• Title/Summary/Keyword: 정상 프로파일

Search Result 110, Processing Time 0.023 seconds

Anomaly behavior detection using Negative Selection algorithm based anomaly detector (Negative Selection 알고리즘 기반 이상탐지기를 이용한 이상행 위 탐지)

  • 김미선;서재현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.391-394
    • /
    • 2004
  • Change of paradigm of network attack technique was begun by fast extension of the latest Internet and new attack form is appearing. But, Most intrusion detection systems detect informed attack type because is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, visibilitys to apply human immunity mechanism are appearing. In this paper, we create self-file from normal behavior profile about network packet and embody self recognition algorithm to use self-nonself discrimination in the human immune system to detect anomaly behavior. Sense change because monitors self-file creating anomaly detector based on Negative Selection Algorithm that is self recognition algorithm's one and detects anomaly behavior. And we achieve simulation to use DARPA Network Dataset and verify effectiveness of algorithm through the anomaly detection rate.

  • PDF

A Pilot Study for Standardization of the Sensory Processing Scale for Children (SPS-C) (아동감각처리척도(Sensory Processing Scale for Children; SPS-C)의 표준화를 위한 예비연구)

  • Shin, Ji-eun;Kim, Kyeong-Mi;Chang, Moon-Young;Hong, Eunkyoung
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.18 no.2
    • /
    • pp.42-54
    • /
    • 2020
  • Objective : The purpose of this study was to define a standard score of Sensory Processing Scale for Children (SPS-C) and its concurrent validity by correlation with the Short Sensory Profile (SSP). Methods : The subjects were children enrolled in nurseries and kindergartens in Busan and Gyeongnam. We defined the standard score of the SPS-C and identified its concurrent validity for 337 children. Both the SPS-C and SSP instruments were used to assess the children's sensory processing ability. The collected data were analyzed using SPSS 24.0. A statistical analysis was used to define the standard score for SPS-C based on the mean and SDs of -1 and -2. To identify the concurrent validity of the SPS-C, the correlation between it and SSP was measured using Pearson's correlation analysis. Results : The ranges of total standard scores on the SPS-C were classified as follows: 115~160 indicated "Typical Performance"; 105~114 indicated "Probable Difference"; and finally, 50~104 indicated "Definite Difference." Concurrent validity was ascertained using the Pearson correlation between the total scores of the SPS-C and the SSP; the Pearson correlation coefficient was .755, indicating a statistically significant correlation. Conclusion : This study suggests the standard score of the SPS-C for interpreting results in clinical settings and confirms that it is a valid tool for evaluating children's sensory processing ability.

Design and implementation of file transfer protocol supporting security functionalities (보안 기능을 지원하는 파일 전송 프로토콜의 설계 및 구현)

  • Ahn, Jae-Won;Choi, Beom-Jin;Ok, Sung-Jin;Kang, Jung-Ha;Kim, Jae-Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3086-3092
    • /
    • 2014
  • The FTP that provides file transfer capabilities to/from another station cannot provides data confidentialities. The FTPS and SFTP can support a security functionalities. The FTPS needs a SSL layer and SFTP use a functions of SSH. And therefore the FTPS or SFTP needs an additional modules such as SSL or SSH. In this paper, we propose a new Secured FTP protocol that can support the security functions without extra security system. The Secured FTP uses Diffie-Hellman key agreement algorithm for shared secret key generation and AES-Counter algorithm for data encryption algorithm. Our designed Secured FTP is implemented in Linux environments and the proper operations of implemented Secured FTP is verified.

Automatic Generation of Format Table for Data Acquisition for KOMPSAT-2 (다목적실용위성 2호의 데이터 획득을 위한 자동적인 포맷 테이블 생성)

  • 이재승;최종욱;천이진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.508-510
    • /
    • 2001
  • 최근 우주산업의 급속한 발달로 다양한 목적의 인공위성들이 개발되고 있다. 이러한 인공위성들은 그 사용 목적에 따라 다르지만 매우 많은 양의 데이터들을 다루게 된다. 이러한 데이터에는 각각의 주어진 임무에 사용되는 정보들이 대부분을 차지하지만 위성자체의 상태 데이터도 릴 정시간마다 화인을 해주어야 한다. 위성의 상태 데이터는 위성 각 부분의 이상유무나 위치, 시간 등 위성이 정상적으로 그 역할을 수행하고 올바른 궤도를 유지하는데 필요한 정보들이다 위성탑재 소프트웨어는 하드웨어 데이터나 위성의 상태 데이터를 심해진 시간간격마다 일어 메모리에 저장해 두는 일을 한다. 다목적실용위성 2호에서 이러한 데이터 획득을 자동적으로 수행하기 위해 매 시간간격마다 요구되는 데이터를 테이블 형식으로 헤더파일에 생성하는 프로그램을 구현하였다. 이 구현된 프로그램을 이용하여 다목적실용위성 2호의 탑재소프트웨어가 개발되고 있다.

  • PDF

The Study of Implementation of Sign Board Receiving DARC for Vehicle 3. The Management of Sign Board Information (차량용 FM부가방송 수신 전광판의 구현에 관한 연구 3. 차량용 FM 부가방송 수신 전광판 시스템 정보 관리)

  • 최재석;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1181-1186
    • /
    • 2002
  • This system is controlled by PC application programs through USB interface. PC application programs make image files, user's files , sound files and option files. And these files are downloaded to external memory card of this system. The other PC application programs monitor status of DARC, GPS, LED module of this system. The PC application programs help user manage this system efficiently.

