• Title/Summary/Keyword: False Positives

Search Result 173, Processing Time 0.023 seconds

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

A Fast and Robust License Plate Detection Algorithm Based on Two-stage Cascade AdaBoost

  • Sarker, Md. Mostafa Kamal;Yoon, Sook;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3490-3507
    • /
    • 2014
  • License plate detection (LPD) is one of the most important aspects of an automatic license plate recognition system. Although there have been some successful license plate recognition (LPR) methods in past decades, it is still a challenging problem because of the diversity of plate formats and outdoor illumination conditions in image acquisition. Because the accurate detection of license plates under different conditions directly affects overall recognition system accuracy, different methods have been developed for LPD systems. In this paper, we propose a license plate detection method that is rapid and robust against variation, especially variations in illumination conditions. Taking the aspects of accuracy and speed into consideration, the proposed system consists of two stages. For each stage, Haar-like features are used to compute and select features from license plate images and a cascade classifier based on the concatenation of classifiers where each classifier is trained by an AdaBoost algorithm is used to classify parts of an image within a search window as either license plate or non-license plate. And it is followed by connected component analysis (CCA) for eliminating false positives. The two stages use different image preprocessing blocks: image preprocessing without adaptive thresholding for the first stage and image preprocessing with adaptive thresholding for the second stage. The method is faster and more accurate than most existing methods used in LPD. Experimental results demonstrate that the LPD rate is 98.38% and the average computational time is 54.64 ms.

Lasso Regression of RNA-Seq Data based on Bootstrapping for Robust Feature Selection (안정적 유전자 특징 선택을 위한 유전자 발현량 데이터의 부트스트랩 기반 Lasso 회귀 분석)

  • Jo, Jeonghee;Yoon, Sungroh
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.557-563
    • /
    • 2017
  • When large-scale gene expression data are analyzed using lasso regression, the estimation of regression coefficients may be unstable due to the highly correlated expression values between associated genes. This irregularity, in which the coefficients are reduced by L1 regularization, causes difficulty in variable selection. To address this problem, we propose a regression model which exploits the repetitive bootstrapping of gene expression values prior to lasso regression. The genes selected with high frequency were used to build each regression model. Our experimental results show that several genes were consistently selected in all regression models and we verified that these genes were not false positives. We also identified that the sign distribution of the regression coefficients of the selected genes from each model was correlated to the real dependent variables.

Protein Function Finding Systems through Domain Analysis on Protein Hub Network (단백질 허브 네트워크에서 도메인분석을 통한 단백질 기능발견 시스템)

  • Kang, Tae-Ho;Ryu, Jea-Woon;Kim, Hak-Yong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.259-271
    • /
    • 2008
  • We propose a protein function finding algorithm that is able to predict specific molecular function for unannotated proteins through domain analysis from protein-protein network. To do this, we first construct protein-protein interaction(PPI) network in Saccharomyces cerevisiae from MIPS databases. The PPI network(proteins; 3,637, interactions; 10,391) shows the characteristics of a scale-free network and a hierarchical network that proteins with a number of interactions occur in small and the inherent modularity of protein clusters. Protein-protein interaction databases obtained from a Y2H(Yeast Two Hybrid) screen or a composite data set include random false positives. To filter the database, we reconstruct the PPI networks based on the cellular localization. And then we analyze Hub proteins and the network structure in the reconstructed network and define structural modules from the network. We analyze protein domains from the structural modules and derive functional modules from them. From the derived functional modules with high certainty, we find tentative functions for unannotated proteins.

UI Elements Identification for Mobile Applications based on Deep Learning using Symbol Marker (심볼마커를 사용한 딥러닝 기반 모바일 응용 UI 요소 인식)

  • Park, Jisu;Jung, Jinman;Eun, Seungbae;Yun, Young-Sun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.89-95
    • /
    • 2020
  • Recently, studies are being conducted to recognize a sketch image of a GUI (Graphical User Interface) based on a deep learning and to make it into a code implemented in an application. UI / UX designers can communicate with developers through storyboards when developing mobile applications. However, UI / UX designers can create different widgets for ambiguous widgets. In this paper, we propose an automatic UI detection method using symbol markers to improve the accuracy of DNN (Deep Neural Network) based UI identification. In order to evaluate the performance with or without the symbol markers, their accuracy is compared. In order to improve the accuracy according to of the symbol marker, the results are analyzed when the shape is a circle or a parenthesis. The use of symbol markers will reduce feedback between developer and designer, time and cost, and reduce sketch image UI false positives and improve accuracy.

