• Title/Summary/Keyword: 침입모델

Search Result 374, Processing Time 0.028 seconds

Estimation of Mechanical Properties of Sand Asphalt Concrete based on Physical Properties of Binder (결합재의 물리적 성질을 이용한 샌드아스팔트 혼합물의 강도특성 추정)

  • Kim, Kwang-Woo;Lee, Soon-Jae;Lee, Gi-Ho;Lee, Sung-Hoon;Lee, Byung-Duck
    • International Journal of Highway Engineering
    • /
    • v.4 no.1 s.11
    • /
    • pp.149-159
    • /
    • 2002
  • This study was performed to estimate the high-speed direct tensile strength(DTS1), low-speed direct tensile strength(DTS2) , indirect tensile strength(ITS) resilient modulus(MR) and stiffness index(SI) of sand asphalt mixture based on the absolute viscosity, kinematic viscosity, penetration, softening point and PG grade of binder. DTS2 showed higher correlation with the physical properties than other properties of mixture, and the next was DTS1, ITS, SI and MR in order. Among binder properties, PG grade showed the highest relation with DTS2. Therefore. it was found that the high DTS mixture could be made when the binder with a high PG grade was used. However, since the individual physical property showed a relatively low correlation, various properties were used together in regression analysis. The estimation models of DTS and ITS were over 0.99, respectively. R2 of MR and SI estimation models were over 0.91 and 0.93, respectively. It was concluded that mechanical properties could be estimated with a high coefficient of determination from those physical properties.

  • PDF

Anomaly detection and attack type classification mechanism using Extra Tree and ANN (Extra Tree와 ANN을 활용한 이상 탐지 및 공격 유형 분류 메커니즘)

  • Kim, Min-Gyu;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.79-85
    • /
    • 2022
  • Anomaly detection is a method to detect and block abnormal data flows in general users' data sets. The previously known method is a method of detecting and defending an attack based on a signature using the signature of an already known attack. This has the advantage of a low false positive rate, but the problem is that it is very vulnerable to a zero-day vulnerability attack or a modified attack. However, in the case of anomaly detection, there is a disadvantage that the false positive rate is high, but it has the advantage of being able to identify, detect, and block zero-day vulnerability attacks or modified attacks, so related studies are being actively conducted. In this study, we want to deal with these anomaly detection mechanisms, and we propose a new mechanism that performs both anomaly detection and classification while supplementing the high false positive rate mentioned above. In this study, the experiment was conducted with five configurations considering the characteristics of various algorithms. As a result, the model showing the best accuracy was proposed as the result of this study. After detecting an attack by applying the Extra Tree and Three-layer ANN at the same time, the attack type is classified using the Extra Tree for the classified attack data. In this study, verification was performed on the NSL-KDD data set, and the accuracy was 99.8%, 99.1%, 98.9%, 98.7%, and 97.9% for Normal, Dos, Probe, U2R, and R2L, respectively. This configuration showed superior performance compared to other models.

Development of a Probabilistic Joint Opening Model using the LTPP Data (LTPP Data를 이용한 확률론적 줄눈폭 예측 모델 개발)

  • Lee, Seung Woo;Chon, Sung Jae;Jeong, Jin Hoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.593-600
    • /
    • 2006
  • Joint opening of jointed concrete pavement is caused by change in temperature and humidity of adjoined slab. The magnitude of joint opening influences on the load-transfer-efficiency and the behavior of sealant. If temperature or humidity decreases, joint opening increases. Generally maximum joint opening of a given joint is predicted by using AASHTO equation. While different magnitudes of joint opening at the individual joints have been observed in a given pavement section, AASHTO equation is limited to predict average joint opening in a given pavement section. Therefore the AASHTO equation may underestimate maximum joint for the half of joint in a given pavement section. Joints showing larger opening than the designed may experience early joint sealant failure, early faulting. Also unexpected spalling may be followed due to invasion of fine aggregate into the joints after sealant pop-off. In this study, the variation of the joint opening in a given pavement section was investigated based on the LTPP SMP data. Factors affecting on the variation are explored. Finally a probabilistic joint opening model is developed. This model can account for the reliability of the magnitude of joint opening so that the designer can select the ratio of underestimated joint opening.

A Management Plan According to the Estimation of Nutria (Myocastorcoypus) Distribution Density and Potential Suitable Habitat (뉴트리아(Myocastor coypus) 분포밀도 및 잠재적 서식가능지역 예측에 따른 관리방향)

  • Kim, Areum;Kim, Young-Chae;Lee, Do-Hun
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.2
    • /
    • pp.203-214
    • /
    • 2018
  • The purpose of this study is to estimate the concentrated distribution area of nutria (Myocastor coypus) and potential suitable habitat and to provide useful data for the effective management direction setting. Based on the nationwide distribution data of nutria, the cross-validation value was applied to analyze the distribution density. As a result, the concentrated distribution areas thatrequired preferential elimination is found in 14 administrative areas including Busan Metropolitan City, Daegu Metropolitan City, 11 cities and counties in Gyeongsangnam-do and 1 county in Gyeongsangbuk-do. In the potential suitable habitat estimation using a MaxEnt (Maximum Entropy) model, the possibility of emergency was found in the Nakdong River middle and lower stream area and the Seomjin riverlower stream area and Gahwacheon River area. As for the contribution by variables of a model, it showed DEM, precipitation of driest month, min temperature of coldest month and distance from river had contribution from the highest order. In terms of the relation with the probability of appearance, the probability of emergence was higher than the threshold value in areas with less than 34m of altitude, with $-5.7^{\circ}C{\sim}-0.6^{\circ}C$ of min temperature of the coldest month, with 15-30mm of precipitation of the driest month and with less than 1,373m away from the river. Variables that Altitude, existence of water and wintertemperature affected settlement and expansion of nutria, considering the research results and the physiological and ecological characteristics of nutria. Therefore, it is necessary to reflect them as important variables in the future habitable area detection and expansion estimation modeling. It must be essential to distinguish the concentrated distribution area and the management area of invasive alien species such as nutria and to establish and apply a suitable management strategy to the management site for the permanent control. The results in this study can be used as useful data for a strategic management such as rapid management on the preferential management area and preemptive and preventive management on the possible spreading area.

Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders (비지도학습 오토 엔코더를 활용한 네트워크 이상 검출 기술)

  • Kang, Koohong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.617-629
    • /
    • 2020
  • In order to overcome the limitations of the rule-based intrusion detection system due to changes in Internet computing environments, the emergence of new services, and creativity of attackers, network anomaly detection (NAD) using machine learning and deep learning technologies has received much attention. Most of these existing machine learning and deep learning technologies for NAD use supervised learning methods to learn a set of training data set labeled 'normal' and 'attack'. This paper presents the feasibility of the unsupervised learning AutoEncoder(AE) to NAD from data sets collecting of secured network traffic without labeled responses. To verify the performance of the proposed AE mode, we present the experimental results in terms of accuracy, precision, recall, f1-score, and ROC AUC value on the NSL-KDD training and test data sets. In particular, we model a reference AE through the deep analysis of diverse AEs varying hyper-parameters such as the number of layers as well as considering the regularization and denoising effects. The reference model shows the f1-scores 90.4% and 89% of binary classification on the KDDTest+ and KDDTest-21 test data sets based on the threshold of the 82-th percentile of the AE reconstruction error of the training data set.

흑염소의 체내수정란 생산에 관한 연구

  • 최창용;조숙현;한만희;권응기;최성복;최연호;최순호;손동수;최상용
    • Proceedings of the Korean Society of Embryo Transfer Conference
    • /
    • 2002.11a
    • /
    • pp.86-86
    • /
    • 2002
  • 면양과 염소가 최근 수십년동안 세계여러 나라에서 번식생리의 연구를 위한 모델로 사용되어 왔는데, 체내수정란의 생산에 관한 영역도 유럽을 중심으로 활발하게 연구되어왔다. 수정란생산을 위한 발정동기화방법, 과배란처리 및 수정란회수방법 기술은 현재 상당히 많은 기술진척이 이루어진 상태이나, 우리나라 고유의 재래유전자원인 흑염소에는 이를 위한 기술이 미진한 실정이므로 본 실험에서는 흑염소의 체내수정란생산기술을 확립하여 재래가축 유전자원보존을 위한 기초기술을 마련하고자 한다. 축산기술연구소 남원지소에서 사육하고 있는 체중 20kg 이상의 건강한 흑염소를 이용하여 발정동기화를 위해 controlled intravaginal drug release(CIDR)를 질내에 14일 동안 삽입하고, 과배란처리는 FSH를 CIDR 삽입 12, 13, 14일째에 12시간 간격으로 점감법으로 총20mg을 투여하였으며, PGF$_2$a를 13일째 FSH와 함께 투여하였다. CIDR는 14일째의 아침에 제거하였다. 수컷과의 교미는 CIDR제거 24시간후에 GnRH를 투여와 동시에 실시하였으며, 채란은 교미후 3일째에 외과적인 방법으로 실시하였다. CIDR처리경과에 따른 progesterone농도는 CIDR 주입시 바로 수치가 상승하여 제거전까지 6~12ng/m1의 농도를 유지하였으며, 제거즉시 2ng/ml 이하로 떨어졌다. 채란시 평균 배란점은 16.5개, 미배란난포 9.8개였으며, 회수수정란은 6.0개를 나타내어 채란율은 36.4%를 나타내었다. 회수된 수정란의 발달단계는 4-cell 78.9%, 2-cell 5.3%, fragmentation 15.8%를 나타내었다. 이와 같은 체내수정란생산방법을 기반으로 하여 이후 수정란의 동결 및 수정란이식기법에 관한 연구를 수행한다면 우리나라의 재래가축인 흑염소의 유전자원 장기보존과 생산성향상에 기여할 것으로 사료된다.배양액에 30 embryos/50ul 소적으로하여 38.8$^{\circ}C$, 5% $CO_2$의 탄산가스 배양기에서 각각 7일간 배양을 실시하였다. 조사된 결과는 SAS/STAT를 이용하여 통계분석을 실시하였다. 체외수정 12시간 후에 난자 급속 염색법으로 염색을 실시한 결과, 모든 처리구에서 핵성숙률(76.4~95.2%), 정자침투율(51.1~66.9%), 웅성전핵형성률(95.2~100%), 다정자침입률(18.2~25.6%) 및 평균침입정자수(1.2~l.4개)에서 유의적인 차이가 인정되지 않았다. 체외배양 48시간 난할률을 조사한 결과, 처리구별 차이(53.9~67.9%)는 인정되지 않았으나, 배양 7일째 배반포형성률은 각각 14.5, 25.4, 17.3 및 12.4%로서 25uM의 $\beta$-ME처리구가 유의적(P<0.05)으로 높은 배발달률을 나타내었고, 총세포수에 있어서는 대조구와 처리구간 유의적인 차이가 인정되지 않았다. 따라서 돼지 난포란을 성숙배양할 때, 25uM $\beta$-ME를 첨가배양하는 것이 양질의 돼지체외수정란을 생산하는 하나의 방법으로 조사되었다.다.natural objects and was popular at the time of Yukjo Dynasty, and there are some documents of that period left both in Japan and Korea. "Hyojedo" in Korea is supposed to have been influenced by the letter design. Asite- is also considered to have been "Japanese Letter Jobcheso." Therefore, the purpose of this study is to look into the origin

  • PDF

Energy Efficient Clustering Algorithm for Surveillance and Reconnaissance Applications in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 감시·정찰 응용의 클러스터링 알고리즘 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Jiheon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1170-1181
    • /
    • 2012
  • Wireless Sensor Networks(WSNs) are used in diverse applications. In general, sensor nodes that are easily deployed on specific areas have many resource constrains such as battery power, memory sizes, MCUs, RFs and so on. Hence, first of all, the efficient energy consumption is strongly required in WSNs. In terms of event states, event-driven deliverly model (i.e. surveillance and reconnaissance applications) has several characteristics. On the basis of such a model, clustering algorithms can be mostly used to manage sensor nodes' energy efficiently owing to the advantages of data aggregations. Since a specific node collects packets from its child nodes in a network topology and aggregates them into one packet to relay them once, amount of transmitted packets to a sink node can be reduced. However, most clustering algorithms have been designed without considering can be reduced. However, most clustering algorithms have been designed without considering characteristics of event-driven deliverly model, which results in some problems. In this paper, we propose enhanced clustering algorithms regarding with both targets' movement and energy efficiency in order for applications of surveillance and reconnaissance. These algorithms form some clusters to contend locally between nodes, which have already detected certain targets, by using a method which called CHEW (Cluster Head Election Window). Therefore, our proposed algorithms enable to reduce not only the cost of cluster maintenance, but also energy consumption. In conclusion, we analyze traces of the clusters' movements according to targets' locations, evaluate the traces' results and we compare our algorithms with others through simulations. Finally, we verify our algorithms use power energy efficiently.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Numerical Simulation on Control of Tsunami by Resonator (I) (for Imwon and Mukho ports) (공진장치에 의한 지진해일파의 제어에 관한 수치시뮬레이션(I) (임원항과 묵호항에 대해))

  • Lee, Kwang-Ho;Jeon, Jong-Hyeok;Kim, Do-Sam;Lee, Yun-Du
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.6
    • /
    • pp.481-495
    • /
    • 2020
  • After the resonator on the basis of the wave-filter theory was designed to control the waves with a specific frequency range surging into the harbor, the several case with the use of resonator have been reported in some part of sea, including the port of Long Beach, USA, and yacht harbor at Rome, Italy in order to control the long-period wave motion from the vessels. Recently, the utility and applicability of the resonator has been sufficiently verified in respect of the control of tsunami approximated as the solitary wave and/or the super long-period waves. However, the case with the application of tsunami in the real sea have not been reported yet. In this research, the respective case with the use of existing resonator at the port of Mukho and Imwon located in the eastern coast of South Korea were studied by using the numerical analysis through the COMCOT model adapting the reduction rate of 1983 Central East Sea tsunami and 1993 Hokkaido Southwest off tsunami. Consequently, the effectiveness of resonator against tsunami in the real sea was confirmed through the reduction rate of maximum 40~50% at the port of Mukho, and maximum 21% at the port of Imwom, respectively. In addition, it was concluded that it is necessary to study about the various case with application of different shape, arrangement, and size of resonator in order to design the optimal resonator considering the site condition.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.