• Title/Summary/Keyword: Detect-and-forward

Search Result 148, Processing Time 0.038 seconds

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

Phoneme-Boundary-Detection and Phoneme Recognition Research using Neural Network (음소경계검출과 신경망을 이용한 음소인식 연구)

  • 임유두;강민구;최영호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.224-229
    • /
    • 1999
  • In the field of speech recognition, the research area can be classified into the following two categories: one which is concerned with the development of phoneme-level recognition system, the other with the efficiency of word-level recognition system. The resonable phoneme-level recognition system should detect the phonemic boundaries appropriately and have the improved recognition abilities all the more. The traditional LPC methods detect the phoneme boundaries using Itakura-Saito method which measures the distance between LPC of the standard phoneme data and that of the target speech frame. The MFCC methods which treat spectral transitions as the phonemic boundaries show the lack of adaptability. In this paper, we present new speech recognition system which uses auto-correlation method in the phonemic boundary detection process and the multi-layered Feed-Forward neural network in the recognition process respectively. The proposed system outperforms the traditional methods in the sense of adaptability and another advantage of the proposed system is that feature-extraction part is independent of the recognition process. The results show that frame-unit phonemic recognition system should be possibly implemented.

  • PDF

Forward-Looking GMTI and Estimation of Position and Velocity Based on Millimeter-Wave(W-Band) FMCW SAR (밀리미터파(W 밴드) FMCW SAR 기반 전방의 이동지상표적 탐지 및 위치와 속도 추정)

  • Lee, Hyukjung;Chun, Joohwan;Song, Sungchan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.6
    • /
    • pp.459-469
    • /
    • 2017
  • An air-to-ground guidance missile aimed to hit a main battle tank(MBT) should detect a ground moving target and estimate the target position to guide. In this paper, we detect a front ground moving target by using FMCW(Frequency Modulated Continuous Wave) and estimate the position by forward-looking SAR(Synthetic Aperture Radar) via scanning certain front ground section by steering a beam with narrow beamwidth left to right mechanically. Also, by MLE(Maximum Likelihood Estimation), degree of how fast the target approach or recede from the radar can be figured out from the estimated radial velocity of the moving target. Subsequently, we generate a radar image via corrected matched filter from phase history including the radial velocity.

Rapid detection of salmonellosis on serovar type of piglet with the polymerase chain reaction (중합효소연쇄반응을 이용한 자돈 혈청형에 따른 Salmonellosis의 신속한 검출)

  • Choi, Kyoung-seong;Park, Jin-ho;Kwon, Oh-deog;Lee, Joo-mook
    • Korean Journal of Veterinary Research
    • /
    • v.38 no.4
    • /
    • pp.763-770
    • /
    • 1998
  • Salmonella typhimurium is a causitive agent of diarrhea, fever, gastroenteritis, septicemia and sudden death in piglet. The currently used methods such as IFA, ELISA, DNA hybridization assay is needed a long-time and difficult to detect the organism in carrier animal or contaminated sample with other agents. However, it is important to detect rapidly and sensitively S typhimurium in piglet with other infectious pathogens to minimize an economic loss. Two sets of PCR primer, rfbJ forward primer(5'-AGAATATGTAATTGTCAG-3') and reverse primer(5'-TAACCGTTTCAGTAGTTC-3') were designed to amplify a 882 by fragment of Salmonella serovar type B gene. The target genomic DNA for PCR was extracted from the cultivated materials with various enrichment periods in a nonselective enrichment agar and broth with clinical specimens. The PCR is carried out here made it possible to detect the gene from two hours. Also, the amplified fragment with PCR was cloned into pGEM-T vector and digested with restrict enzyme, and sequenced for the identification of Salmonella serotype B rfbJ gene. Duplicated cultivation agar-broth followed by PCR were performed to develop a rapid and sensitive detection of S typhlmurium based on serovar type. This duplicated cultivation-PCR method provides a sensitive and rapid diagnostic tool to detect Salmonella from infected piglet with improved sensitivity.

