• 제목/요약/키워드: 이상 감지 시스템

Search Result 425, Processing Time 0.031 seconds

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Study for Determination of Management Thresholds of Bridge Structural Health Monitoring System based on Probabilistic Method (확률론적 방법에 의한 교량계측시스템의 관리기준치 설정에 관한 연구)

  • Kim, Haeng-Bae;Song, Jae-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • Recently, structural health monitoring system(SHMS) has been appled cable bridges as the effective maintenance tool and the management threshold is considered to assess the status of the bridge in SHMS. The threshold is generally determined by the allowable limit based on design specification because there is no method and standard for threshold calculation. In case of the conventional thresholds, it is difficult to recognize the event, abnormal behavior and gradual damage within the threshold. Therefore, this study reviewed the problem of previous methods and proposed the advanced methodologies based on probabilistic approach for threshold calculation which can be applied to practice work. Gumbel distribution is adopted in order to calculate the threshold for caution and warning states considering the expectations for return periods of 50 and 100 years. The thresholds were individually determined for measurement data and data variation to detect the various abnormal behaviors within allowable range. Finally, it has confirmed that the thresholds by the proposed method is detectable the abnormal behavior of real-time measuring data from SHMS.

Efficient Localization of a Mobile Robot Using Spatial and Temporal Information from Passive RFID Environment (수동 RFID 환경에서의 공간/시간 정보를 이용한 이동로봇의 효율적 위치 추정 기법)

  • Kim, Sung-Bok;Lee, Sang-Hyup
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.2
    • /
    • pp.164-172
    • /
    • 2008
  • This paper presents the efficient localization of a mobile robot traveling on the floor with tags installed, using the spatial and temporal information acquired from passive RFID environment. Compared to previous research, the proposed localization method can reduce the position estimation error and also cut down the initial cost tag installation cost. Basically, it is assumed that a mobile robot is traveling over a series of straight line segments, each at a certain constant velocity, and that the number of tags sensed by a mobile robot at each sampling instant is at most one. First, the velocity and position estimation of a mobile robot starting from a known position, which is valid for all segments except the first one. Second, for the first segment in which the starting position is unknown, the velocity and position estimation is made possible by enforcing a mobile robot to traverse at least two tags at a constant velocity with the steering angle unchanged. Third, through experiments using our passive RFID localization system, the validity and performance of the mobile robot localization proposed in this paper is demonstrated.

  • PDF

Telemedicine System for Korean Beef Cattle Converging Livestock Farming Practices & ICT (축산분야와 ICT 융합을 통한 한우 원격진료방안)

  • Koo, Jee-Hee;Lee, Sang-Rak
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.217-224
    • /
    • 2016
  • As livestock diseases such as foot-and-mouth disease are highly infectious and likely to inflict nationwide damage, it is important to detect such diseases in advance. Infection of foot-and-mouth disease is determined in the field through examination of external symptoms such as rise in body temperature. However, as the disease is carried around initially by travelling veterinarians in some cases, it is critical to measure the body temperature of livestock to detect abnormal temperature pattern early on and transmit temperature reading data remotely to a veterinarian remotely to expedite decision. In this study, we have developed a telemedicine system designed to connect veterinarians and livestock farmers and measure the body temperature of Korean beef cattle with IR sensor module linked to ubiquitous ICT platform as a solution for controlling health conditions of Korean beef cattle and improving the efficiency of livestock farming operations at individual farm, regional, and national level by converging ubiquitous ICT platform and livestock farming practices. Successfully employing the state-of-the-art IT technologies of Korea, the system proposed herein is expected to make Korea's livestock farming industry more sustainable and help the nation to secure technological preeminence in the global livestock products market.

Optimum Design of Structural Monitoring System using Artificial Neural Network and Multilevel Sensitivity Analysis (다단계민감도 분석 및 인공신경망을 이용한 최적 계측시스템 선정기법)

  • 김상효;김병진
    • Computational Structural Engineering
    • /
    • v.10 no.4
    • /
    • pp.303-313
    • /
    • 1997
  • Though many techniques for the damage assessment of structures have been studied recently, most of them can be only applied to simple structures. Therefore, practical damage assessment techniques that evaluate the damage location and the damage state for large structures need to be developed. In this study, a damage assessment technique using a neural network is developed, in which the bilevel damage assessment procedure is proposed to evaluate the damage of a large structure from the limited monitoring data. The procedure is as follows ; first, for the rational selection of damage critical members, the members that affect the probability of failure or unusual structural behavior are selected by sensitivity analysis. Secondly, the monitoring points and the number of sensors that are sensitive to the damage severity of the selected members are also selected through the sensitivity analysis with a proposed sensitivity measurement format. The validity and applicability of the developed technique are demonstrated by various examples, and it has been shown that the practical information on the damage state of the selected critical members can be assessed even though the limited monitoring data have been used.

