• Title/Summary/Keyword: Detection Mechanism

Search Result 850, Processing Time 0.021 seconds

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

Damage detection of composite materials via IR thermography and electrical resistance measurement: A review

  • Park, Kundo;Lee, Junhyeong;Ryu, Seunghwa
    • Structural Engineering and Mechanics
    • /
    • v.80 no.5
    • /
    • pp.563-583
    • /
    • 2021
  • Composite materials, composed of multiple constituent materials with dissimilar properties, are actively adopted in a wide range of industrial sectors due to their remarkable strength-to-weight and stiffness-to-weight ratio. Nevertheless, the failure mechanism of composite materials is highly complicated due to their sophisticated microstructure, making it much harder to predict their residual material lives in real life applications. A promising solution for this safety issue is structural damage detection. In the present paper, damage detection of composite material via electrical resistance-based technique and infrared thermography is reviewed. The operating principles of the two damage detection methodologies are introduced, and some research advances of each techniques are covered. The advancement of IR thermography-based non-destructive technique (NDT) including optical thermography, laser thermography and eddy current thermography will be reported, as well as the electrical impedance tomography (EIT) which is a technology increasingly drawing attentions in the field of electrical resistance-based damage detection. A brief comparison of the two methodologies based on each of their strengths and limitations is carried out, and a recent research update regarding the coupling of the two techniques for improved damage detection in composite materials will be discussed.

A fast defect detection method for PCBA based on YOLOv7

  • Shugang Liu;Jialong Chen;Qiangguo Yu;Jie Zhan;Linan Duan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2199-2213
    • /
    • 2024
  • To enhance the quality of defect detection for Printed Circuit Board Assembly (PCBA) during electronic product manufacturing, this study primarily focuses on optimizing the YOLOv7-based method for PCBA defect detection. In this method, the Mish, a smoother function, replaces the Leaky ReLU activation function of YOLOv7, effectively expanding the network's information processing capabilities. Concurrently, a Squeeze-and-Excitation attention mechanism (SEAM) has been integrated into the head of the model, significantly augmenting the precision of small target defect detection. Additionally, considering angular loss, compared to the CIoU loss function in YOLOv7, the SIoU loss function in the paper enhances robustness and training speed and optimizes inference accuracy. In terms of data preprocessing, this study has devised a brightness adjustment data enhancement technique based on split-filtering to enrich the dataset while minimizing the impact of noise and lighting on images. The experimental results under identical training conditions demonstrate that our model exhibits a 9.9% increase in mAP value and an FPS increase to 164 compared to the YOLOv7. These indicate that the method proposed has a superior performance in PCBA defect detection and has a specific application value.

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF

Mutual Information Applied to Anomaly Detection

  • Kopylova, Yuliya;Buell, Duncan A.;Huang, Chin-Tser;Janies, Jeff
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • Anomaly detection systems playa significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Renyi entropy measures can also adequately describe the characteristics of a network as a whole as well as detect abnormal traces in the observed traffic. In addition, Renyi entropy metrics might boost sensitivity of the methods when disambiguating certain anomalous patterns. In this paper we describe our efforts to understand how Renyi mutual information can be applied to anomaly detection as an offline computation. An initial analysis has been performed to determine how well fast spreading worms (Slammer, Code Red, and Welchia) can be detected using our technique. We use both synthetic and real data audits to illustrate the potentials of our method and provide a tentative explanation of the results.

A $160{\times}120$ Light-Adaptive CMOS Vision Chip for Edge Detection Based on a Retinal Structure Using a Saturating Resistive Network

  • Kong, Jae-Sung;Kim, Sang-Heon;Sung, Dong-Kyu;Shin, Jang-Kyoo
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.59-69
    • /
    • 2007
  • We designed and fabricated a vision chip for edge detection with a $160{\times}120$ pixel array by using 0.35 ${\mu}m$ standard complementary metal-oxide-semiconductor (CMOS) technology. The designed vision chip is based on a retinal structure with a resistive network to improve the speed of operation. To improve the quality of final edge images, we applied a saturating resistive circuit to the resistive network. The light-adaptation mechanism of the edge detection circuit was quantitatively analyzed using a simple model of the saturating resistive element. To verify improvement, we compared the simulation results of the proposed circuit to the results of previous circuits.

  • PDF

Collision Detection and Response Calculation for 3-D Computer Animation (3차원 컴퓨터 애니메이션을 위한 충돌 검색 및 반응 계산)

  • 김현준;경종민
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.3
    • /
    • pp.130-138
    • /
    • 1993
  • A mechanism for collision detection in general animation system is necessary to prevent the interpenetration among multiple objects. On the other hand, a dynamic simulation system which is a part of animation system simulates realistic motions using dynamics after the collision, which is called collision response. In this paper, a method for reducing the CPU time for collision detection by removing redundant calculations and object sorting is proposed. A dynamic simulation system including collision detection and response function was implemented to demonstrate the proposed methods, where the input data as elasticity, friction, gravity, object shape, external force and external torque are given by the user. The system simulates motions of multiple objects using dynamics, and generates the wireframe display.

  • PDF

Position Detection of a Capsule-type Endoscope by Magnetic Field Sensors (자계 센서를 이용한 캡슐형 내시경의 위치 측정)

  • Park, Joon-Byung;Kang, Heon;Hong, Yeh-Sun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.6
    • /
    • pp.66-71
    • /
    • 2007
  • Development of a locomotive mechanism for the capsule type endoscopes will largely enhance their ability to diagnose disease of digestive organs. As a part of it, there should be provided a detection device of their position in human organs for the purpose of observation and motion control. In this paper, a permanent magnet outside human body was employed to project magnetic field on a capsule type endoscope, while its position dependent flux density was measured by three hall-effect sensors which were orthogonally installed inside the capsule. In order to detect the 2-D position data of the capsule with three hall-effect sensors including the roll, pitch and yaw angle, the permanent magnet was extra translated during the measurement. In this way, the 2-D coordinates and three rotation angles of a capsule endoscope on the same motion plane with the permanent magnet could be detected. The working principle and performance test results of the capsule position detection device were introduced in this paper showing that they could be also applied to 6-DOF position detection.

Road Damage Detection and Classification based on Multi-level Feature Pyramids

  • Yin, Junru;Qu, Jiantao;Huang, Wei;Chen, Qiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.786-799
    • /
    • 2021
  • Road damage detection is important for road maintenance. With the development of deep learning, more and more road damage detection methods have been proposed, such as Fast R-CNN, Faster R-CNN, Mask R-CNN and RetinaNet. However, because shallow and deep layers cannot be extracted at the same time, the existing methods do not perform well in detecting objects with fewer samples. In addition, these methods cannot obtain a highly accurate detecting bounding box. This paper presents a Multi-level Feature Pyramids method based on M2det. Because the feature layer has multi-scale and multi-level architecture, the feature layer containing more information and obvious features can be extracted. Moreover, an attention mechanism is used to improve the accuracy of local boundary boxes in the dataset. Experimental results show that the proposed method is better than the current state-of-the-art methods.