• Title/Summary/Keyword: Distributed detection

Search Result 783, Processing Time 0.135 seconds

Health Monitoring for Large Structures using Brillouin Distributed Sensing

  • Thevenaz, L.;Chang, KT.;Nikles, M.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.25 no.6
    • /
    • pp.421-430
    • /
    • 2005
  • Brillouin time-domain analysis in optical fibres is a novel technique making possible a distributed measurement of temperature and strain over long distance and will deeply modify our view about monitoring large structures, such as dams, bridges, tunnels and pipelines, Optical fibre sensing will certainly be a decisive tool for securing dangerous installations and detecting environmental and industrial threats.

A Study on Power Quality Detection Method of Utility interconnected Distributed Generation (분산전원이 연계된 배전계통에서의 전압품질 검출에 관한 연구)

  • Lee, B.Y.;Kim, J.C.;Jung, S.B.
    • Proceedings of the KIEE Conference
    • /
    • 2004.11b
    • /
    • pp.252-254
    • /
    • 2004
  • This paper studies power quality problem of utility interconnected distributed generation. Recently, electronic devices that are sensitive to power quality have been increasing. Both utility and customer are interested in power quality problem. Therefore, we studied an effect of utility power quality caused by distributed generation. We detect and analysis voltage sag which is one of power quality indicator. Also, we used Matlab to simulate power quality problem.

  • PDF

Intrusion Detection Technique using Distributed Mobile Agent (Distributed Mobile Agent를 이용한 침입탐지 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae;Yang, Jeong Mo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.69-75
    • /
    • 2012
  • MANET(Mobile Ad-hoc Network) is target of many attacks because of dynamic topology and hop-by-hop data transmission method. In MANET, location setting of intrusion detection system is difficult and attack detection using information collected locally is more difficult. The amount of traffic grow, intrusion detection performance will be decreased. In this paper, MANET is composed of zone form and we used random projection technique which reduces dimension without loss of information in order to perform stable intrusion detection in even massive traffic. Global detection node is used to detect attacks which are difficult to detect using only local information. In the global detection node, attack detection is performed using received information from IDS agent and pattern of nodes. k-NN and ZBIDS were experimented to evaluate performance of the proposed technique in this paper. The superiority of performance was confirmed through the experience.

Distributed Processing System Design and Implementation for Feature Extraction from Large-Scale Malicious Code (대용량 악성코드의 특징 추출 가속화를 위한 분산 처리 시스템 설계 및 구현)

  • Lee, Hyunjong;Euh, Seongyul;Hwang, Doosung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.2
    • /
    • pp.35-40
    • /
    • 2019
  • Traditional Malware Detection is susceptible for detecting malware which is modified by polymorphism or obfuscation technology. By learning patterns that are embedded in malware code, machine learning algorithms can detect similar behaviors and replace the current detection methods. Data must collected continuously in order to learn malicious code patterns that change over time. However, the process of storing and processing a large amount of malware files is accompanied by high space and time complexity. In this paper, an HDFS-based distributed processing system is designed to reduce space complexity and accelerate feature extraction time. Using a distributed processing system, we extract two API features based on filtering basis, 2-gram feature and APICFG feature and the generalization performance of ensemble learning models is compared. In experiments, the time complexity of the feature extraction was improved about 3.75 times faster than the processing time of a single computer, and the space complexity was about 5 times more efficient. The 2-gram feature was the best when comparing the classification performance by feature, but the learning time was long due to high dimensionality.

Signal Detection Based on a Decreasing Exponential Function in Alpha-Stable Distributed Noise

  • Luo, Jinjun;Wang, Shilian;Zhang, Eryang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.269-286
    • /
    • 2018
  • Signal detection in symmetric alpha-stable ($S{\alpha}S$) distributed noise is a challenging problem. This paper proposes a detector based on a decreasing exponential function (DEF). The DEF detector can effectively suppress the impulsive noise and achieve good performance in the presence of $S{\alpha}S$ noise. The analytical expressions of the detection and false alarm probabilities of the DEF detector are derived, and the parameter optimization for the detector is discussed. A performance analysis shows that the DEF detector has much lower computational complexity than the Gaussian kernelized energy detector (GKED), and it performs better than the latter in $S{\alpha}S$ noise with small characteristic exponent values. In addition, the DEF detector outperforms the fractional lower order moment (FLOM)-based detector in $S{\alpha}S$ noise for most characteristic exponent values with the same order of magnitude of computational complexity.

Design of agent intrusion detection system applying data mining (데이터 마이닝을 적용한 에이전트 침입 탐지 시스템 설계)

  • Jeong Jong Kun;Lee Sung Tae;Kim Yong Ho;Lee Yun Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.676-679
    • /
    • 2001
  • As network security is coning up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more reliable network and system security rather than firewall. In this paper, we propose the new IDS model which tan detect intrusion in different systems as well as which ran make real-time detection of intrusion in the expanded distributed environment in host level of drawback of existing IDS. We implement its prototype and verify its validity. We use pattern extraction agent so that we can extract automatically audit file needed in distributed intrusion detection even in other platforms.

  • PDF

Performance of DF Protocol for Distributed Cooperative Spectrum Sensing in Cognitive Radio

  • Zou, Mingrui;Bae, Sang-Jun;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2A
    • /
    • pp.124-131
    • /
    • 2009
  • Cognitive radio has been proposed to mitigate the spectrum scarcity problem by allowing the secondary users to access the under-utilized frequency bands and opportunistically transmit. Spectrum sensing, as a key technology in cognitive radio, is required to reliably detect the presence of primary users to avoid the harmful interference. However, it would be very hard to reliably detect the presence of primary users due to the channel fading, shadowing. In this paper, we proposed a distributed cooperative spectrum sensing scheme based on conventional DF (decode-and-forward) cooperative diversity protocol. We fist consider the cooperation between two secondary users to illustrate that cooperation among secondary users can obviously increase the detection performance. We then compare the performance of DF based scheme with another conventional AF (amplify-and-forward) protocol based scheme. And it is found that the proposed scheme based on DF has a better detection performance than the one based on AF. After that, we extend the number of cooperative secondary users, and demonstrate that increasing the cooperation number can significantly improve the detection performance.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Real-time Faulty Node Detection scheme in Naval Distributed Control Networks using BCH codes (BCH 코드를 이용한 함정 분산 제어망을 위한 실시간 고장 노드 탐지 기법)

  • Noh, Dong-Hee;Kim, Dong-Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.20-28
    • /
    • 2014
  • This paper proposes a faulty node detection scheme that performs collective monitoring of a distributed networked control systems using interval weighting factor. The algorithm is designed to observe every node's behavior collectively based on the pseudo-random Bose-Chaudhuri-Hocquenghem (BCH) code. Each node sends a single BCH bit simultaneously as a replacement for the cyclic redundancy check (CRC) code. The fault judgement is performed by performing sequential check of observed detected error to guarantee detection accuracy. This scheme can be used for detecting and preventing serious damage caused by node failure. Simulation results show that the fault judgement based on decision pattern gives comprehensive summary of suspected faulty node.