• Title/Summary/Keyword: Detection Mechanism

Search Result 855, Processing Time 0.031 seconds

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

An Investigation of the Effect of Schotky Barrier-Height Enhancement Layer on MSMPD Dynamic Characteristics

  • Seo, Jong-Wook
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.2
    • /
    • pp.141-146
    • /
    • 2002
  • The effect of the wide-bandgap Schottky barrier enhancement cap layer on the performance of metal-semiconductor-metal photodetectors (MSMPD's) is presented. Judged by the dc characteristics, no considerable increase in recombination loss of carriers is resulted by the incorporation of the cap layer. However, about 45% of the detection efficiency is lost for the cap-layered MSMPD's even with a graded layer incorporated under pulse operation, and it was found to be due mainly to the capturing and slow release of the photocarriers at the heterointerface. The loss mechanism of the pulse detection efficiency is believed to be responsible for the intersymbol interference and the increased bit-error-rate (BER) observed in MSMPD's when used with a high bit rate pseudo-random-bit-stream (PRBS) data pattern.

Detection of odorants and study on the odorant sensor system by using SAW device (SAW 디바이스를 이용한 냄새물질 측정 및 냄새센서 시스템의 연구)

  • 장상목;김기영;김종민;최용성;권영수
    • Electrical & Electronic Materials
    • /
    • v.8 no.1
    • /
    • pp.48-55
    • /
    • 1995
  • A surface acoustic wave (SAW) sensor for the detection of odorants has been constructed by depositing various phospholipids and fatty acids onto the surface of the SAW device. The characteristics of a SAW device operating at 310 MHz deposited with silicon monoxide were analyzed. Menthone, amylacetate, acetoin, and other organic gases show different affinities to the coated lipids. An explanation is given for different odorant affinities based on the monolayer properties of phospholipids. The identification of odorants depending on the tkpe of lipid used for coating is discussed in terms of the similarity of their normalized resonant frequency shift patterns. Using a number of different lipid-coated SAW devices, odorants can be identified by a computerized pattern recognition algorithm.

  • PDF

Detection of 881A→881G Mutation in Tyrosinase Gene and Associations with the Black Ear Coat Color in Rabbits

  • Jiang, Y.L.;Fan, X.Z.;Lu, Z.X.;Tang, H.;Xu, J.-Q.;Du, L.-X.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.10
    • /
    • pp.1395-1397
    • /
    • 2002
  • The tyrosinase gene was selected as a candidate for uncovering genetic mechanism causing 'black ear' coat color in rabbits. A PCR-SSCP detection method was established for the $881^A{\rightarrow}881^G$ mutation located in the central region of the tyrosinase gene between the CuA and CuB binding region signatures, and this was confirmed by sequencing and alignment. Fully consistent associations between the SNP and 'black ear' coat color were observed by analysis in a "black ear" pedigree and on 61 unrelated individuals. This SNP can serve as a molecular marker for use in "back ear" wool rabbit breeding.

Double Sieve Collision Attack Based on Bitwise Detection

  • Ren, Yanting;Wu, Liji;Wang, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.296-308
    • /
    • 2015
  • Advanced Encryption Standard (AES) is widely used for protecting wireless sensor network (WSN). At the Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2012, G$\acute{e}$rard et al. proposed an optimized collision attack and break a practical implementation of AES. However, the attack needs at least 256 averaged power traces and has a high computational complexity because of its byte wise operation. In this paper, we propose a novel double sieve collision attack based on bitwise collision detection, and an improved version with an error-tolerant mechanism. Practical attacks are successfully conducted on a software implementation of AES in a low-power chip which can be used in wireless sensor node. Simulation results show that our attack needs 90% less time than the work published by G$\acute{e}$rard et al. to reach a success rate of 0.9.

Robustness of RED in Mitigating LDoS Attack

  • Zhang, Jing;Hu, Huaping;Liu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1085-1100
    • /
    • 2011
  • The Random Early Detection algorithm is widely used in the queue management mechanism of the router. We find that the parameters of the RED algorithm have a significant influence on the defense performance of the random early detection algorithm and discuss the robust of the algorithm in mitigating Low-rate Denial-of-Service attack in details. Simulation results show that the defense performance can be effectively improved by adjusting the parameters of $Q_{min}$ and $Q_{max}$. Some suggestions are given for mitigating the LDoS attack at the end of this paper.

Fault Location Diagnosis Technique of Photovoltaic Power Systems through Statistic Signal Process of its Output Power Deviation (출력편차의 통계학적 신호처리를 통한 태양광 발전 시스템의 고장 위치 진단 기술)

  • Cho, Hyun Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1545-1550
    • /
    • 2014
  • Fault detection and diagnosis (FDD) of photovoltaic (PV) power systems is one of significant techniques for reducing economic loss due to abnormality occurred in PV modules. This paper presents a new FDD method against PV power systems by using statistical comparison. This comparative approach includes deviation signals between the outputs of two neighboring PV modules. We first define a binary hypothesis testing under such deviation and make use of a generalized likelihood ratio testing (GLRT) theory to derive its FDD algorithm. Additionally, a recursive computational mechanism for our proposed FDD algorithm is presented for improving a computational effectiveness in practice. We carry out a real-time experiment to test reliability of the proposed FDD algorithm by utilizing a lab based PV test-bed system.

Friction Force Detection for Joints of a Parallel Manipulator Using Gravitational Force (중력을 이용한 병렬 매니퓰레이터 구동부의 마찰력 검출)

  • 이세한;송정규;송재복;최우천;홍대희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.422-422
    • /
    • 2000
  • Parallel manipulators have been used to a variety of applications, including the motion simulators and mechanism for precise machining. A Stewart-Gough type parallel manipulator is composed of six linear joints which have wider contact areas than revolute ones, so linear joints are more affected by frictional force. First, the reference trajectories are computed from the model of the parallel manipulator assuming that it is subject to only the gravitational force and no friction exists. In the actual operation where friction exists, the control inputs, which correspond to the friction forces, are obtained by forcing the actual joint variables to follow these trojectories by proper control. It is shown that control performance can be improved when the friction compensation based on this information is added to the controller for position control of the moving plate of a parallel manipulator.

  • PDF

Proposition and Application of Novel DWT Mother Function for AE signature (AE 신호를 위한 새로운 DWT 기저함수 제안 및 적용)

  • Gu, Dong-Sik;Kim, Jae-Gu;Choi, Byeong-Keun
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2011.04a
    • /
    • pp.582-587
    • /
    • 2011
  • Acoustic Emission(AE) is widely used for early detection of faults for rotating machinery in these days because of its high sensitivity. AE signal has to need for transferring to low frequency range for the spectrum analysis included the fault mechanism. In transferring process, we lose a lot of fault information caused by unusable signal processing method. Discrete Wavelet Transform(DWT) is a method of signal processing for AE signatures, but the pattern of its mother function is not optimized with AE signals. So, we can lose the fault information when we want to use the DWT for AE signal. Therefore, in this paper, we will propose a novel pattern for DWT mother function, which is optimized with AE signals. And it will be applied to compare the results of DWT by daubechie and novel pattern.

  • PDF

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.