distribution. The experimental results demonstrate the validity of our scheme with energy efficiency of up to 26.63% and filtering capacity up to 15.92% as compared to the existing scheme.

A study on the optimal state estimation of a dynamic system with an unknown input (입력이 미지인 동적시스템의 최적상태추정에 관한 연구)

  • 하주식;진강규
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.61-70
    • /
    • 1987
  • 미지의 조작량이나 매우 큰 외란이 입력으로 작용하고 있는 동력시스템의 정도 높은 상태를 추정하려면 상태추정에 앞서 시스템의 입력추정이 요구된다. 본 논문에서는 간략형 칼만필터 (SKF:Simplified Kalman Filter)를 이용하여 운동하고 있는 목표물의 상태추정을 행함과 동시에 기동탐지자 (Maneuvering Detector)와 입력추정자 (Input Estimator)에 의해 시스템의 입력을 추정하고 이것에 의하여 SKF의 추정치를 보정해줌으로써 입력이 미지인 동적 시스템의 상태추정에 있어서 추정정도를 개선하는 방법을 제안하며 디지탈계산기를 이용한 시뮤레이션을 통하여 본 방법의 유효성을 밝힌다.

  • PDF

Intrusion Detection Technique using Distributed Mobile Agent (Distributed Mobile Agent를 이용한 침입탐지 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae;Yang, Jeong Mo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.69-75
    • /
    • 2012
  • MANET(Mobile Ad-hoc Network) is target of many attacks because of dynamic topology and hop-by-hop data transmission method. In MANET, location setting of intrusion detection system is difficult and attack detection using information collected locally is more difficult. The amount of traffic grow, intrusion detection performance will be decreased. In this paper, MANET is composed of zone form and we used random projection technique which reduces dimension without loss of information in order to perform stable intrusion detection in even massive traffic. Global detection node is used to detect attacks which are difficult to detect using only local information. In the global detection node, attack detection is performed using received information from IDS agent and pattern of nodes. k-NN and ZBIDS were experimented to evaluate performance of the proposed technique in this paper. The superiority of performance was confirmed through the experience.

Design of Security Policy-based Intrusion Detection System Model (보안정책 기반 침입탐지 시스템 모델 설계)

  • Kim, Kang;Jeon, Jong-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.81-86
    • /
    • 2003
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion Detection System has been an active research area to reduce the risk from intruders. Especially, The paper proposes a new Security Policy-based Intrusion Detection System Model, which consists of several computer with Intrusion Detection System, based on Intrusion Detection System and describes design of the Security Policy-based Intrusion Detection System model and prototype implementation of it. The Security Policy-based Intrusion Detection Systems are distributed and if any of distributed Security Policy- based Intrusion Detection Systems detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with Security Policy-based Intrusion Detection Systems, This makes the Security Policy - based Intrusion Detection Systems improve the ability of countermeasures for new intruders.

  • PDF

Realtime Theft Detection of Registered and Unregistered Objects in Surveillance Video (감시 비디오에서 등록 및 미등록 물체의 실시간 도난 탐지)

  • Park, Hyeseung;Park, Seungchul;Joo, Youngbok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1262-1270
    • /
    • 2020
  • Recently, the smart video surveillance research, which has been receiving increasing attention, has mainly focused on the intruder detection and tracking, and abandoned object detection. On the other hand, research on real-time detection of stolen objects is relatively insufficient compared to its importance. Considering various smart surveillance video application environments, this paper presents two different types of stolen object detection algorithms. We first propose an algorithm that detects theft of statically and dynamically registered surveillance objects using a dual background subtraction model. In addition, we propose another algorithm that detects theft of general surveillance objects by applying the dual background subtraction model and Mask R-CNN-based object segmentation technology. The former algorithm can provide economical theft detection service for pre-registered surveillance objects in low computational power environments, and the latter algorithm can be applied to the theft detection of a wider range of general surveillance objects in environments capable of providing sufficient computational power.

Detection Algorithm of Road Damage and Obstacle Based on Joint Deep Learning for Driving Safety (주행 안전을 위한 joint deep learning 기반의 도로 노면 파손 및 장애물 탐지 알고리즘)

  • Shim, Seungbo;Jeong, Jae-Jin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.95-111
    • /
    • 2021
  • As the population decreases in an aging society, the average age of drivers increases. Accordingly, the elderly at high risk of being in an accident need autonomous-driving vehicles. In order to secure driving safety on the road, several technologies to respond to various obstacles are required in those vehicles. Among them, technology is required to recognize static obstacles, such as poor road conditions, as well as dynamic obstacles, such as vehicles, bicycles, and people, that may be encountered while driving. In this study, we propose a deep neural network algorithm capable of simultaneously detecting these two types of obstacle. For this algorithm, we used 1,418 road images and produced annotation data that marks seven categories of dynamic obstacles and labels images to indicate road damage. As a result of training, dynamic obstacles were detected with an average accuracy of 46.22%, and road surface damage was detected with a mean intersection over union of 74.71%. In addition, the average elapsed time required to process a single image is 89ms, and this algorithm is suitable for personal mobility vehicles that are slower than ordinary vehicles. In the future, it is expected that driving safety with personal mobility vehicles will be improved by utilizing technology that detects road obstacles.