• Title/Summary/Keyword: Anormaly

Search Result 15, Processing Time 0.015 seconds

A Methodology for Evaluating Intrusion Detection System (침입탐지시스템 평가 방법론)

  • Yoo, Shin-Geun;Lee, Nam-Hoon;Shim, Young-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3445-3461
    • /
    • 2000
  • Although many different intrusion detectionsystems have been developed there have not been enough researches on the methodology for evaluating these intrusion delection systems. With this understanding,in this paper we present a methodology for evaluating infrusion detection systems from the view point of performance and robustness, both of which are considered the most important criteria Current research on evaluating the performance f intrusion detection systems mostly foduson the in issuse detection but not on the anormaly detection. Regarding evalieting robustness it is not easy to apply off -line methodologies and methods for testing robustness hae not been proposed in on -line methodolomes, In this paper we provide an systematic way of classifyin and generating anomalies and using this reult, present an methodology for evaluating the pertormance of intrusion detection systems in detecting anomaalies ans well as misuses . Moreover, ww study the factors that can damage the robustness of intrusion detection systems and suggest an methodology for assessing the robustness of intrusion detection systems.

  • PDF

Derodidymus in Korean-Native Calf (한우 송아지의 이두이안체)

  • 강문일;박영석;한동운
    • Korean Journal of Animal Reproduction
    • /
    • v.23 no.1
    • /
    • pp.69-73
    • /
    • 1999
  • A calf with derodidymus was delivered from a 3-year old Korean-native cow with abortion last ime at Jangheong area in Chonnam Province. The anomaly with body weight of 35 kg was born t the normal time of parturition. During the parturition, however, the calf with twin head was onfirmed and the complete amputation between fore and hind limb was inevitably carried out or safety of the dam. The calf had normal skeleton and extremities but had two heads and cervical vertebrae divided from upper thoracic part. At necropsy, there were found totally 3 pairs of ore limbs including two pairs of hypoplastic ones hided in the thoracic limb and also found one air of sternum. One head had incomplete torsion or unilateral hypoplasia of mandible with artly hypoplastic skull. There were marked fusion and torsion from cervical to 3rd thoracic vertebra. No abnormality was found on all organs in the pleural and abdominal cavities except a rectal stricture formed at 5 cm away from the atresia ani.

  • PDF

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

AI-Based Intelligent CCTV Detection Performance Improvement (AI 기반 지능형 CCTV 이상행위 탐지 성능 개선 방안)

  • Dongju Ryu;Kim Seung Hee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.117-123
    • /
    • 2023
  • Recently, as the demand for Generative Artificial Intelligence (AI) and artificial intelligence has increased, the seriousness of misuse and abuse has emerged. However, intelligent CCTV, which maximizes detection of abnormal behavior, is of great help to prevent crime in the military and police. AI performs learning as taught by humans and then proceeds with self-learning. Since AI makes judgments according to the learned results, it is necessary to clearly understand the characteristics of learning. However, it is often difficult to visually judge strange and abnormal behaviors that are ambiguous even for humans to judge. It is very difficult to learn this with the eyes of artificial intelligence, and the result of learning is very many False Positive, False Negative, and True Negative. In response, this paper presented standards and methods for clarifying the learning of AI's strange and abnormal behaviors, and presented learning measures to maximize the judgment ability of intelligent CCTV's False Positive, False Negative, and True Negative. Through this paper, it is expected that the artificial intelligence engine performance of intelligent CCTV currently in use can be maximized, and the ratio of False Positive and False Negative can be minimized..