• Title/Summary/Keyword: Adaptive Security System

Search Result 105, Processing Time 0.033 seconds

Real-time Object Tracking using Adaptive Background Image in Video (동영상에서 적응적 배경영상을 이용한 실시간 객체 추적)

  • 최내원;지정규
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.409-418
    • /
    • 2003
  • Object tracking in video is one of subject that computer vision and several practical application field have interest in several years. This paper proposes real time object tracking and face region extraction method that can be applied to security and supervisory system field. For this, in limited environment that camera is fixed and there is seldom change of background image, proposed method detects position of object and traces motion using difference between input image and background image. The system creates adaptive background image and extracts pixels in object using line scan method for more stable object extraction. The real time object tracking is possible through establishment of MBR(Minimum Bounding Rectangle) using extracted pixels. Also, effectiveness for security and supervisory system is improved due to extract face region in established MBR. And through an experiment, the system shows fast real time object tracking under limited environment.

  • PDF

Customized Serverless Android Malware Analysis Using Transfer Learning-Based Adaptive Detection Techniques (사용자 맞춤형 서버리스 안드로이드 악성코드 분석을 위한 전이학습 기반 적응형 탐지 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.433-441
    • /
    • 2021
  • Android applications are released across various categories, including productivity apps and games, and users are exposed to various applications and even malware depending on their usage patterns. On the other hand, most analysis engines train using existing datasets and do not reflect user patterns even if periodic updates are made. Thus, the detection rate for known malware is high, while types of malware such as adware are difficult to detect. In addition, existing engines incur increased service provider costs due to the cost of server farm, and the user layer suffers from problems where availability and real-timeness are not guaranteed. To address these problems, we propose an analysis system that performs on-device malware detection through transfer learning, which requires only one-time communication with the server. In addition, The system has a complete process on the device, including decompiler, which can distribute the load of the server system. As an evaluation result, it shows 90.3% accuracy without transfer learning, while the model transferred with adware catergories shows 95.1% of accuracy, which is 4.8% higher compare to original model.

A Design and Implementation of Information Security Management and Audit System for Government Agencies (공공기관의 정보보호관리체계 감사시스템의 설계 및 구현)

  • Jun, Yong-Joon;Cho, Gi-Hwan;Kim, Won-Kyu
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.81-93
    • /
    • 2006
  • Recently, information technology is considered as a basement of management for industries as well as administrations. Especially, government agencies deal with more high sensitive and Important data than other businesses, so, their security managements should be fair and efficient. At present, most government agencies possess and operate their own information security systems, but apply them for the sake of formality only, even do not adapt an audit system for management polices. This paper presents a design and implementation of an automated audit system which is suitable for the operation environment in government agencies, using the audit system based on the BS7799. The. proposed system aims to objectively, numerically and daily control the ISMS (Information Security Management System) for different level of government agencies. In addition, it permits to design and implement an adaptive audit tool, in order to meet a given condition of audit organization and guard the personal relationship between the auditor and its counterpart.

  • PDF

Hypercube Diagnosis Algorithm for Large Number of Faults (다중의 결함을 갖는 하이퍼큐브 진단 알고리즘)

  • Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.1-6
    • /
    • 2009
  • Most diagnosis algorithms have been done using the characteristic of t-diagnosable system based on PMC model. But as parallel systems grow fast, more faulty units occur in the system. Previous researches are done on the assumption of small number of faulty units in the system. There have been little studies on the system where number of faulty units exceed t. In this study, we assume the number of faulty units exceed t and there exist small number of nodes where the correctness of diagnosis can't be decided, then we propose an algorithm which increase the maximum number of faulty units in diagnosis system.