  • PDF

Research on Core Technology for Information Security Based on Artificial Intelligence (인공지능 기반 정보보호핵심원천기술 연구)

  • Sang-Jun Lee;MIN KYUNG IL;Nam Sang Do;LIM JOON SUNG;Keunhee Han;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • Recently, unexpected and more advanced cyber medical treat attacks are on the rise. However, in responding to various patterns of cyber medical threat attack, rule-based security methodologies such as physical blocking and replacement of medical devices have the limitations such as lack of the man-power and high cost. As a way to solve the problems, the medical community is also paying attention to artificial intelligence technology that enables security threat detection and prediction by self-learning the past abnormal behaviors. In this study, there has collecting and learning the medical information data from integrated Medical-Information-Systems of the medical center and introduce the research methodology which is to develop the AI-based Net-Working Behavior Adaptive Information data. By doing this study, we will introduce all technological matters of rule-based security programs and discuss strategies to activate artificial intelligence technology in the medical information business with the various restrictions.

Fault Detection & SPC of Batch Process using Multi-way Regression Method (다축-다변량회귀분석 기법을 이용한 회분식 공정의 이상감지 및 통계적 제어 방법)

  • Woo, Kyoung Sup;Lee, Chang Jun;Han, Kyoung Hoon;Ko, Jae Wook;Yoon, En Sup
    • Korean Chemical Engineering Research
    • /
    • v.45 no.1
    • /
    • pp.32-38
    • /
    • 2007
  • A batch Process has a multi-way data structure that consists of batch-time-variable axis, so the statistical modeling of a batch process is a difficult and challenging issue to the process engineers. In this study, We applied a statistical process control technique to the general batch process data, and implemented a fault-detection and Statistical process control system that was able to detect, identify and diagnose the fault. Semiconductor etch process and semi-batch styrene-butadiene rubber process data are used to case study. Before the modeling, we pre-processed the data using the multi-way unfolding technique to decompose the data structure. Multivariate regression techniques like support vector regression and partial least squares were used to identify the relation between the process variables and process condition. Finally, we constructed the root mean squared error chart and variable contribution chart to diagnose the faults.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Window Production Method based on Low-Frequency Detection for Automatic Object Extraction of GrabCut (GrabCut의 자동 객체 추출을 위한 저주파 영역 탐지 기반의 윈도우 생성 기법)

  • Yoo, Tae-Hoon;Lee, Gang-Seong;Lee, Sang-Hun
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.211-217
    • /
    • 2012
  • Conventional GrabCut algorithm is semi-automatic algorithm that user must be set rectangle window surrounds the object. This paper studied automatic object detection to solve these problem by detecting salient region based on Human Visual System. Saliency map is computed using Lab color space which is based on color opposing theory of 'red-green' and 'blue-yellow'. Then Saliency Points are computed from the boundaries of Low-Frequency region that are extracted from Saliency Map. Finally, Rectangle windows are obtained from coordinate value of Saliency Points and these windows are used in GrabCut algorithm to extract objects. Through various experiments, the proposed algorithm computing rectangle windows of salient region and extracting objects has been proved.

A Study on the Performance Prediction of Fire Extinguish System in Aircraft Engine Bay (항공기 엔진베이 내 소화장치 성능예측을 위한 연구)

  • Park, Young-Ha;Kim, Hyung-Sik;Kim, Jin-Han;Cho, Soo-Yong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.8
    • /
    • pp.718-725
    • /
    • 2012
  • Fuel or oil which is leaked into the aircraft engine bay can make a fire when it is contacted to the engine surface of hot temperature. In order to avoid fire, the fire extinguish system should be designed so that the extinguishing agent is quickly injected and its concentration keeps higher in the fire protection region. FAA requires that the extinguishing agent injected within the fire protection region should be sustained longer than 0.5 second on keeping a higher concentration than 6%. For developing a fire protection system satisfying the FAA regulation, numerical and experimental studies for the injection time and the concentration of the extinguishing agent were conducted. These results showed similar trend for the injection time or concentration, but the data acquisition was delayed due to the response of the sensors in the experiment.