• Title/Summary/Keyword: 탐지 확률

Search Result 263, Processing Time 0.029 seconds

Normal Behavior Profiling based on Bayesian Network for Anomaly Intrusion Detection (이상 침입 탐지를 위한 베이지안 네트워크 기반의 정상행위 프로파일링)

  • 차병래;박경우;서재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.103-113
    • /
    • 2003
  • Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles. and detectes anomaly intrusions effectively. Anomaly detections using system calls are detected only anomaly processes. But this has a Problem that doesn't detect affected various Part by anomaly processes. To improve this problem, the relation among system calls of processes is represented by bayesian probability values. Application behavior profiling by Bayesian Network supports anomaly intrusion informations . This paper overcomes the Problems of various intrusion detection models we Propose effective intrusion detection technique using Bayesian Networks. we have profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions we had simulation by proposed normal behavior profiling technique using UNM data.

  • PDF

Study on Combat Efficiency According to Change in Quantity of Small Reconnaissance Drones in the Infantry Company Responsibility Area (중대급 작전지역에서 소형 감시정찰 드론의 수량 변화에 따른 전투 효율 연구)

  • Kyongsoo, Kim;Yongchan, Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.23-31
    • /
    • 2022
  • The development of innovative technology through the 4th Industrial Revolution is actively used in the defense field. In particular, surveillance and reconnaissance capabilities using drones will be of great help to the development of military combat capabilities, such as preparing for future military personnel reductions and reinforcing alert capabilities. In this study, we analyze the combat efficiency of drones how helpful drones can be to the military operations through simulations. Drones and enemy move in the efficient shortest path within a two-dimensional space in which operational areas are mapped into number such as detection probability. Based on the detection probability of an enemy infiltrating along the path with the lowest detection probability, the detection probability change that occurs whenever a drone is additionally deployed is presented, and we analyze the combat efficiency according to the additional drone input. Simulation proves that the increase in combat efficiency decreases as more drones are added in small operational areas such as company-level operational areas. This study is expected to contribute to the efficient operation of a limited number of drones in company-level units and to help determine the most desirable quantity of drones for additional combat power improvement.

Target Detection Algorithm Based on Seismic Sensor for Adaptation of Background Noise (배경잡음에 적응하는 진동센서 기반 목표물 탐지 알고리즘)

  • Lee, Jaeil;Lee, Chong Hyun;Bae, Jinho;Kwon, Jihoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.258-266
    • /
    • 2013
  • We propose adaptive detection algorithm to reduce a false alarm by considering the characteristics of the random noise on the detection system based on a seismic sensor. The proposed algorithm consists of the first step detection using kernel function and the second step detection using detection classes. Kernel function of the first step detection is obtained from the threshold of the Neyman-Pearon decision criterion using the probability density functions varied along the noise from the measured signal. The second step detector consists of 4 step detection class by calculating the occupancy time of the footstep using the first detected samples. In order to verify performance of the proposed algorithm, the detection of the footsteps using measured signal of targets (walking and running) are performed experimentally. The detection results are compared with a fixed threshold detector. The first step detection result has the high detection performance of 95% up to 10m area. Also, the false alarm probability is decreased from 40% to 20% when it is compared with the fixed threshold detector. By applying the detection class(second step detector), it is greatly reduced to less than 4%.

The Study on the Automated Detection Algorithm for Penetration Scenarios using Association Mining Technique (연관마이닝 기법을 이용한 침입 시나리오 자동 탐지 알고리즘 연구)

  • 김창수;황현숙
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.371-384
    • /
    • 2001
  • In these days, it is continuously increased to the intrusion of system in internet environment. The methods of intrusion detection can be largely classified into anomaly detection and misuse detection. The former uses statistical methods, features selection method in order to detect intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching. The existing studies for IDS(intrusion detection system) use combined methods. In this paper, we propose a new intrusion detection algorithm combined both state transition analysis and association mining techniques. For the intrusion detection, the first step is generated state table for transmitted commands through the network. This method is similar to the existing state transition analysis. The next step is decided yes or no for intrusion using the association mining technique. According to this processing steps, we present the automated generation algorithm of the penetration scenarios.

  • PDF

Analysis of Tracking Accuracy with Consideration of Fighter Radar Measurement Characteristics (전투기 레이다 측정 특성을 고려한 추적정확도 분석)

  • Seo, Jeongjik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.8
    • /
    • pp.640-647
    • /
    • 2018
  • This study analyzes the tracking accuracy(tracking errors) of fighter radar. Measurement error, detection failure, and radar cross section(RCS) fluctuation in radar measurements degrade the measurement quality and hence affect the tracking accuracy. Therefore, these radar measurement characteristics need to be considered when analyzing the tracking accuracy. In this paper, a method for analyzing the tracking accuracy is proposed; this method considers the detection error, detection probability, and RCS fluctuation. Results from experiments conducted with the proposed method show that the detection probability and RCS fluctuation affect tracking accuracy.

A Development Method for Water Entry Point Selection Algorithm by Detection Probability Analysis (탐지확률 분석에 의한 입수점 선정 알고리듬 개발 방안)

  • Cho, Sung-Bong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.30-37
    • /
    • 2007
  • In this paper, Water Entry Point Selection Algorithm(WEPSA) for selecting an optimal Water Entry Point of anti-submarine missiles which maximizes Detection Probability about a given target was investigated. WEPSA is a method which decides the position of an optimal Water Entry Point with calculating the target Detection Probability of a torpedo in the whole domain which centered by the target, performing the Monte-Carlo Simulations which include errors for the target informations and for weapon delivery. We can decide an optimal Water Entry Point of anti-submarine missiles which maximizes Detection Probability about a given target with WEPSA, if we get target informations about target range, target bearing, target speed and target course from Combat Systems.

Quantification of Angular Prediction Accuracy for Phased Array Radar Tracking (위상배열레이더 추적 각도예측의 정확도 정량화)

  • Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.1
    • /
    • pp.74-79
    • /
    • 2012
  • Scalar quantification of the angular prediction error covariance matrix is considered for characterizing tracking performances in phased array radar tracking. Specifically, the maximum eigenvalue and the trace of the covariance matrix are examined in terms of consistency in parameterizing the probability of detection, taking antenna beam-pointing losses into account, and it is shown numerically that the latter is more consistent.

Bayesian Inference Model for Landmark Detection on Mobile Device (모바일 디바이스 상에서의 특이성 탐지를 위한 베이지안 추론 모델)

  • Hwang Keum-Sung;Cho Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.127-129
    • /
    • 2006
  • 모바일 디바이스에서 얻을 수 있는 로그에는 다양한 개인정보가 풍부하게 포함되어 있으면서도 제약이 많아 활용이 어렵다. 그 동안은 모바일 장치의 용량, 파워의 제약과 정보 분석의 어려움으로 로그 정보를 무시해온 것이 일반적이었다. 본 논문에서는 모바일 디바이스의 다양한 로그 정보를 분석하여 사용자에게 의미 있는 상황(특이성)을 탐지해낼 수 있는 정보 분석 방법을 제안한다. 불확실한 상황에서의 정확성 향상을 위해 규칙/패턴 분석에 의한 특이성 추론뿐만 아니라 베이지안 네트워크를 활용한 확률적인 접근 방법을 활용한다. 이때, 복잡하지 않고 연산이 효율적으로 이루어질 수 있도록 BN을 모듈화하고 모듈화된 BN의 상호보완적인 확률 추론을 위한 BN 처리 과정을 제안한다. 그리고, 특이성 추출 모듈을 주기적으로 업데이트함으로써 성능을 향상시키기 위한 학습알고리즘을 소개한다.

  • PDF

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Do, Joo-Hwan;Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.139-147
    • /
    • 2009
  • In this paper, optimum design of energy-aware distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, an energy constraint, and the distance between two sensor nodes affect the system detection performances.

Determination of the Optimal Checkpoint and Distributed Fault Detection Interval for Real-Time Tasks on Triple Modular Redundancy Systems (삼중구조 시스템의 실시간 태스크 최적 체크포인터 및 분산 고장 탐지 구간 선정)

  • Seong Woo Kwak;Jung-Min Yang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.527-534
    • /
    • 2023
  • Triple modular redundancy (TMR) systems can continue their mission by virtue of their structural redundancy even if one processor is attacked by faults. In this paper, we propose a new fault tolerance strategy by introducing checkpoints into the TMR system in which data saving and fault detection processes are separated while they corporate together in the conventional checkpoints. Faults in one processor are tolerated by synchronizing the state of three processors upon detecting faults. Simultaneous faults occurring to more than one processor are tolerated by re-executing the task from the latest checkpoint. We propose the checkpoint placement and fault detection strategy to maximize the probability of successful execution of a task within the given deadline. We develop the Markov chain model for the TMR system having the proposed checkpoint strategy, and derive the optimal fault detection and checkpoint interval.