  • PDF

Multiple Object Detection and Tracking System robust to various Environment (환경변화에 강인한 다중 객체 탐지 및 추적 시스템)

  • Lee, Wu-Ju;Lee, Bae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.88-94
    • /
    • 2009
  • This paper proposes real time object detection and tracking algorithm that can be applied to security and supervisory system field. A proposed system is devide into object detection phase and object tracking phase. In object detection, we suggest Adaptive background subtraction method and Adaptive block based model which are advanced motion detecting methods to detect exact object motions. In object tracking, we design a multiple vehicle tracking system based on Kalman filtering. As a result of experiment, motion of moving object can be estimated. the result of tracking multipul object was not lost and object was tracked correctly. Also, we obtained improved result from long range detection and tracking.

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF

Development of the Wireless Sensor S/W for Wireless Traffic Intrusion Detection/Protection on a Campus N/W (캠퍼스 망에서의 무선 트래픽 침입 탐지/차단을 위한 Wireless Sensor S/W 개발)

  • Choi, Chang-Won;Lee, Hyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.211-219
    • /
    • 2006
  • As the wireless network is popular and expanded, it is necessary to development the IDS(Intrusion Detection System)/Filtering System from the malicious wireless traffic. We propose the W-Sensor SW which detects the malicious wireless traffic and the W-TMS system which filters the malicious traffic by W-Sensor log in this paper. It is efficient to detect the malicious traffic and adaptive to change the security rules rapidly by the proposed W-Sensor SW. The designed W-Sensor by installing on a notebook supports the mobility of IDS in compare with the existed AP based Sensor.

  • PDF

DSP based real-time ATM security system (DSP 기반 실시간 ATM 보안 시스템)

  • Lee, Tae-Min;Kim, Yong-Guk
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.654-658
    • /
    • 2008
  • 은행에서 현금 지급기(ATM)를 부정한 목적으로 사용하는 사람들은 보통 마스크나 선글라스, 모자 같은 것으로 얼굴을 은폐하고 인출을 하는 경우가 많다. 그렇기 때문에 마스크나 선글라스, 모자로 얼굴을 가림으로써 특징을 검출하기 쉽지 않아 얼굴 인식을 통한 사람 판단이 어렵다. 본 논문에서는 차 영상과 Template Matching 을 통해 얼굴 영역을 추출하고 Adaptive Boost 를 통해 얼굴의 특징 점을 검출한 후 스킨 컬러 정보를 이용하여 현재 사람의 은폐 정보를 추정하는 방법을 제안한다. 제안된 방영은 영상신호처리에 강하고 비용이 적으며 적은 전력으로 동작하는 DSP 기반에 탑재 함으로써 ATM 기에 탑재하기 적합하고 또한 다른 형태의 검증 시스템에 적용할 수 있는 효율적인 구조를 제시한다.

  • PDF

A Study on State Estimation in Power Systems Using Adaptive Evolutionary Algorithm (적응진화 알고리즘을 이용한 전력계통의 상태추정에 관한 연구)

  • Jeong, Hee-Myung;Kim, Hyung-Su;Park, June-Ho;Lee, Hwa-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.214-215
    • /
    • 2006
  • In power systems, the state estimation takes an important role in security control. At present, the weighted least squares(WLS) method has been widely used to the state estimation computation. This paper presents an application of Adaptive Evolutionary Algorithm(AEA) to state estimation in power systems. AEA is a optimization method to overcome the problems of classical optimization. AEA is employed to solve state estimation on the 6 bus system.

  • PDF

Adaptive Distance Relaying Scheme to Prevent Large Blackout (광역정전 방지를 위한 적응형 거리계전 기법)

  • Bae, Jae-Kwang;Lim, Seong-Il
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.44-45
    • /
    • 2008
  • The zone 3 elements of distance relays play an important role during the propagation of cascaded events. The most challenging problem to mitigate catastrophic failures is to distinguish between actual faults with line flow transfer from other disconnected lines. This paper presents an adaptive protective relaying scheme based on Line Outage Distribution Factor(LODF) and Generation Shift Factor(GSF) to prevent zone 3 tripping during the cascaded events. Internet based secure peer to peer communication is recommended as a communication method of proposed scheme. Several communication issues such as reliability, speed and cyber security are discussed. In order to establish the feasibility of the proposed scheme, computer simulations for a six bus system has been performed.

  • PDF