Fast Human Detection Method in Range Data using Adaptive UV-histogram and Template Matching (적응적 UV-histogram과 템플릿 매칭을 이용한 거리 영상에서의 고속 인간 검출 방법)

  • Yoon, Bumsik;Kim, Whoi-Yul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.119-128
    • /
    • 2014
  • In this paper, a fast human detection method using adaptive UV-histogram and template matching is proposed. The proposed method improves the detection rate in the scene of complex environment. The method firstly generates U-histogram to extract human candidates and adaptively generates V-histogram for each labled U-histogram, thus it could extract humans correctly, which was impossible in the previous method. The method tries to match the human candidates with the adaptively sized omega shape template to the focal length and distance in order to improve the detection accuracy. It also detects false positives by rematching the template with accumulated foreground images and hence is robust to the occlusion. Experimental results showed that the proposed method has superior performance to the Bae's method in the complex environment with about 15% improvement in precision and 80% in recall and has 20 times faster processing time than Xia's method.

Circulating Aneuploid Cells Detected in the Blood of Patients with Infectious Lung Diseases

  • Kim, Hongsun;Cho, Jong Ho;Sonn, Chung-Hee;Kim, Jae-Won;Choi, Yul;Lee, Jinseon;Kim, Jhingook
    • Journal of Chest Surgery
    • /
    • v.50 no.2
    • /
    • pp.126-129
    • /
    • 2017
  • The identification of circulating tumor cells (CTCs) is clinically important for diagnosing cancer. We have previously developed a size-based filtration platform followed by epithelial cell adhesion molecule immunofluorescence staining for detecting CTCs. To characterize CTCs independently of cell surface protein expression, we incorporated a chromosomal fluorescence in situ hybridization (FISH) assay to detect abnormal copy numbers of chromosomes in cells collected from peripheral blood samples by the size-based filtration platform. Aneuploid cells were detected in the peripheral blood of patients with lung cancer. Unexpectedly, aneuploid cells were also detected in the control group, which consisted of peripheral blood samples from patients with benign lung diseases, such as empyema necessitatis and non-tuberculous mycobacterial lung disease. These findings suggest that chromosomal abnormalities are observed not only in tumor cells, but also in benign infectious diseases. Thus, our findings present new considerations and bring into light the possibility of false positives when using FISH for cancer diagnosis.

Algorithms for Causality Evaluation of Adverse Events from Health/Functional Foods (건강기능식품 부작용 원인분석을 위한 알고리즘)

  • Lee, Kyung-Jin;Park, Kyoung-Sik;Kim, Jeong-Hun;Lee, Young-Joo;Yoon, Tae-Hyung;No, Ki-Mi;Park, Mi-Sun;Leem, Dong-Gil;Yoon, Chang-Yong;Jeong, Ja-Young
    • Journal of Food Hygiene and Safety
    • /
    • v.26 no.4
    • /
    • pp.302-307
    • /
    • 2011
  • One of the most important objectives of post-marketing monitoring of dietary supplements is the early detection of unknown and unexpected adverse events (AEs). Several causality algorithms, such as the Naranjo scale, the RUCAM scale, and the M & V scale are available for the estimation of the likelihood of causation between a product and an AE. Based on the existing algorithms, the Korea Food & Drug Administration has developed a new algorithm tool to reflect the characteristics of dietary supplements in the causality analysis. However, additional work will be required to confirm if the newly developed algorithm tool has reasonable sensitivity and not to generate an unacceptable number of false positives signals.

Age-dependent Changes of Differential Gene Expression Profile in Backfat Tissue between Hybrids and Parents in Pigs

  • Ren, ZH.Q.;Xiong, Yuanzhu;Deng, CH.Y.;Zuo, B.;Liu, Y.G.;Lei, M.G.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.18 no.5
    • /
    • pp.682-685
    • /
    • 2005
  • Large White, an introduced European pig breed, and Meishan, a Chinese indigenous pig breed, were hybridized directly and reciprocally and a total of 260 pigs, including purebreds, Large White and Meishan, and their hybrids, White${\times}$Meishan (LM) and Meishan${\times}$Large White (ML) pigs, were bred in our laboratory. The mRNA differential display PCR (DD-PCR) was used to detect the age-dependent changes of differential gene expression in backfat tissue between hybrids and parents. Some measures were taken to reduce the false positives in our experiment. Among the total of 2,686 bands obtained, 1,952 bands (about 72.67%) were reproducible and eight patterns (fifteen kinds) of gene expression were observed. The percentage of differentially expressed genes between hybrids and parents is 56.86% at the age of four months and 57.71% at the age of six months. This indicated that the differences of gene expression between hybrids and their parents were very obvious. U-test was used to compare the patterns of gene expression between the age of four and six months, and results showed that bands occurring in only one hybrid and bands displayed in one hybrid and one parent were significantly different at p<0.05, and bands visualized in only two hybrids were significantly different at p<0.01. These indicated that differential gene expression between hybrids and parents changed at different ages.