• Title/Summary/Keyword: IS Misuse

Search Result 312, Processing Time 0.024 seconds

Learning Method for minimize false positive in IDS (침입탐지시스템에서 긍정적 결함을 최소화하기 위한 학습 방법)

  • 정종근;김철원
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.978-985
    • /
    • 2003
  • The implementation of abnormal behavior detection IDS is more difficult than the implementation of misuse behavior detection IDS because usage patterns are various. Therefore, most of commercial IDS is misuse behavior detection IDS. However, misuse behavior detection IDS cannot detect system intrusion in case of modified intrusion patterns occurs. In this paper, we apply data mining so as to detect intrusion with only audit data related in intrusion among many audit data. The agent in the distributed IDS can collect log data as well as monitoring target system. False positive should be minimized in order to make detection accuracy high, that is, core of intrusion detection system. So We apply data mining algorithm for prediction of modified intrusion pattern in the level of audit data learning.

Effects of Motor Learning Guided Laryngeal Motor Control Therapy for Muscle Misuse Dysphonia (운동학습이론에 기초한 발성운동조절법이 근오용성 발성장애의 음성에 미치는 효과)

  • Seo, In-Hyo;Lee, Ok-Bun;Lee, Sang-Joon;Chung, Phil-Sang
    • Phonetics and Speech Sciences
    • /
    • v.3 no.3
    • /
    • pp.133-140
    • /
    • 2011
  • Muscle misuse dysphonia (MMD) is defined as a behavioral voice disorder resulting from inappropriate contractions of intrinsic and/or extrinsic laryngeal muscles. The purpose of this study was to investigate the effect of motor learning guided laryngeal motor control therapy (MLG-LMCT) which is designed to improve an existing LMT and further the effective voice treatment on people with muscle misuse dysphonia. Forty-six people with MMD (M:F=16:30) participated in this study. The voice samples of the participants were recorded to investigate the effect of MLG-LMCT before and after the voice therapy. Voice samples were analyzed via electro-glotto-graph (EGG). Contact quotient (CQ), speed quotient (SQ), and waveform were reported. In addition, perceptual and acoustical evaluation were conducted to determine the change of voice improvement after treatment. The experimenter massaged the tensioned muscles around the neck. In order to find more proper phonation the experimenter showed the subjects their EGG wave forms as to whether or not they are moving the vocal folds to the appropriate position. Therefore, the EGG wave forms were used as a type of visual feedback. With the wave form, the experimenter helped subjects move the vocal folds and laryngeal muscles to find more proper voice production. The sensory stimuli from the experimenter gradually faded out. A paired dependent t- test revealed that there was significant differences in CQ between pre- and post-therapy. Perceptually, overall, rough, breathy, strain, and transition were significantly reduced. Acoustically, there were significant differences in Fo, jitter, shimmer, and NHR. After using MLG-LMCT, most of the subjects showed improvements in voice quality. The results from this study led us to the following conclusions: Motor learning guided laryngeal motor control therapy (MLG-LMCT) has reduces muscle misuse dysphonia. These results may occur because a visual feedback from EGG wave form can maintain the effect of the muscle tension reduction from laryngeal manual therapy. In case of people with MMD who reduced muscle tension from the therapy (LMT) but, not appropriately manipulating the location of larynx or adducting the vocal folds, MLG-LMCT might be an alternative therapy approach.

  • PDF

Evaluation of a Medication Self-management Education Program for Elders with Hypertension Living in the Community (지역사회 고혈압 노인의 약물 자기관리 교육 프로그램의 효과)

  • Lee, Jong Kyung
    • Journal of Korean Academy of Nursing
    • /
    • v.43 no.2
    • /
    • pp.267-275
    • /
    • 2013
  • Purpose: The purpose of this study was to examine the effect of a medication self-management education program on medication awareness, communication with health care provider, medication misuse behavior, and blood pressure in elders with hypertension. Methods: The research design for this study was a non-equivalent control group quasi-experimental design. Participants were 23 elders for the control group, and 26 elders for the experimental group. The experimental group participated in the medication self-management education program which included the following, verbal education, 1:1 consultation, practice in medication self-management, and discussion over 5 sessions. Data were analyzed using the SPSS 18.0 program. Results: There were statistically significant differences between the experimental and control group for medication awareness, medication misuse behavior, and communication with health care providers. However, no significant difference was found between the two groups for blood pressure. Conclusion: The results indicate that the education program is effective in improving medication awareness and communication with health care providers and in decreasing medication misuse behavior. Therefore, it is recommended that this education program be used as an effective intervention for improving medication self-management for elders with hypertension.

Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS (침입탐지시스템에서 포트 스캔 탐지 개선 및 공격 탐지와 연계한 알고리즘 설계 및 구현)

  • Park Seong-Chul;Ko Han-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.65-76
    • /
    • 2006
  • This paper deals with an effective algerian aimed at improving the port scan detection in an intrusion detection system (IDS). In particular, a detection correlation algerian is proposed to maximize the detection capability in the network-based IDS whereby the 'misuse' is flagged for analysis to establish intrusion profile in relation to the overall port scan detection process. In addition, we establish an appropriate system maintenance policy for port scan detection as preprocessor for improved port scan in IDS, thereby achieving minimum false positive in the misuse detection engine while enhancing the system performance.

A Study on the Systematic Management of Zolpidem (졸피뎀의 체계적 관리 방안 연구)

  • Jeong, Su-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.462-471
    • /
    • 2020
  • The Zolpidem, commonly used as a sleeping pill, binds to GABA receptors to increase neuro-inhibiting transporters. There are many cases where people take Zolpidem for more than four weeks in a row. The Drug Utilization Review, currently in effect in South Korea, can identify the use patterns of Zolpidem. It is necessary to prevent Zolpidem's misuse. The study was conducted from May 10, 2019 to May 15, 2019. Primary and secondary screening was performed out of 125,197 total retrieved documents. The final 254 literature cases directly related to Zolpidem's misuse were selected. Through systematic literature research through meta-analysis, we tried to find a way to prevent Zolpidem's misuse through the Drug Utilization Review. The distortion was minimized by applying it in the screening process. Zolpidem's misuse was severe and continued to increase its use. There has also been an increase in crime using Zolpidem. It has been analyzed that Zolpidem can be managed through Narcotics Integrated Management System and Drug Utilization Review. In order to reduce the use of Zolpidem, the supply through the Narcotics Integrated Management System and the demand through long-term user education should be suppressed.

The Intelligent Intrusion Detection Systems using Automatic Rule-Based Method (자동적인 규칙 기반 방법을 이용한 지능형 침입탐지시스템)

  • Yang, Ji-Hong;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.531-536
    • /
    • 2002
  • In this paper, we have applied Genetic Algorithms(GAs) to Intrusion Detection System(TDS), and then proposed and simulated the misuse detection model firstly. We have implemented with the KBD contest data, and tried to simulated in the same environment. In the experiment, the set of record is regarded as a chromosome, and GAs are used to produce the intrusion patterns. That is, the intrusion rules are generated. We have concentrated on the simulation and analysis of classification among the Data Mining techniques and then the intrusion patterns are produced. The generated rules are represented by intrusion data and classified between abnormal and normal users. The different rules are generated separately from three models "Time Based Traffic Model", "Host Based Traffic Model", and "Content Model". The proposed system has generated the update and adaptive rules automatically and continuously on the misuse detection method which is difficult to update the rule generation. The generated rules are experimented on 430M test data and almost 94.3% of detection rate is shown.3% of detection rate is shown.

False Alarm Minimization Technology using SVM in Intrusion Prevention System (SVM을 이용한 침입방지시스템 오경보 최소화 기법)

  • Kim Gill-Han;Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.

  • PDF

Authorship and Inappropriate Authorship from an Ethical Publication Perspective (출판 윤리적 관점에서의 저자됨과 부적절한 저자됨)

  • Sung Hun Kim;Jung Im Jung
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.752-758
    • /
    • 2022
  • Authorship is important for research integrity and publication ethics, acting as the basis for credit and academic achievement. Moreover, publication achievements have a significant impact on research grants and academic careers. Inappropriate authorship has been reported for several reasons, including complex interests and competitive environments. One form of this is representative authorship misuse, which includes honorary and ghost authorships. Kin co-authorship, such as parent-children authorship, is another form of inappropriate authorship that has recently emerged as a social problem in Korea. To address these issues, the International Committee of Medical Journal Editors (ICMJE) has established criteria for authorship. Similarly, many journals use the Contributor Roles Taxonomy (CRediT) and Open Researcher and Contributor ID (ORCID) systems to prevent authorship misuse and systematically evaluate author credit and responsibility. Herein, this article reviews authorship and inappropriate authorship, as well as introduces methods to avoid authorship misuse.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

Reinforcement Data Mining Method for Anomaly&Misuse Detection (침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론)

  • Choi, Yun Jeong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • Recently, large amount of information in IDS(Intrusion Detection System) can be un manageable and also be mixed with false prediction error. In this paper, we propose a data mining methodology for IDS, which contains uncertainty based on training process and post-processing analysis additionally. Our system is trained to classify the existing attack for misuse detection, to detect the new attack pattern for anomaly detection, and to define border patter between attack and normal pattern. In experimental results show that our approach improve the performance against existing attacks and new attacks,from 0.62 to 0.84 about 35%.