• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.027 seconds

Policy Based Cloned CSD Detection Mechanism in Logistics (항만 물류 환경에서의 복제된 CSD 탐지를 위한 정책 기반 복제 탐지 매커니즘)

  • Hwang, Ah-Reum;Suh, Hwa-Jung;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.98-106
    • /
    • 2012
  • CSD(Container Security Device) is a security device with sensors that can detect the abnormal behavior such as illegal opening of a container door. Since the CSD provides security and safety of the container, CSD should not only provide security services such as confidentiality and integrity but also cloning detection. If we can not detect the cloned CSD, an adversary can use the cloned CSD for many illegal purposes. In this paper, we propose a policy based cloned CSD detection mechanism. To evaluate proposed clone detection mechanism, we have implemented the proposed scheme and evaluated the results.

LED Deformity Detection Using LabVIEW Builder (랩뷰 비전 빌더를 이용한 LED 결함 검출 시스템)

  • Xi, Wang;Yoo, Sung-Goo;Chong, Kil-To;Vista IV, Felipe P.
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.5
    • /
    • pp.15-21
    • /
    • 2009
  • Deformity detection in a Light Emitting Diode (LED) is an important aspect for improving its quality. These LED deformities can be checked through several methods. This paper details the automatic deformity detection inspection system of a LED using the LabVIEW Builder 3.6 software. This software has a graphical user interface which makes it easy to observe and modify the behavior of its element. The LabVIEWs essential elements are also presented and explained aside from its image acquisition system. Details on how to build an inspection system and how to implement vision inspection algorithm which mainly consists of edge detection, geometry point location, and distance measurement are included in this paper.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Characterization and Detection of Location Spoofing Attacks

  • Lee, Jeong-Heon;Buehrer, R. Michael
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.396-409
    • /
    • 2012
  • With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate through signal strength based attacks. Since the physical-layer approach identifies and assesses the security risk of position information based solely on using received signal strength (RSS), it is applicable to nearly any practical wireless network. In this paper, we characterize the impact of signal strength and beamforming attacks on range estimates and the resulting position estimate. It is shown that such attacks can be characterized by a scaling factor that biases the individual range estimators either uniformly or selectively. We then identify the more severe types of attacks, and develop an attack detection approach which does not rely on a priori knowledge (either statistical or environmental). The resulting approach, which exploits the dissimilar behavior of two RSS-based estimators when under attack, is shown to be effective at detecting both types of attacks with the detection rate increasing with the severity of the induced location error.

Redundant rule Detection for Software-Defined Networking

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2735-2751
    • /
    • 2020
  • The emergence of Software Defined Networking (SDN) overcomes the limitations of traditional networking architectures. There are some advantages in SDN which are centralized global network view, programmability, and separation of the data plane and control plane. Due to the limitation of data plane storage capacity in SDN, it is necessary to process the redundancy rules of switch. In this paper, we propose a method for active detection and processing of redundant rules. We use the result generated by the customized probe package to detect redundant rules. And by checking the forwarding behavior of probe packets in the data plane, the redundancy rules are further processed. Furthermore, in order to quickly check the dynamic networks, we propose an incremental algorithms for rapidly evolve the network strategies. We conduct simulation experiments on Matlab to verify the feasibility of the algorithm. The influence of some parameters on the result are discussed.

A Study of Player Changed-pattern Model for Game Bots Detection in MMORPG (MMORPG에서 게임 봇 프로그램 탐지를 위한 플레이어 패턴 변화 모델에 관한 연구)

  • Yoon, Tae-Bok;Lee, Jee-Hyong
    • Journal of Korea Game Society
    • /
    • v.11 no.1
    • /
    • pp.121-129
    • /
    • 2011
  • In an online-game, the various game service victimized cases are generated by the bots program or auto program. Particularly, the abnormal collection of the game money and item loses the inherent fun of a game. It reaches ultimately the definite bad effect to the game life cycle. This paper collects and analyzes the pattern of game behavior change for the bots detection method. By using the game activity changing information of the human and game activity changing information of the bots, the degree of resemblance was measured. It utilized in the bots detection method. In an experiment, by using the served online-game, the model of a user and bots were generated and similarity was distinguished. And the reasonable result was confirmed.

Velocity Control and Collision Detection by Feedback Linearization for an Power-assisted Automotive Swing Door (차량의 개폐력 보조 여닫이 문의 되먹임 선형화를 이용한 속도 제어 및 충돌 감지)

  • Lee, Byoungsoo;Park, Min-Kyu;Sung, Kum-Gil
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.40-46
    • /
    • 2013
  • Automatic swing door for an automotive application is considered. The equation of motion for a driver side swing door is introduced and gravity cancellation control scheme is adapted. The control scheme supposed to cancel the moment due to the tilt of the car. A speed control is suggested for door operation automation but the output of the speed control is not suppose to be precise as for the manufacturing system control. In the frame of the velocity control of the door, feedback linearization was applied for collision detection. The collision detection performance is satisfactory. The estimate of the magnitude of disturbance due to the collision is close to the actual magnitude of disturbance. Simulation study has been performed to gain insight into the system behavior. Also real test on the prototype hardware has been performed for verification purpose.

Online damage detection using pair cointegration method of time-varying displacement

  • Zhou, Cui;Li, Hong-Nan;Li, Dong-Sheng;Lin, You-Xin;Yi, Ting-Hua
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.309-325
    • /
    • 2013
  • Environmental and operational variables are inevitable concerns by researchers and engineers when implementing the damage detection algorithm in practical projects, because the change of structural behavior could be masked by the conditions in a large extent. Thus, reliable damage detection methods should have a virtue of immunity from environmental and operational variables. In this paper, the pair cointegration method was presented as a novel way to remove the effect of environmental variables. At the beginning, the concept and procedure of this approach were introduced, and then the theoretical formulation and numerical simulations were put forward to illustrate the feasibility. The jump exceeding the control limit in the residual indicates the occurrence of damage, while the direction and magnitude imply the most potential damage location. In addition, the simulation results show that the proposed method has strong ability to resist the noise.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Modificated Intrusion Pattern Classification Technique based on Bayesian Network (베이지안 네트워크 기반의 변형된 침입 패턴 분류 기법)

  • Cha Byung-Rae;Park Kyoung-Woo;Seo Jae-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles, and detectes modificated anomaly intrusions effectively. In this paper, the relation among system calls of processes is represented by bayesian network and Multiple Sequence Alignment. Program behavior profiling by Bayesian Network classifies modified anomaly intrusion behaviors, and detects anomaly behaviors. we had simulation by proposed normal behavior profiling technique using UNM data.

  • PDF