  • PDF

Bandwidth-efficient Cooperative Diversity with Rotated Constellations and Its Performance Analysis

  • Lei, Weijia;Xie, Xianzhong;Li, Xiangming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.989-1005
    • /
    • 2010
  • Cooperative diversity is a technique with which a virtual multiple antenna array is established among the single antenna users of the wireless network to realize space diversity. Signal space diversity (SSD) is a bandwidth-efficient diversity technique, which uses constellation rotation and interleaving techniques to achieve diversity gain. A new cooperative diversity scheme with rotated constellations (RCCD) is proposed in this paper. In this scheme, data are modulated by using a rotated constellation, and the source and the relays transmit different components of the modulated symbols. Since any one of the components contains full information of the symbols, the destination can obtain multiple signals conveying the same information from different users. In this way, space diversity is achieved. The RCCD scheme inherits the advantage of SSD - being bandwidth-efficient but without the delay problem of SSD brought by interleaving. The symbol error rate of the RCCD scheme is analyzed and simulated. The analysis and simulation results show that the RCCD scheme can achieve full diversity order of two when the inter-user channel is good enough, and, with the same bandwidth efficiency, has a better performance than amplify-and-forward and detect-and-forward methods.

Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier

  • Lee, Jinlee;Park, Dooho;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5132-5148
    • /
    • 2017
  • Cyber attacks are evolving commensurate with recent developments in information security technology. Intrusion detection systems collect various types of data from computers and networks to detect security threats and analyze the attack information. The large amount of data examined make the large number of computations and low detection rates problematic. Feature selection is expected to improve the classification performance and provide faster and more cost-effective results. Despite the various feature selection studies conducted for intrusion detection systems, it is difficult to automate feature selection because it is based on the knowledge of security experts. This paper proposes a feature selection technique to overcome the performance problems of intrusion detection systems. Focusing on feature selection, the first phase of the proposed system aims at constructing a feature subset using a sequential forward floating search (SFFS) to downsize the dimension of the variables. The second phase constructs a classification model with the selected feature subset using a random forest classifier (RFC) and evaluates the classification accuracy. Experiments were conducted with the NSL-KDD dataset using SFFS-RF, and the results indicated that feature selection techniques are a necessary preprocessing step to improve the overall system performance in systems that handle large datasets. They also verified that SFFS-RF could be used for data classification. In conclusion, SFFS-RF could be the key to improving the classification model performance in machine learning.

An Adaptive FEC Mechanism Using Crosslayer Approach to Enhance Quality of Video Transmission over 802.11 WLANs

  • Han, Long-Zhe;Park, Sung-Jun;Kang, Seung-Seok;In, Hoh-Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.341-357
    • /
    • 2010
  • Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantly compromised, however, due to the characteristics of the wireless channel such as burst packet loss, channel fluctuation and lack of Quality of Service (QoS) support. We propose herein an Adaptive Cross-layer FEC mechanism (ACFEC) to enhance the quality of video streaming over 802.11 WLANs. Under the conventional approaches, FEC functions are implemented on the application layer, and required feedback information to calculate redundancy rates. Our proposed ACFEC mechanism, however, leverages the functionalities of different network layers. The Automatic Repeat reQuest (ARQ) function on the Media Access Control (MAC) layer can detect packet losses. Through cooperation with the User Datagram Protocol (UDP), the redundancy rates are adaptively controlled based on the packet loss information. The experiment results demonstrate that the ACFEC mechanism is able to adaptively adjust and control the redundancy rates and, thereby, to overcome both of temporary and persistent channel fluctuations. Consequently, the proposed mechanism, under various network conditions, performs better in recovery than the conventional methods, while generating a much less volume of redundant traffic.

