• Title/Summary/Keyword: 탐지 정확도

Search Result 1,561, Processing Time 0.034 seconds

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Design and Implementation of Machine Learning-based Blockchain DApp System (머신러닝 기반 블록체인 DApp 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, we developed a web-based DApp system based on a private blockchain by applying machine learning techniques to automatically identify Android malicious apps that are continuously increasing rapidly. The optimal machine learning model that provides 96.2587% accuracy for Android malicious app identification was selected to the authorized experimental data, and automatic identification results for Android malicious apps were recorded/managed in the Hyperledger Fabric blockchain system. In addition, a web-based DApp system was developed so that users who have been granted the proper authority can use the blockchain system. Therefore, it is possible to further improve the security in the Android mobile app usage environment through the development of the machine learning-based Android malicious app identification block chain DApp system presented. In the future, it is expected to be able to develop enhanced security services that combine machine learning and blockchain for general-purpose data.

Design and Implementation of CNN-Based Human Activity Recognition System using WiFi Signals (WiFi 신호를 활용한 CNN 기반 사람 행동 인식 시스템 설계 및 구현)

  • Chung, You-shin;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.299-304
    • /
    • 2021
  • Existing human activity recognition systems detect activities through devices such as wearable sensors and cameras. However, these methods require additional devices and costs, especially for cameras, which cause privacy issue. Using WiFi signals that are already installed can solve this problem. In this paper, we propose a CNN-based human activity recognition system using channel state information of WiFi signals, and present results of designing and implementing accelerated hardware structures. The system defined four possible behaviors during studying in indoor environments, and classified the channel state information of WiFi using convolutional neural network (CNN), showing and average accuracy of 91.86%. In addition, for acceleration, we present the results of an accelerated hardware structure design for fully connected layer with the highest computation volume on CNN classifiers. As a result of performance evaluation on FPGA device, it showed 4.28 times faster calculation time than software-based system.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Strawberry disease diagnosis service using EfficientNet (EfficientNet 활용한 딸기 병해 진단 서비스)

  • Lee, Chang Jun;Kim, Jin Seong;Park, Jun;Kim, Jun Yeong;Park, Sung Wook;Jung, Se Hoon;Sim, Chun Bo
    • Smart Media Journal
    • /
    • v.11 no.5
    • /
    • pp.26-37
    • /
    • 2022
  • In this paper, images are automatically acquired to control the initial disease of strawberries among facility cultivation crops, and disease analysis is performed using the EfficientNet model to inform farmers of disease status, and disease diagnosis service is proposed by experts. It is possible to obtain an image of the strawberry growth stage and quickly receive expert feedback after transmitting the disease diagnosis analysis results to farmers applications using the learned EfficientNet model. As a data set, farmers who are actually operating facility cultivation were recruited and images were acquired using the system, and the problem of lack of data was solved by using the draft image taken with a cell phone. Experimental results show that the accuracy of EfficientNet B0 to B7 is similar, so we adopt B0 with the fastest inference speed. For performance improvement, Fine-tuning was performed using a pre-trained model with ImageNet, and rapid performance improvement was confirmed from 100 Epoch. The proposed service is expected to increase production by quickly detecting initial diseases.

A Study On IoT Data Consistency in IoT Environment (사물인터넷 환경에서 IoT 데이터 정합성 연구)

  • Choi, Changwon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.127-132
    • /
    • 2022
  • As the IoT technology is more developed, it is more important for the accuracy of IoT data. Since the IoT data supports a different formats and protocols, it is often happened that the IoT system is failed or the incorrect data is generated with the unreliable IoT devices(sensor, actuator). Because the abnormality of IoT device or the user situation is not detected correctly, this problem makes the user to be unsatisfied with the IoT system. This study proposes the decision methodology of IoT data consistency whether the IoT data is generated in normal range or not by using the mathematical functions('gradient descent function' and 'linear regression function'). It may be concluded that the gradient function method is suitable for the IoT data which the 'increasing velocity' is related with the next generated pattern(eg. sensor devices), the linear regression function method is suitable for the IoT data which the 'the difference from linear regression function' is related with the next generated pattern in case the data has a linear pattern(eg. water meter, electric meter).

Research Trend of the Remote Sensing Image Analysis Using Deep Learning (딥러닝을 이용한 원격탐사 영상분석 연구동향)

  • Kim, Hyungwoo;Kim, Minho;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.819-834
    • /
    • 2022
  • Artificial Intelligence (AI) techniques have been effectively used for image classification, object detection, and image segmentation. Along with the recent advancement of computing power, deep learning models can build deeper and thicker networks and achieve better performance by creating more appropriate feature maps based on effective activation functions and optimizer algorithms. This review paper examined technical and academic trends of Convolutional Neural Network (CNN) and Transformer models that are emerging techniques in remote sensing and suggested their utilization strategies and development directions. A timely supply of satellite images and real-time processing for deep learning to cope with disaster monitoring will be required for future work. In addition, a big data platform dedicated to satellite images should be developed and integrated with drone and Closed-circuit Television (CCTV) images.

OLE File Analysis and Malware Detection using Machine Learning

  • Choi, Hyeong Kyu;Kang, Ah Reum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.149-156
    • /
    • 2022
  • Recently, there have been many reports of document-type malicious code injecting malicious code into Microsoft Office files. Document-type malicious code is often hidden by encoding the malicious code in the document. Therefore, document-type malware can easily bypass anti-virus programs. We found that malicious code was inserted into the Visual Basic for Applications (VBA) macro, a function supported by Microsoft Office. Malicious codes such as shellcodes that run external programs and URL-related codes that download files from external URLs were identified. We selected 354 keywords repeatedly appearing in malicious Microsoft Office files and defined the number of times each keyword appears in the body of the document as a feature. We performed machine learning with SVM, naïve Bayes, logistic regression, and random forest algorithms. As a result, each algorithm showed accuracies of 0.994, 0.659, 0.995, and 0.998, respectively.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.

Light-weight Classification Model for Android Malware through the Dimensional Reduction of API Call Sequence using PCA

  • Jeon, Dong-Ha;Lee, Soo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.123-130
    • /
    • 2022
  • Recently, studies on the detection and classification of Android malware based on API Call sequence have been actively carried out. However, API Call sequence based malware classification has serious limitations such as excessive time and resource consumption in terms of malware analysis and learning model construction due to the vast amount of data and high-dimensional characteristic of features. In this study, we analyzed various classification models such as LightGBM, Random Forest, and k-Nearest Neighbors after significantly reducing the dimension of features using PCA(Principal Component Analysis) for CICAndMal2020 dataset containing vast API Call information. The experimental result shows that PCA significantly reduces the dimension of features while maintaining the characteristics of the original data and achieves efficient malware classification performance. Both binary classification and multi-class classification achieve higher levels of accuracy than previous studies, even if the data characteristics were reduced to less than 1% of the total size.