• Title/Summary/Keyword: False communication

Search Result 283, Processing Time 0.027 seconds

Transmission Power-Based Spectrum Sensing for Cognitive Ad Hoc Networks

  • Choi, Hyun-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.2
    • /
    • pp.97-103
    • /
    • 2014
  • In spectrum sensing, there is a tradeoff between the probability of missed detection and the probability of a false alarm according to the value of the sensing threshold. Therefore, it is important to determine the sensing threshold suitable to the environment of cognitive radio networks. In this study, we consider a cognitive radio-based ad hoc network where secondary users directly communicate by using the same frequency band as the primary system and control their transmit power on the basis of the distance between them. First, we investigate a condition in which the primary and the secondary users can share the same frequency band without harmful interference from each other, and then, propose an algorithm that controls the sensing threshold dynamically on the basis of the transmit power of the secondary user. The analysis and simulation results show that the proposed sensing threshold control algorithm has low probabilities of both missed detection and a false alarm and thus, enables optimized spectrum sharing between the primary and the secondary systems.

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter

  • Yan, Xi-ai;Shi, Wei-qi;Tian, Hua
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1265-1276
    • /
    • 2019
  • Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.

Automatic detection of pulmonary nodules in X-ray chest images (폐의 X선 영상에서의 노쥴 자동 탐지 기법)

  • Seong, Won;Park, Jong-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.767-770
    • /
    • 2002
  • 일반적으로 방사선 의사들(radialogists)이 폐 노쥴(pulmonary nodule)을 탐지하는 데는 실제적으로 30%의 실패율을 가진다고 알려져 있다. 만약 자동화된 시스템이 체스트 영상에서 의심스런 노쥴들의 위치들을 방사선 의사에게 알려줄 수 있다면 잘못 판단되는 노쥴들의 수를 잠재적으로 줄일 수 있다. 우리는 형태학적 필터들(morphological filters)과 두가지 특징-추출(feature-extraction) 기술들을 포함하는 컴퓨터 자동 처리 시스템을 구현하였다. 본 시스템에서는 첫째로 형태학적 필터(morphological filtering) 처리를 행한다. 이 과정은 원래의 영상에 침식(erosion)과 확장 (dilation)을 연이어서 행하는 것으로 처리가 어려운 X 선 영상을 좀 더 다루기 쉬운 상태로 바꿔주는 역할을 하게 된다. 둘째는 일차적으로 노쥴로서 컴퓨터에 선택된 의심 부분에 가해주는 특징-추출 테스트로서 이 작용은 노쥴로 감지되었으나 실제로는 노쥴이 아닌 경우인 false-positive 갑지들을 줄이기 위해서 사용된다. 그리하여 본 시스템은 노쥴의 정확한 판독이 어려운 폐의 X 선 영상에 적용되어 false-positive 들을 효과적으로 줄임으로써 보다 효율적인 폐 노쥴의 탐지를 가능하게 하였다.

  • PDF

Sensing of OFDM Signals in Cognitive Radio Systems with Time Domain Cross-Correlation

  • Xu, Weiyang
    • ETRI Journal
    • /
    • v.36 no.4
    • /
    • pp.545-553
    • /
    • 2014
  • This paper proposes an algorithm to sense orthogonal frequency-division multiplexing (OFDM) signals in cognitive radio (CR) systems. The basic idea behind this study is when a primary user is occupying a wireless channel, the covariance matrix is non-diagonal because of the time domain cross-correlation of the cyclic prefix (CP). In light of this property, a new decision metric that measures the power of the data found on two minor diagonals in the covariance matrix related to the CP is introduced. The impact of synchronization errors on the signal detection is analyzed. Besides this, a likelihood-ratio test is proposed according to the Neyman-Pearson criterion after deriving probability distribution functions of the decision metric under hypotheses of signal presence and absence. A threshold, subject to the requirement of probability of false alarm, is derived; also the probabilities of detection and false alarm are computed accordingly. Finally, numerical simulations are conducted to demonstrate the effectiveness of the proposed algorithm.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

A Highly Reliable Fall Detection System for The Elderly in Real-Time Environment (실시간 환경에서 노인들을 위한 고신뢰도 낙상 검출 시스템)

  • Lee, Young-Sook;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.401-406
    • /
    • 2008
  • Fall event detection is one of the most common problems for elderly people, especially those living alone because falls result in serious injuries such as joint dislocations, fractures, severe head injuries or even death. In order to prevent falls or fall-related injuries, several previous methods based on video sensor showed low fall detection rates in recent years. To improve this problem and outperform the system performance, this paper presented a novel approach for fall event detection in the elderly using a subtraction between successive difference images and temporal templates in real time environment. The proposed algorithm obtained the successful detection rate of 96.43% and the low false positive rate of 3.125% even though the low-quality video sequences are obtained by a USB PC camera sensor. The experimental results have shown very promising performance in terms of high detection rate and low false positive rate.

Deficiencies of the GMDSS Distress Communication System and Methods to Improve (GMDSS 조난통신 제도의 문제점과 개선 방안)

  • KIM Byung-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.733-738
    • /
    • 2005
  • The distress communication system in the maritime mobile service had almost depended on the wireless telephony or telegraphy technique. The GMDSS (Global Maritime Distress and Safety System) which was introduced in 1992 brought a lot of changes in the maritime distress communication service such as the automatic transmission of distress signals and implementation of global search and rescue networks. However, there are some deficiencies in the GMDSS distress communication system such as a lack of compatibility in the maritime distress communication between CMDSS ships and Non-GMDSS ships, increasing deceptive or false distress alerts generated by GMDSS installations, lack of understanding about the CMDSS installations for the operators. In this paper, the problems of distress communication system in the maritime mobile service are analyzed and the methods to solve or minimize these problems are suggested.

A Study on the PN code Acquisition for DS-CDMA System under Nakagami-m Fading (나카가미-m 페이딩을 고려한 DS-CDMA 시스템의 PN 부호 획득에 관한 연구)

  • 정남모;박진수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.78-83
    • /
    • 2001
  • In this paper, we are considered Nakagami-m fading, which can model variable multipath mobile radio communication channel, in DS-CDMA system. System modeling using nakagami -m fading is suited for urban mobile communication channel with multipath. We used adaptive serial search PN code acquisition scheme and derived the detection probability($P_D$) and false alarm probability($P_FA$) which have influence on code acquisition time, over Nakagami-m fading. Detection probability($P_D$) and false alarm probability($P_FA$) are detection variable to decide PN code acquisition time and should use to calculate mean and variance. of acquisition time. From computer simulation, we analyzed mean and variance about PN code acquisition of fading channel. Then we can apply it to the H/W design of mobile communication.

  • PDF

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

Deficiencies of the GMDSS Distress Communication System and Methods to Improve (GMDSS 조난통신 제도의 문제점과 개선 방안)

  • Kim, Byung-Ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.213-216
    • /
    • 2005
  • The distress communication system in the maritime mobile service had almost depended on the wireless telephony or telegraphy technique. The GMDSS (Global Maritime Distress and Safety System) which was introduced in 1992 brought a lot of changes in the maritime distress communication service such as the automatic transmission of distress signals and implementation of global search and rescue networks. However, there are some deficiencies in the GMDSS distress communication system such as a lack of compatibility in the maritime distress communication between GMDSS ships and Non-GMDSS ships, increasing deceptive or false distress alerts generated by GMDSS installations, lack of understanding about the GMDSS installations for the operators. In this paper, the problems of distress communication system in the maritime mobile service are analyzed and the methods to solve or minimize these problems are suggested.

  • PDF