A Study on Multi-Fault Diagnosis for Turboshaft Engine of UAV Using Fuzzy and Neural Networks (퍼지 및 신경망을 이용한 무인 항공기용 터보축 엔진의 다중손상진단에 관한 연구)

  • Kong, Chang-Duk;Ki, Ja-Young;Kho, Seong-Hee;Koo, Young-Ju;Lee, Chang-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.6
    • /
    • pp.556-561
    • /
    • 2009
  • The UAV(Unmanned Aerial Vehicle) that is remotely operating in various and long flight environments must have a very reliable propulsion system. Precise fault diagnosis of the turbo shaft engine for the Smart UAV that has the vertical take-off, landing and forward flight behaviors can promote reliability and availability. This work proposes a new diagnostic method that can identify the faulted components from engine measuring parameter changes using Fuzzy Logic and quantify its faults from the identified fault pattern using Neural Network Algorithms. The proposed diagnostic method can detect not only single fault but also multiple faults.

Comparative Analysis of Security Schemes for Log System Providing Forward Security (전방 안전성이 보장되는 로그 시스템 보안기법 비교분석)

  • Kang, Seok-Gyu;Park, Chang-Seop
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.85-96
    • /
    • 2015
  • In IT system, logs are an indicator of the previous key events. Therefore, when a security problem occurs in the system, logs are used to find evidence and solution to the problem. So, it is important to ensure the integrity of the stored logs. Existing schemes have been proposed to detect tampering of the stored logs after the key has been exp osed. Existing schemes are designed separately in terms of log transmission and storage. We propose a new log sys tem for integrating log transmission with storage. In addition, we prove the security requirements of the proposed sc heme and computational efficiency with existing schemes.

Recent Advanced Toxicological Methods for Environmental Hazardous Chemicals (환경 오염물질의 진보된 독성 평가 기법)

  • 류재천;최윤정;김연정;김형태;방형애;송윤선
    • Environmental Analysis Health and Toxicology
    • /
    • v.14 no.1_2
    • /
    • pp.1-12
    • /
    • 1999
  • Recently, several new methods for the detection of genetic damages in vitro and in vivo based on molecular biological techniques were introduced according to the rapid progress in toxicology combined with cellular and molecular biology. Among these methods, mouse lymphoma thymidine kanase (tk) gene forward mutation assay, single cell gel electrophoresis (comet assay) and transgenic animal and cell line model as a target gene of lac I (Big Blue) and lac Z (Muta Mouse) gene mutation are newly introduced based on molecular toxicological approaches. The mouse lymphoma tk$\^$+/-/ gene assay (MOLY) using L5178Y tk$\^$+/-/ mouse lymphoma cell line is one of the mammalian forward mutation assays, and has many advantages and more sensitive than hprt assay. The target gene of MOLY is a heterozygous tk$\^$+/-/ gene located in 11 chromosome, so it is able to detect the wide range of genetic changes like point mutation, deletion, rearrangement, and mitotic recombination within tk gene or deletion of entire chromosome 11. The comet assay is a rapid, simple, visual and sensitive technique for measuring and analysing DNA breakages in mammalian cells, Also, transgenic animal and cell line models, which have exogenous DNA incorporated into their genome, carry recoverable shuttle vector containing reporter genes to assess endogenous effects or alteration in specific genes related to disease process, are powerful tools to study the mechanism of mutation in vivo and in vitro, respectively. Also in vivo acridine orange supravital staining micronucleus assay by using mouse peripheral reticulocytes was introduced as an alternative of bone marrow micronucleus assay. In this respect, there was an International workshop on genotoxicity procedure (IWGTP) supported by OECD and EMS (Environmental Mutagen Society) at Washington D. C. in March 25-26, 1999. The objective of IWGTP is to harmonize the testing procedures internationally, and to extend to finalization of OECD guideline, and to the agreement of new guidelines under the International Conference of Harmonization (ICH) for these methods mentioned above. Therefore, we introduce and review the principle, detailed procedure, and application of MOLY, comet assay, transgenic mutagenesis assay and supravital staining micronucleus assay.

  • PDF