Development of Water Profile Visualization Method for Water Level Data Quality Management (수위자료의 품질관리를 위한 수위의 공간적 변화 시각화 기법 개발)

  • Park, Hee-Seong;Cho, Herin;Kim, Hyoungseop
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.505-505
    • /
    • 2015
  • 수위자료는 유량을 판단하기 위한 기초적인 수문자료이다. 하지만 관측자료는 항상 오류 가능성이 있으므로 이에 대해 지속적인 품질관리가 요구된다. 일반적으로 수위자료는 단일 지점에서 시간에 따라 수집되므로 시간에 따른 변화 등을 이용하여 수위자료의 오류 여부를 판단한다. 하지만 실제 수위자료는 상류와 하류가 공간적으로 연결되어 있으므로 상 하류의 관계를 비교함으로써 수위자료의 오류 여부를 판단하는 것도 가능할 것이다. 이에 본 논문에서는 하천의 수위자료를 해발수위 자료로 변환하여 하구로부터의 거리를 이용해 도시함으로써 수위 프로파일을 시각화하고 그 변화를 고찰함으로써 수위자료의 시공간적인 변화를 이용해 수위 오류를 찾을 수 있는 시각화 기법을 개발하였다. 그림 1에서 보는 것과 같이 각 관측소 수위의 정상 경사와 역 경사를 시간별로 구분하고 이를 연속적으로 추적함으로써 수위자료의 오류와 수위관측소 제원 정보의 오류 등을 찾는데 도움을 줄 수 있으며, 수위자료에 대한 향상된 품질관리를 가능하게 할 것이다.

  • PDF

Security Credential Management & Pilot Policy of U.S. Government in Intelligent Transport Environment (지능형 교통 환경에서 미국정부의 보안인증관리 & Pilot 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.13-19
    • /
    • 2019
  • This paper analyzed the SCMS and pilot policy, which is pursued by the U.S. government in connected vehicles. SCMS ensures authentication, integrity, privacy and interoperability. The SCMS Support Committee of U.S. government has established the National Unit SCMS and is responsible for system-wide control. Of course, it introduces security policy, procedures and training programs making. In this paper, the need for SCMS to be applied to C-ITS was discussed. The structure of the SCMS was analyzed and the U.S. government's filot policy for connected vehicles was discussed. The discussion of the need for SCMS highlighted the importance of the role and responsibilities of SCMS between vehicles and vehicles. The security certificate management system looked at the structure and analyzed the type of certificate used in the vehicle or road side unit (RSU). The functions and characteristics of the certificates were reviewed. In addition, the functions of basic safety messages were analyzed with consideration of the detection and warning functions of abnormal behavior in SCMS. Finally, the status of the pilot project for connected vehicles currently being pursued by the U.S. government was analyzed. In addition to the environment used for the test, the relevant messages were also discussed. We also looked at some of the issues that arise in the course of the pilot project.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

A Study on the Malware Realtime Analysis Systems Using the Finite Automata (유한 오토마타를 이용한 악성코드 실시간 분석 시스템에 관한 연구)

  • Kim, Hyo-Nam;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.69-76
    • /
    • 2013
  • In the recent years, cyber attacks by malicious codes called malware has become a social problem. With the explosive appearance and increase of new malware, innumerable disasters caused by metaphoric malware using the existing malicious codes have been reported. To secure more effective detection of malicious codes, in other words, to make a more accurate judgment as to whether suspicious files are malicious or not, this study introduces the malware analysis system, which is based on a profiling technique using the Finite Automata. This new analysis system enables realtime automatic detection of malware with its optimized partial execution method. In this paper, the functions used within a file are expressed by finite automata to find their correlation, and a realtime malware analysis system enabling us to give an immediate judgment as to whether a file is contaminated by malware is suggested.

Proper Regulation of the Cutoff System in Offshore Landfill Built on Clay Ground with Double Walls (점토지반에 이중벽체가 적용된 해상폐기물매립장의 적정 차수 기준)

  • Hwang, Woong-Ki;Kim, Hyang-Eun;Choi, Hoseong;Kim, Tae-Hyung
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.8
    • /
    • pp.5-15
    • /
    • 2019
  • This study was conducted to propose a reasonable requirement regulation of cutoff barriers composed of bottom layer and vertical barrier of offshore landfill for the prevention of contaminant leakage. The bottom layer was composed of impermeable clay layer; vertical walls were composed of double walls; outer wall was composed of steel sheet pile which registed against outer force; cutoff vertical barrier took the role of inner wall. Seepage-advection-dispersion numerical analysis was conducted using SEEP/W and CTRAN/W programs under steady and unsteady flows. The results showed that the values calculated under steady flow showed higher migration of pollutant than those of unsteady flow. The values calculated under steady flow are more valid from a design point of view. Under steady flow and the bottom clay layer and when the vertical barrier are homogeneous and completely well installed, respectively, the minimum required cutoff regulations for hydraulic conductivity, thickness, and embedded depth of the bottom clay layer and vertical barrier were suggested.