• Title/Summary/Keyword: False alarms

Search Result 196, Processing Time 0.03 seconds

Automated Unit-test Generation for Detecting Vulnerabilities of Android Kernel Modules (안드로이드 커널 모듈 취약점 탐지를 위한 자동화된 유닛 테스트 생성 기법)

  • Kim, Yunho;Kim, Moonzoo
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.171-178
    • /
    • 2017
  • In this study, we propose an automated unit test generation technique for detecting vulnerabilities of Android kernel modules. The technique automatically generates unit test drivers/stubs and unit test inputs for each function of Android kernel modules by utilizing dynamic symbolic execution. To reduce false alarms caused by function pointers and missing pre-conditions of automated unit test generation technique, we develop false alarm reduction techniques that match function pointers by utilizing static analysis and generate pre-conditions by utilizing def-use analysis. We showed that the proposed technique could detect all existing vulnerabilities in the three modules of Android kernel 3.4. Also, the false alarm reduction techniques removed 44.9% of false alarms on average.

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

Comparison of the Clinical Performance between Two Pulse Oximeters in NICU: Nellcor $N-595^{(R)}$ versus Masimo $SET^{(R)}$ (신생아 중환자실에서 맥박산소측정기의 감지도 비교: Nellcor $N-595^{(R)}$ versus Masimo $SET^{(R)}$)

  • Lee, Heun-Ji;Choi, Jang-Hwan;Min, Sung-Ju;Kim, Do-Hyun;Kim, Hee-Sup
    • Neonatal Medicine
    • /
    • v.17 no.2
    • /
    • pp.245-249
    • /
    • 2010
  • Purpose: Numerous false alarms by pulse oximetry, which is widely used in neonatal intensive care unit, can delay response to true alarms. Masimo $SET^{(R)}$ was introduced lately, to overcome false alarms by motion. We compared the clinical performance of two devices (Nellcor $N-595^{(R)}$ and Masimo $SET^{(R)}$) for the evaluation of the false alarm frequency during usual motion artifacts and stable state. Methods: A total of 20 preterm infants weighing 1,000-2,500 g were enrolled in the study. The sensors of two devices were placed on the different feet on the same infants, and both devices were programmed to emit an alarm for episode of hypoxemia (SpO2$\leq$85%). The false alarms were defined as episodes of poor correlation with ECG heart rate, poor waveforms, and the absence of obvious signs of hypoxia. We compared the frequency of false alarms between the two devices. Results: The mean chronological age was 20.8 days and the mean body weight was 1,668 g on the study day. The frequency of total false alarm was significantly fewer for Masimo $SET^{(R)}$ pulse oximetry (48 in Nellcor $N-595^{(R)}$, 27 in Masimo $SET^{(R)}$) although the false alarm during usual motion artifacts was not significantly between two devices (32 in Nellcor $N-595^{(R)}$, 19 in Masimo $SET^{(R)}$). Conclusion: The Masimo $SET^{(R)}$ pulse oximetry has fewer false alarm rates and identified more true hypoxic events than Nellcor $N-595^{(R)}$ pulse oximetry. Therefore, it is useful for adequate oxygen therapy and helps to decrease unnecessary handling by clinicians and nurses.

Application of Signal Pattern Recognition Technique of Digital Wireless Fire Alarm System (디지털 방식 무선 화재알림설비의 신호 패턴 인식기법 적용)

  • Park, Seunghwan;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.5
    • /
    • pp.14-21
    • /
    • 2022
  • The purpose of this study was to apply the signal pattern recognition technique to the digital wireless fire-alarm system and to reduce unwanted fire alarms. In this study, the fire alarms of the K Institute, which operates the largest digital wireless fire-alarm system in Korea, were classified into normal operations and unwanted fire alarms, and these were analyzed and compared with actual fire signals. In addition, by designing a non-fire signal filter and applying it to the K Institute, we confirmed that the monthly unwanted fire alarm rate of all 5,713 detectors decreased sharply. In particular, the unwanted fire alarm rate for flame decreased from 1.09% to 0.11% and the unwanted fire alarm rate for smoke decreased from 0.65% to 0.035%.

