• Title/Summary/Keyword: 탐지 모델

Search Result 1,644, Processing Time 0.029 seconds

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

Linguistic Features Discrimination for Social Issue Risk Classification (사회적 이슈 리스크 유형 분류를 위한 어휘 자질 선별)

  • Oh, Hyo-Jung;Yun, Bo-Hyun;Kim, Chan-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.541-548
    • /
    • 2016
  • The use of social media is already essential as a source of information for listening user's various opinions and monitoring. We define social 'risks' that issues effect negative influences for public opinion in social media. This paper aims to discriminate various linguistic features and reveal their effects for building an automatic classification model of social risks. Expecially we adopt a word embedding technique for representation of linguistic clues in risk sentences. As a preliminary experiment to analyze characteristics of individual features, we revise errors in automatic linguistic analysis. At the result, the most important feature is NE (Named Entity) information and the best condition is when combine basic linguistic features. word embedding, and word clusters within core predicates. Experimental results under the real situation in social bigdata - including linguistic analysis errors - show 92.08% and 85.84% in precision respectively for frequent risk categories set and full test set.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Analysis of acoustic scattering characteristics of an aluminum spherical shell with different internal fluids and classification using pseudo Wigner-Ville distribution (구형 알루미늄 쉘 내부의 충전 유체에 따른 수중 음향 산란 특성 분석 및 유사 위그너-빌 분포를 이용한 식별 기법 연구)

  • Choo, Yeon-Seong;Byun, Sung-Hoon;Kim, Sea-Moon;Lee, Keunhwa
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.549-557
    • /
    • 2019
  • The acoustical scattering characteristics of a target are influenced by the material properties and structural characteristics of the target, which are critical information for acoustic detection and identification of underwater target. In particular, for thin elastic target, unique scattered signals are generated around the target by the Lamb wave. In this paper, the results of scattered signal measurement of aluminum spherical shell in the water tank using the stepped frequency sweep sine signal are presented. In particular, the scattering of the water-filled aluminum spherical shell is compared with that of the air-filled one both theoretically and experimentally. The difference of the scattered signals are analyzed using the pseudo Wigner-Ville distribution in terms of average frequency, frequency distribution, and energy of the scattered signal. The result shows that all observed parameters increased when the aluminum sphere was water-filled, and it is well matched to the theoretical expectation.

Transmission waveform design for compressive sensing active sonar using the matrix projection from Gram matrix to identity matrix and a constraint for bandwidth (대역폭 제한 조건과 Gram 행렬의 단위행렬로의 사영을 이용한 압축센싱 능동소나 송신파형 설계)

  • Lee, Sehyun;Lee, Keunhwa;Lim, Jun-Seok;Cheong, Myoung-Jun
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.522-533
    • /
    • 2019
  • The compressive sensing model for range-Doppler estimation can be expressed as an under-determined linear system y = Ax. To find the solution of the linear system with the compressive sensing method, matrix A should be sufficiently incoherent and x to be sparse. In this paper, we propose a transmission waveform design method that maintains the bandwidth required by the sonar system while lowering the mutual coherence of the matrix A so that the matrix A is incoherent. The proposed method combines two methods of optimizing the sensing matrix with the alternating projection and suppressing unwanted frequency bands using the DFT (Discrete Fourier Transform) matrix. We compare range-Doppler estimation performance of existing waveform LFM(Linear Frequency Modulated) and designed waveform using the matched filter and the compressive sensing method. Simulation shows that the designed transmission waveform has better detection performance than the existing waveform LFM.

Three-dimensional Seismic Refraction Travel Time Tomography for Dipping Two Layers (경사 2층 구조를 위한 3차원 굴절탄성파 주시 토모그래피)

  • Cho Dong-heng;Cho Kwang-ho
    • Geophysics and Geophysical Exploration
    • /
    • v.1 no.1
    • /
    • pp.19-24
    • /
    • 1998
  • This paper deals with tomographic travel time inversion of three dimensional seismic refraction survey conducted over a dipping interface. The slowness, and thus velocity as its reciprocal, distribution on the subsurface interface is to be determined applying an ART with under-relaxtion parameter. The models chosen are realistic, i.e., most likely to be met in engineering seismics, and the interface includes anomalous zones. It is found that, generally speaking, the inversion could be misleading or meaningless without the correction of the dip of the interface. This is rather surprising when we recall that usual assumption for the interpretation of refraction seismics data is the horizontal attitude of structures within the limit of $15^{\circ}$ dip or so. To make the present method tenable for a new means of routine seismics, some practical ways of identifying head wave arrivals are to be devised.

  • PDF

Surface nuclear magnetic resonance signal contribution in conductive terrains (전도성 지질에서의 SNMR 신호 특성)

  • Hunter Don;Kepic Anton
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.1
    • /
    • pp.73-77
    • /
    • 2005
  • To correctly invert and interpret Surface Nuclear Magnetic Resonance (SNMR) data collected in conductive terrains, an accurate estimate of subsurface conductivity structure is required. Given such an estimate, it would be useful to determine, before conducting an SNMR sounding, whether or not the conductivity structure would prevent groundwater being detected. Using SNMR forward modelling, we describe a method of determining the depth range from which most of the SNMR signal originates, given a model of subsurface conductivity structure. We use the method to estimate SNMR depth penetration in a range of halfspace models and show that for conductive halfspaces ($<10{\Omega}.m$) the depth of penetration Is less than 50 m. It is also shown that for these halfspaces, increasing coincident loop size does not significantly improve depth penetration. The results can be used with halfspace approximations of more complicated ID conductivity structures to give a reasonable estimate of the depth range over which signal is obtainable in conductive terrains.

A Study on the Analysis of Background Object Using Deep Learning in Augmented Reality Game (증강현실 게임에서 딥러닝을 활용한 배경객체 분석에 관한 연구)

  • Kim, Han-Ho;Lee, Dong-Lyeor
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.38-43
    • /
    • 2021
  • As the number of augmented reality games using augmented reality technology increases, the demands of users are also increasing. Game technologies used in augmented reality games are mainly games using MARKER, MARKERLESS, GPS, etc. Games using this technology can augment the background and other objects. To solve this problem, we want to help develop augmented reality games by analyzing objects in the background, which is an important element of augmented reality. To analyze the background in the augmented reality game, the background object was analyzed by applying a deep learning model using TensorFlow Lite in the UNITY engine. Using this result, we obtained the result that augmented objects can be placed in the game according to the types of objects analyzed in the background. By utilizing this research, it will be possible to develop advanced augmented reality games by augmenting objects that fit the background.

The improved facial expression recognition algorithm for detecting abnormal symptoms in infants and young children (영유아 이상징후 감지를 위한 표정 인식 알고리즘 개선)

  • Kim, Yun-Su;Lee, Su-In;Seok, Jong-Won
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.430-436
    • /
    • 2021
  • The non-contact body temperature measurement system is one of the key factors, which is manage febrile diseases in mass facilities using optical and thermal imaging cameras. Conventional systems can only be used for simple body temperature measurement in the face area, because it is used only a deep learning-based face detection algorithm. So, there is a limit to detecting abnormal symptoms of the infants and young children, who have difficulty expressing their opinions. This paper proposes an improved facial expression recognition algorithm for detecting abnormal symptoms in infants and young children. The proposed method uses an object detection model to detect infants and young children in an image, then It acquires the coordinates of the eyes, nose, and mouth, which are key elements of facial expression recognition. Finally, facial expression recognition is performed by applying a selective sharpening filter based on the obtained coordinates. According to the experimental results, the proposed algorithm improved by 2.52%, 1.12%, and 2.29%, respectively, for the three expressions of neutral, happy, and sad in the UTK dataset.

Road Surface Damage Detection based on Object Recognition using Fast R-CNN (Fast R-CNN을 이용한 객체 인식 기반의 도로 노면 파손 탐지 기법)

  • Shim, Seungbo;Chun, Chanjun;Ryu, Seung-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.104-113
    • /
    • 2019
  • The road management institute needs lots of cost to repair road surface damage. These damages are inevitable due to natural factors and aging, but maintenance technologies for efficient repair of the broken road are needed. Various technologies have been developed and applied to cope with such a demand. Recently, maintenance technology for road surface damage repair is being developed using image information collected in the form of a black box installed in a vehicle. There are various methods to extract the damaged region, however, we will discuss the image recognition technology of the deep neural network structure that is actively studied recently. In this paper, we introduce a new neural network which can estimate the road damage and its location in the image by region-based convolution neural network algorithm. In order to develop the algorithm, about 600 images were collected through actual driving. Then, learning was carried out and compared with the existing model, we developed a neural network with 10.67% accuracy.