• Title/Summary/Keyword: 탐지 확률

Search Result 263, Processing Time 0.026 seconds

Maximizing the capacity of the IoT-based WSNs by employing the MIM capability (MIM 적용을 통한 IoT 기반 무선 센서 네트워크 성능 최대화 방안)

  • Kang, Young-myoung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.9-15
    • /
    • 2020
  • Wireless sensor nodes adopting the advanced preamble detection function, Message-In-Mesage (MIM), maximize the concurrent transmission opportunities due to the capture effect, result in improving the system performance significantly compared to the legacy IEEE 802.15.4 based sensor devices. In this paper, we propose an MIM capture probability model to analyze the performance gains by applying the MIM function to the wireless sensor nodes. We implemented the IEEE 802.15.4 and MIM by Python and performed extensive simulations to verify the performance gains through MIM capture effects. The evaluation results show that the MIM sensors achieve 34% system throughput gains and 31% transmission delay gains over the legacy IEEE 802.15.4-based sensors, which confirm that it was consistent with the analysis result of the proposed MIM capture probability model.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

Extracting Patterns of Airport Approach Using Gaussian Mixture Models and Analyzing the Overshoot Probabilities (가우시안 혼합모델을 이용한 공항 접근 패턴 추출 및 패턴 별 과이탈 확률 분석)

  • Jaeyoung Ryu;Seong-Min Han;Hak-Tae Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.888-896
    • /
    • 2023
  • When an aircraft is landing, it is expected that the aircraft will follow a specified approach procedure and then land at the airport. However, depending on the airport situation, neighbouring aircraft or the instructions of the air traffic controller, there can be a deviation from the specified approach. Detecting aircraft approach patterns is necessary for traffic flow and flight safety, and this paper suggests clustering techniques to identify aircraft patterns in the approach segment. The Gaussian Mixture Model (GMM), one of the machine learning techniques, is used to cluster the trajectories of aircraft, and ADS-B data from aircraft landing at the Gimhae airport in 2019 are used. The aircraft trajectories are clustered on the plane, and a total of 86 approach trajectory patterns are extracted using the centroid value of each cluster. Considering the correlation between the approach procedure pattern and overshoots, the distribution of overshoots is calculated.

Underwater Telemetering by Ultrasonic Multi-Beam Transducer (Multi-Beam 초음파진동자의 수중원격제어에 관한 연구)

  • Choe, Han-Gyu;Sin, Hyeong-Il
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.27 no.1
    • /
    • pp.31-40
    • /
    • 1991
  • This paper described on the availability fo the underwater telemetering by the ulterasonic multi-beam system made as a trial to expand detectable range of the fish school. The ultrasonic multi-beam system consisted of four transducers which reconstructed with the existing net recorder. The experiment for the telemetering carried out in the set net fishing ground. The results obtained are summerized as follows: 1. The detectable distance of a target by the linear arrangement of four transducers increased according to the sea depth and the interval between transducers. 2. When the fish school in the entrance of set net was measured by linear arrangement of transducers it was entered in depth of 2.5~3.5m at near position of leader, and in depth of 3.5~4.5m at near position of door net. 3. The deviations of error between the actual position and the position by transducer in case of the target depth 1m, 1.5m, 2m were 5.9~27.1cm, 3.2~28.9cm, 3.5~25.8cm respectively, and 68.3% probability radius of them were 14.6cm, 17.7cm, 17.0cm respectively. 4. When the fish school in the fish court of set net was measured by plane arrangement of transducer it was entered toward the opposite direction of tide current. 5. The available distance of telemetering by the multi-beam transducer was 1.8km and the telemetering was possible to control everywhere in case of sea depth more than three meters.

  • PDF

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

Cavitation signal detection based on time-series signal statistics (시계열 신호 통계량 기반 캐비테이션 신호 탐지)

  • Haesang Yang;Ha-Min Choi;Sock-Kyu Lee;Woojae Seong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.4
    • /
    • pp.400-405
    • /
    • 2024
  • When cavitation noise occurs in ship propellers, the level of underwater radiated noise abruptly increases, which can be a critical threat factor as it increases the probability of detection, particularly in the case of naval vessels. Therefore, accurately and promptly assessing cavitation signals is crucial for improving the survivability of submarines. Traditionally, techniques for determining cavitation occurrence have mainly relied on assessing acoustic/vibration levels measured by sensors above a certain threshold, or using the Detection of Envelop Modulation On Noise (DEMON) method. However, technologies related to this rely on a physical understanding of cavitation phenomena and subjective criteria based on user experience, involving multiple procedures, thus necessitating the development of techniques for early automatic recognition of cavitation signals. In this paper, we propose an algorithm that automatically detects cavitation occurrence based on simple statistical features reflecting cavitation characteristics extracted from acoustic signals measured by sensors attached to the hull. The performance of the proposed technique is evaluated depending on the number of sensors and model test conditions. It was confirmed that by sufficiently training the characteristics of cavitation reflected in signals measured by a single sensor, the occurrence of cavitation signals can be determined.