An Economic Design of the Chart with Variable Sample Size Scheme

  • Park, Chang-Soon;Ji, Seon-Su
    • Journal of the Korean Statistical Society
    • /
    • v.23 no.2
    • /
    • pp.403-420
    • /
    • 1994
  • An economic design of the $\bar{X}-R$ chart using variable sample size (VSS) scheme is proposed in this paper. In this design the sample size at each sampling time changes according to the values of the previous two sample statistics, sample mean and range. The VSS scheme uses large sample if the sample statistics appear near inside the control limits and smaller sample otherwise. The set of process parameters, such as the sampling interval, control limits and the sample sizes, are chosen to minimize the expected cost per hour. The efficiency of the VSS scheme is compared to the fixed sample size one for cases where there is multiple of assignable causes. Percent reductions of the expected cost in the VSS design are calculated for some given sets of cost parameters. It is shown that the VSS scheme improves the confidence of the procedure and performs statistically better in terms of the number of false alarms and the average time to signal, respectively.

  • PDF

Land Masking Methods of Sentinel-1 SAR Imagery for Ship Detection Considering Coastline Changes and Noise

  • Bae, Jeongju;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.4
    • /
    • pp.437-444
    • /
    • 2017
  • Since land pixels often generate false alarms in ship detection using Synthetic Aperture Radar (SAR), land masking is a necessary step which can be processed by a land area map or water database. However, due to the continuous coastline changes caused by newport, bridge, etc., an updated data should be considered to mask either the land or the oceanic part of SAR. Furthermore, coastal concrete facilities make noise signals, mainly caused by side lobe effect. In this paper, we propose two methods. One is a semi-automatic water body data generation method that consists of terrain correction, thresholding, and median filter. Another is a dynamic land masking method based on water database. Based on water database, it uses a breadth-first search algorithm to find and mask noise signals from coastal concrete facilities. We verified our methods using Sentinel-1 SAR data. The result shows that proposed methods remove maximum 84.42% of false alarms.

Driving Method of Ultraviolet Sensor for Fire alarms using Pulse Width Modulation (PWM을 이용한 화재 감지를 위한 자외선 센서의 구동 방법)

  • Lim, Byung-Hyun;Ko, Nak-Yong;Hwang, Jong-Sun;Kim, Yeong-Min
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.05c
    • /
    • pp.31-35
    • /
    • 2004
  • We propose driving method of Ultraviolet sensor for fire alarms using pulse width modulation that used to fire detector with sensor of private-use detectable light energy as ultraviolet in energy of electromagnetic-wave type radiate from flame, when combustible burn with contain carbon,. Ultraviolet sensor is UV Tron using gas multiplication effect to current discharge and photoelectric effect of metal. To have high sensibility and to gain proper output voltage, it has high responsive performance. This research designed driving circuit with UV sensors and proposed method of false alarm reduced to resemble fire. the result propers the prevention and extinction of fire technique degree, certificated operation of detector.

  • PDF

USEFUL REDUNDANT TECHNIQUES FOR BUILT -IN -TEST RELATED SYSTEM

  • Yoo, Wang-Jin;Oh, Hyun-Seung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.21 no.2
    • /
    • pp.183-194
    • /
    • 1995
  • This research paper describes several possible suggestions which are essential to develop for Built-In-Test(BIT) related systems, such as more precise BIT parameter analysis, sensitivity analysis of the impact of BIT on redundant systems, statistical inference of field data for BIT performance parameters, methods of reducing BIT false alarms, BIT application in industrial automation and remote control, prevent the system from the impact of BIT failure, undetections and false alarms, life cycle cost analysis for BIT. And, it is mainly focused on redundancy technique for solving BIT diagnostic problems. Algorithms for redundant systems : overlapping technique, flexible redundant BITs are presented and case study will be shown based on various experiment.

  • PDF

Evaluating Corrective Feedback Generated by an AI-Powered Online Grammar Checker

  • Moon, Dosik
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • This study evaluates the accuracy of corrective feedback from Grammarly, an online grammar checker, on essays written by cyber university learners in terms of detected errors, suggested replacement forms, and false alarms.The results indicate that Grammarly has a high overall error detection rate of over 65%, being particularly strong at catching errors related to articles and prepositions. In addition, on the detected errors, Grammarly mostly provide accurate replacement forms and very rarely make false alarms. These findings suggest that Grammarly has high potential as a useful educational tool to complement the drawbacks of teacher feedback and to help learnersimprove grammatical accuracy in their written work. However, it is still premature to conclude that Grammarly can completely replace teacher feedback because it has the possibility (approximately 35%) of failing to detect errors and the limitationsin detecting errors in certain categories. Since the feedback from Grammarly is not entirely reliable, caution should be taken for successful integration of Grammarly in English writing classes. Teachers should make judicious decisions on when and how to use Grammarly, based on a keen awareness of Grammarly's strengths and limitations.

Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic (무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법)

  • Han, Man-Ho;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF