• 제목/요약/키워드: Cloud detection

검색결과 367건 처리시간 0.027초

Developing the Cloud Detection Algorithm for COMS Meteorolgical Data Processing System

  • Chung, Chu-Yong;Lee, Hee-Kyo;Ahn, Hyun-Jung;Ahn, Myoung-Hwan;Oh, Sung-Nam
    • 대한원격탐사학회지
    • /
    • 제22권5호
    • /
    • pp.367-372
    • /
    • 2006
  • Cloud detection algorithm is being developed as primary one of the 16 baseline products of CMDPS (COMS Meteorological Data Processing System), which is under development for the real-time application of data will be observed from COMS Meteorological Imager. For cloud detection from satellite data, we studied two different algorithms. One is threshold technique based algorithm, which is traditionally used, and another is artificial neural network model. MPEF scene analysis algorithm is the basic idea of threshold cloud detection algorithm, and some modifications are conducted for COMS. For the neural network, we selected MLP with back-propagation algorithm. Prototype software of each algorithm was completed and evaluated by using the MTSAT-IR and GOES-9 data. Currently the software codes are standardized using Fortran90 language. For the preparation as an operational algorithm, we will setup the validation strategy and tune up the algorithm continuously. This paper shows the outline of the two cloud detection algorithms and preliminary test results of both algorithms.

에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지 (Intrusion Detection for IoT Traffic in Edge Cloud)

  • Shin, Kwang-Seong;Youm, Sungkwan
    • 한국정보통신학회논문지
    • /
    • 제24권1호
    • /
    • pp.138-140
    • /
    • 2020
  • As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

GOCI 영상의 육상 활용을 위한 구름 탐지 기법 개발 (Development of Cloud Detection Method with Geostationary Ocean Color Imagery for Land Applications)

  • 이화선;이규성
    • 대한원격탐사학회지
    • /
    • 제31권5호
    • /
    • pp.371-384
    • /
    • 2015
  • GOCI 영상은 육상 관측에 적합한 공간해상도와 빠른 관측주기를 가지고 있지만, 현재까지 육상분야에 활용된 예가 많지 않다. GOCI 영상이 육상분야에 활용되기 위해서는 정교한 전처리가 수행되어 신뢰성을 갖춘 기본적인 산출물 형태로 제공되어야 한다. 본 연구에서는 GOCI 영상의 육상 활용을 위하여 구름의 영향이 최소화된 기본 산출물 제작에 필요한 구름 탐지 기법을 제안하였다. GOCI 영상은 구름 탐지에 효과적인 단파적외선(SWIR)과 열적외선(TIR) 밴드가 없기 때문에, 이 연구에서는 GOCI 영상의 장점인 빠른 관측 주기로 얻어지는 많은 다중시기영상을 이용하여 구름을 탐지하는 방법을 개발하였다. 제안한 구름탐지 기법은 세 단계로 구성된다. 1단계와 2단계에서는 1번 밴드 반사율과 1번과 8번 밴드의 반사율 비(b1/b8)에 임계값을 적용하여 완전 맑음(confident clear)과 두꺼운 구름(thick cloud)을 구분했다. 마지막 단계에서는 3일 동안 얻어진 b1/b8 값의 평균을 임계값으로 하여 얇은 구름(thin cloud)을 구분하였다. 이러한 순차적인 구름탐지 알고리즘을 적용하여 모두 4개의 등급으로 분류하였다. 본 연구에서 제안한 기법을 GOCI 영상에 적용 후 그 결과를 MODIS 구름 산출물(cloud mask products)과 비교 검증하였다. 여러 시기의 영상에서 추출된 구름 면적을 비교한 결과 평균제곱근오차(RMSE)가 10% 미만으로 MODIS 구름 산출물과 유사한 결과를 얻었다. 육안 분석을 통해 구름의 공간적인 분포를 비교한 결과, MODIS 산출물과 비슷한 구름 분포를 보여주었다.

High Rate Denial-of-Service Attack Detection System for Cloud Environment Using Flume and Spark

  • Gutierrez, Janitza Punto;Lee, Kilhung
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.675-689
    • /
    • 2021
  • Nowadays, cloud computing is being adopted for more organizations. However, since cloud computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is challenging task to perform attack detection in the cloud following conventional processes. This work proposes a solution which aims to collect web server logs by using Flume and filter them through Spark Streaming in order to only consider suspicious data or data related to denial-of-service attacks and reduce the data that will be stored in Hadoop Distributed File System for posterior analysis with the frequent pattern (FP)-Growth algorithm. With the proposed system, we can address some of the difficulties in security for cloud environment, facilitating the data collection, reducing detection time and consequently enabling an almost real-time attack detection.

TEST ON REAL-TIME CLOUD DETECTION ALGORITHM USING A NEURAL NETWORK MODEL FOR COMS

  • Ahn, Hyun-Jeong;Chung, Chu-Yong;Ou, Mi-Lim
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2007년도 Proceedings of ISRS 2007
    • /
    • pp.286-289
    • /
    • 2007
  • This study is to develop a cloud detection algorit1un for COMS and it is currently tested by using MODIS level 2B and MTSAT-1R satellite radiance data. Unlike many existing cloud detection schemes which use a threshold method and traditional statistical methods, in this study a feed-forward neural network method with back-propagation algorit1un is used. MODIS level 2B products are matched with feature information of five-band MTSAT 1R image data to form the training dataset. The neural network is trained over the global region for the period of January to December in 2006 with 5 km spatial resolution. The main results show that this model is capable to detect complex cloud phenomena. And when it is applied to seasonal images, it shows reliable results to reflect seasonal characteristics except for snow cover of winter. The cloud detection by the neural network method shows 90% accuracy compared to the MODIS products.

  • PDF

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

Object Detection with LiDAR Point Cloud and RGBD Synthesis Using GNN

  • Jung, Tae-Won;Jeong, Chi-Seo;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • 제9권3호
    • /
    • pp.192-198
    • /
    • 2020
  • The 3D point cloud is a key technology of object detection for virtual reality and augmented reality. In order to apply various areas of object detection, it is necessary to obtain 3D information and even color information more easily. In general, to generate a 3D point cloud, it is acquired using an expensive scanner device. However, 3D and characteristic information such as RGB and depth can be easily obtained in a mobile device. GNN (Graph Neural Network) can be used for object detection based on these characteristics. In this paper, we have generated RGB and RGBD by detecting basic information and characteristic information from the KITTI dataset, which is often used in 3D point cloud object detection. We have generated RGB-GNN with i-GNN, which is the most widely used LiDAR characteristic information, and color information characteristics that can be obtained from mobile devices. We compared and analyzed object detection accuracy using RGBD-GNN, which characterizes color and depth information.

An Algorithm to Determine Aerosol Extinction Below Cirrus Cloud from Mie-LIDAR Signals

  • Wang, Zhenzhu;Wu, Decheng;Liu, Dong;Zhou, Jun
    • Journal of the Optical Society of Korea
    • /
    • 제14권4호
    • /
    • pp.444-450
    • /
    • 2010
  • The traditional approach to inverting aerosol extinction makes use of the assumption of a constant LIDAR ratio in the entire Mie-LIDAR signal profile using the Fernald method. For the large uncertainty in the cloud optical depth caused by the assumed constant LIDAR ratio, an not negligible error of the retrieved aerosol extinction below the cloud will be caused in the backward integration of the Fernald method. A new algorithm to determine aerosol extinction below a cirrus cloud from Mie-LIDAR signals, based on a new cloud boundary detection method and a Mie-LIDAR signal modification method, combined with the backward integration of the Fernald method is developed. The result shows that the cloud boundary detection method is reliable, and the aerosol extinction below the cirrus cloud found by inverting from the modified signal is more efficacious than the one from the measured signal including the cloud-layer. The error due to modification is less than 10% taken in our present example.

클라우드 기반 협업 콘텐츠 프랙탈 서비스 및 침입탐지 프레임워크 (Collaboration Contents Fractal Service and Intrusion Detection framework based on Cloud)

  • 박상현;이혜주;이석환;권기룡;박윤경;문경덕
    • 한국멀티미디어학회논문지
    • /
    • 제20권1호
    • /
    • pp.58-65
    • /
    • 2017
  • The recent years, the cloud-based paradigm of cloud services are developed rapidly, it come with many a new problems. However, the collaboration between a individual with other users is still difficult. Cloud service is considered when users need to take advantage of security and the availability of cloud services. In this paper, we proposed an detection framework to detect an intrusion attack that threaten to cloud-based collaboration services and cloud security. Identify vulnerabilities and prepare for the safety of the collaboration services to create a variety of content in the cloud, it help to prevent the threats.