Anomaly Detection for User Action with Generative Adversarial Networks (적대적 생성 모델을 활용한 사용자 행위 이상 탐지 방법)

  • Choi, Nam woong;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.43-62
    • /
    • 2019
  • At one time, the anomaly detection sector dominated the method of determining whether there was an abnormality based on the statistics derived from specific data. This methodology was possible because the dimension of the data was simple in the past, so the classical statistical method could work effectively. However, as the characteristics of data have changed complexly in the era of big data, it has become more difficult to accurately analyze and predict the data that occurs throughout the industry in the conventional way. Therefore, SVM and Decision Tree based supervised learning algorithms were used. However, there is peculiarity that supervised learning based model can only accurately predict the test data, when the number of classes is equal to the number of normal classes and most of the data generated in the industry has unbalanced data class. Therefore, the predicted results are not always valid when supervised learning model is applied. In order to overcome these drawbacks, many studies now use the unsupervised learning-based model that is not influenced by class distribution, such as autoencoder or generative adversarial networks. In this paper, we propose a method to detect anomalies using generative adversarial networks. AnoGAN, introduced in the study of Thomas et al (2017), is a classification model that performs abnormal detection of medical images. It was composed of a Convolution Neural Net and was used in the field of detection. On the other hand, sequencing data abnormality detection using generative adversarial network is a lack of research papers compared to image data. Of course, in Li et al (2018), a study by Li et al (LSTM), a type of recurrent neural network, has proposed a model to classify the abnormities of numerical sequence data, but it has not been used for categorical sequence data, as well as feature matching method applied by salans et al.(2016). So it suggests that there are a number of studies to be tried on in the ideal classification of sequence data through a generative adversarial Network. In order to learn the sequence data, the structure of the generative adversarial networks is composed of LSTM, and the 2 stacked-LSTM of the generator is composed of 32-dim hidden unit layers and 64-dim hidden unit layers. The LSTM of the discriminator consists of 64-dim hidden unit layer were used. In the process of deriving abnormal scores from existing paper of Anomaly Detection for Sequence data, entropy values of probability of actual data are used in the process of deriving abnormal scores. but in this paper, as mentioned earlier, abnormal scores have been derived by using feature matching techniques. In addition, the process of optimizing latent variables was designed with LSTM to improve model performance. The modified form of generative adversarial model was more accurate in all experiments than the autoencoder in terms of precision and was approximately 7% higher in accuracy. In terms of Robustness, Generative adversarial networks also performed better than autoencoder. Because generative adversarial networks can learn data distribution from real categorical sequence data, Unaffected by a single normal data. But autoencoder is not. Result of Robustness test showed that he accuracy of the autocoder was 92%, the accuracy of the hostile neural network was 96%, and in terms of sensitivity, the autocoder was 40% and the hostile neural network was 51%. In this paper, experiments have also been conducted to show how much performance changes due to differences in the optimization structure of potential variables. As a result, the level of 1% was improved in terms of sensitivity. These results suggest that it presented a new perspective on optimizing latent variable that were relatively insignificant.

A Variable Hysteresis Comparator Circuit Controlled by Serial Digital Bits Against Jamming (교란 방어를 위하여 히스테리시스가 시리얼로 제어되는 가변 비교기 회로)

  • Kim, Young-Gi
    • Journal of IKEEE
    • /
    • v.16 no.1
    • /
    • pp.20-27
    • /
    • 2012
  • In order to overcome jamming, a hysteresis tunable monolithic comparator circuit based on a 0.35 ${\mu}m$ CMOS process is suggested, designed, fabricated, measured and analyzed in this paper. To tune the threshold voltage of the hysteresis in the comparator circuit, two external digital bits are used with supply voltage of 3.3V. An improved variable hysteresis comparator circuit controlled by serial digital bits is suggested, designed and simulated to overcome jamming in modern warfare.

Optimal Acoustic Search Path Planning Based on Genetic Algorithm in Discrete Path System (이산 경로 시스템에서 유전알고리듬을 이용한 최적음향탐색경로 전략)

  • CHO JUNG-HONG;KIM JUNG-HAE;KIM JEA-SOO;LIM JUN-SEOK;KIM SEONG-IL;KIM YOUNG-SUN
    • Journal of Ocean Engineering and Technology
    • /
    • v.20 no.1 s.68
    • /
    • pp.69-76
    • /
    • 2006
  • The design of efficient search path to maximize the Cumulative Detection Probability(CDP) is mainly dependent on experience and intuition when searcher detect the target using SONAR in the ocean. Recently with the advance of modeling and simulation method, it has been possible to access the optimization problems more systematically. In this paper, a method for the optimal search path calculation is developed based on the combination of the genetic algorithm and the calculation algorithm for detection range. We consider the discrete system for search path, space, and time, and use the movement direction of the SONAR for the gene of the genetic algorithm. The developed algorithm, OASPP(Optimal Acoustic Search Path Planning), is shown to be effective, via a simulation, finding the optimal search path for the case when the intuitive solution exists. Also, OASPP is compared with other algorithms for the measure of efficiency to maximize CDP.

Numerical Analysis Method for Target Strength and Experimental Verification (표적강도 수치해석 기법 개발과 실험적 검증)

  • Choi Y. H.;Kim J. S.;Shin K. C.;You J. S.;Joo W. H.;Kim Y. H.;Park J. H.;Choi S. M.;Kim W. S.
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.171-174
    • /
    • 2004
  • 표적강도는 수중 산란체의 능동 탐지 확률을 좌우하는 중요한 변수중 하나이며 산란체의 기하학적 형상에 의해 결정이 되기 때문에 수치해석을 통한 해석 및 예측이 가능하다. 수치해석 기법은 현재 여러 가지가 알려져 있으며, 그중 Kirchhoff approximation이 다른 해석 기법에 비해 거울면 반사특성의 산란해석에 적합하며, 프로그램으로의 적용이 용이하다는 장점으로 인해 많이 사용되고 있다. 본 연구에서는 이러한 장점에 의거하여 Kirchhoff approximation을 이용하여 표적강도 수치해석 프로그램을 개발 및 검증하였다. 프로그램의 성능 검증은 원통형 산란체에 대한 이론해 검증과 원통형 실험 산란체를 통한 실험 검증을 수행하였다.

  • PDF