• Title/Summary/Keyword: Event detection

Search Result 650, Processing Time 0.029 seconds

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

Multiplex PCR Detection of the MON1445, MON15985, MON88913, and LLcotton25 Varieties of GM Cotton

  • Kim, Jae-Hwan;Kim, Sun-A;Seo, Young-Ju;Lee, Woo-Young;Park, Sun-Hee;Kim, Hae-Yeong
    • Food Science and Biotechnology
    • /
    • v.17 no.4
    • /
    • pp.829-832
    • /
    • 2008
  • A multiplex polymerase chain reaction (PCR) method was developed to simultaneously detect 4 varieties of genetically modified (GM) cotton. The event-specific primers were used to distinguish the 4 varieties of GM cotton (MON1445, MON15985, MON88913, and LLcotton25) using multiplex PCR. The acyl carrier protein 1 (Acp1) gene was used as an endogenous reference gene of cotton in the PCR detection. The primer pair Acp1-AF/AR containing a 99 bp amplicon was used to amplify the Acp1 gene and no amplified product was observed in any of the 13 different plants used as templates. This multiplex PCR method allowed for the detection of event-specific targets in a genomic DNA mixture of up to 1% GM cotton containing MON1445, MON15985, MON88913, and LLcotton25.

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.

TRED : Twitter based Realtime Event-location Detector (트위터 기반의 실시간 이벤트 지역 탐지 시스템)

  • Yim, Junyeob;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.8
    • /
    • pp.301-308
    • /
    • 2015
  • SNS is a web-based online platform service supporting the formation of relations between users. SNS users have usually used a desktop or laptop for this purpose so far. However, the number of SNS users is greatly increasing and their access to the web is improving with the spread of smart phones. They share their daily lives with other users through SNSs. We can detect events if we analyze the contents that are left by SNS users, where the individual acts as a sensor. Such analyses have already been attempted by many researchers. In particular, Twitter is used in related spheres in various ways, because it has structural characteristics suitable for detecting events. However, there is a limitation concerning the detection of events and their locations. Thus, we developed a system that can detect the location immediately based on the district mentioned in Twitter. We tested whether the system can function in real time and evaluated its ability to detect events that occurred in reality. We also tried to improve its detection efficiency by removing noise.

An Efficient Multiple Event Detection in Sensor Networks (센서 네트워크에서 효율적인 다중 이벤트 탐지)

  • Yang, Dong-Yun;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.36 no.4
    • /
    • pp.292-305
    • /
    • 2009
  • Wireless sensor networks have a lot of application areas such as industrial process control, machine and resource management, environment and habitat monitoring. One of the main objects of using wireless sensor networks in these areas is the event detection. To detect events at a user's request, we need a join processing between sensor data and the predicates of the events. If there are too many predicates of events compared with a node's capacity, it is impossible to store them in a node and to do an in-network join with the generated sensor data This paper proposes a predicate-merge based in-network join approach to efficiently detect multiple events, considering the limited capacity of a sensor node and many predicates of events. It reduces the number of the original predicates of events by substituting some pairs of original predicates with some merged predicates. We create an estimation model of a message transmission cost and apply it to the selection algorithm of targets for merged predicates. The experiments validate the cost estimation model and show the superior performance of the proposed approach compared with the existing approaches.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Analysis of Detecting Effectiveness of a Homing Torpedo using Combined Discrete Event & Discrete Time Simulation Model Architecture (이산 사건/이산 시간 혼합형 시뮬레이션 모델 구조를 사용한 유도 어뢰의 탐지 효과도 분석)

  • Ha, Sol;Cha, Ju-Hwan;Lee, Kyu-Yeul
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.17-28
    • /
    • 2010
  • Since a homing torpedo system consists of various subsystems, organic interactions of which dictate the performance of the torpedo system, it is necessary to estimate the effects of individual subsystems in order to obtain an optimized design of the overall system. This paper attempts to gain some insight into the detection mechanism of a torpedo run, and analyze the relative importance of various parameters of a torpedo system. A database for the analysis was generated using a simulation model based on the combined discrete event and discrete time architecture. Multiple search schemes, including the snake-search method, were applied to the torpedo model, and some parameters of the torpedo were found to be stochastic. We then analyzed the effectiveness of torpedo’s detection capability according to the torpedo speed, the target speed, and the maximum detection range.

Identifying the Patterns of Adverse Drug Responses of Cetuximab

  • Park, Ji Hyun
    • Korean Journal of Clinical Pharmacy
    • /
    • v.32 no.3
    • /
    • pp.226-237
    • /
    • 2022
  • Background: Monoclonal antibodies for the treatment of patients with different types of cancer, such as cetuximab, have been widely used for the past 10 years in oncology. Although drug information package insert contains some representative adverse events which were observed in the clinical trials for drug approval, the overall adverse event patterns on the real-world cetuximab use were less investigated. Also, there have been no published papers that deal with the full spectrums of adverse drug events of cetuximab using national-wide drug safety surveillance systems. Methods: In this study, we detected new adverse event signals of cetuximab in the Korea Adverse Event Reporting System (KAERS) by utilizing proportional reporting ratios, reporting odds ratios, and information components indices. Results: The KAERS database included 869,819 spontaneous adverse event reports, among which 2,116 reports contained cetuximab. We compared the labels of cetuximab among the United States, European Union, Australia, Japan, and Korea to compare the current labeling information and newly detected signals of our study. Some of the signals including hyperkeratosis, tenesmus, folliculitis, esophagitis, neuralgia, disseminated intravascular coagulopathy, and skin/throat tightness were not labeled in the five countries. Conclusion: We identified new signals that were not known at the time of market approval.

A Comparative study On 2D Collision Detection Algorithms For Computer Games (컴퓨터게임을 위한 2D 충돌 감지 알고리즘 비교 분석에 관한 연구)

  • Lee, Young-Jae
    • Journal of Korea Game Society
    • /
    • v.1 no.1
    • /
    • pp.42-48
    • /
    • 2001
  • Collision is a brief dynamic event consisting of the close approach of two or more objects or particles resulting in an abrupt change of momentum or exchange of energy because of interaction. Collisions play very important role in computer graphics, computer games and animations fields. Collisions can supply active interaction between cyberspace and real world and give much interests for making nice games so reasonable collision detection algorithms are needed. Collision detection algorithms should satisfy being fast and accuracy. In this paper, we survey the 2D collision detection algorithms between geometric models. We present several methods and system available for collision detection.

  • PDF

A Personal Video Event Classification Method based on Multi-Modalities by DNN-Learning (DNN 학습을 이용한 퍼스널 비디오 시퀀스의 멀티 모달 기반 이벤트 분류 방법)

  • Lee, Yu Jin;Nang, Jongho
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1281-1297
    • /
    • 2016
  • In recent years, personal videos have seen a tremendous growth due to the substantial increase in the use of smart devices and networking services in which users create and share video content easily without many restrictions. However, taking both into account would significantly improve event detection performance because videos generally have multiple modalities and the frame data in video varies at different time points. This paper proposes an event detection method. In this method, high-level features are first extracted from multiple modalities in the videos, and the features are rearranged according to time sequence. Then the association of the modalities is learned by means of DNN to produce a personal video event detector. In our proposed method, audio and image data are first synchronized and then extracted. Then, the result is input into GoogLeNet as well as Multi-Layer Perceptron (MLP) to extract high-level features. The results are then re-arranged in time sequence, and every video is processed to extract one feature each for training by means of DNN.