• Title/Summary/Keyword: Intruder detection

Search Result 60, Processing Time 0.025 seconds

Two-way Communications-Based household CCTV System for Intruder Detection (양방향 통신 기반 침입자탐지 가정용 CCTV 시스템)

  • Lee, Jae-Hyeok;Kim, SeokJin;Jeong, Young Ju;Han, Yunsung;Seo, Dongmahn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.319-321
    • /
    • 2019
  • 최근 여성 1인 가구를 대상으로 주거침입 관련 범죄가 꾸준히 발생하고 있다. 이러한 범죄를 예방하기 위한 한 방법으로는 특정 구역, 위치를 감시하기 위한 목적으로 CCTV(Closed-circuit television)를 설치하는 방법이 있다. 하지만 일반적인 가정용 CCTV의 경우 사용자 커스터마이징이 제한되어 있다. 따라서 본 논문에서는 저비용의 커스터마이징이 가능한 양방향 통신 기반 침입자탐지 시스템을 제안한다.

Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks

  • Liu, Zhimin;Jiang, Guiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4492-4507
    • /
    • 2021
  • In camera sensor networks (CSNs), in order to better identify the point, full-view problem requires capture any facing direction of target (point or intruder), and its coverage prediction and sensor density issues are more complicated. At present, a lot of research supposes that a large number of homogeneous camera sensors are randomly distributed in a bounded square monitoring region to obtain full-view rate which is close to 1. In this paper, we deduce the sensor density prediction model in heterogeneous deployed CSNs with arbitrary full-view rate. Aiming to reduce the influence of boundary effect, we introduce the concepts of expanded monitoring region and maximum detection area. Besides, in order to verify the performance of the proposed sensor density model, we carried out different scenarios in simulation experiments to verify the theoretical results. The simulation results indicate that the proposed model can effectively predict the sensor density with arbitrary full-view rate.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

A Study on Optimization of Intelligent Video Surveillance System based on Embedded Module (임베디드 모듈 기반 지능형 영상감시 시스템의 최적화에 관한 연구)

  • Kim, Jin Su;Kim, Min-Gu;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.40-46
    • /
    • 2018
  • The conventional CCTV surveillance system for preventing accidents and incidents misses 95% of the data after 22 minutes where one person monitors multiple CCTV. To address this issue, researchers have studied the computer-based intelligent video surveillance system for notifying people of the abnormal situation. However, because the system is involved in the problems of power consumption and costs, the intelligent video surveillance system based on embedded modules has been studied. This paper implements the intelligent video surveillance system based on embedded modules for detecting intruders, detecting fires and detecting loitering, falling. Moreover, the algorithm and the embedded module optimization method are applied to implement real-time processing. The intelligent video surveillance system based on embedded modules is implemented in Raspberry Pi. The algorithm processing time is 0.95 seconds on Raspberry Pi before optimization, and 0.47 seconds on Raspberry Pi after optimization, reduced processing time by 50.52%. Therefore, this suggests real processing possibility of the intelligent video surveillance system based on the embedded modules is possible.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Anomaly Detection Method Based on Trajectory Classification in Surveillance Systems (감시 시스템에서 궤적 분류를 이용한 이상 탐지 방법)

  • Jeonghun Seo;Jiin Hwang;Pal Abhishek;Haeun Lee;Daesik Ko;Seokil Song
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.62-70
    • /
    • 2024
  • Recent surveillance systems employ multiple sensors, such as cameras and radars, to enhance the accuracy of intrusion detection. However, object recognition through camera (RGB, Thermal) sensors may not always be accurate during nighttime, in adverse weather conditions, or when the intruder is camouflaged. In such situations, it is possible to detect intruders by utilizing the trajectories of objects extracted from camera or radar sensors. This paper proposes a method to detect intruders using only trajectory information in environments where object recognition is challenging. The proposed method involves training an LSTM-Attention based trajectory classification model using normal and abnormal (intrusion, loitering) trajectory data of animals and humans. This model is then used to identify abnormal human trajectories and perform intrusion detection. Finally, the validity of the proposed method is demonstrated through experiments using real data.

  • PDF

Design of Intrusion Detection and Audit Trail System using Network Events (전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계)

  • Kim, Ki-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2342-2353
    • /
    • 1997
  • According to the outstanding development of information industry, a study of firewall is progressing as one of methods to cope with threat and loss of the data through computer network. For the secure network, this paper proposes the method diminishing threat and loss of the network using the correlation firewall with network audit trail system. Also, this paper suggests not only the audit analyzer execution model but also the type of databases used in audit analyzer to analyze the audit data. Network audit trail system has the function of identifing and analyzing of all intruder actions using audit records created by users.

  • PDF

The development of intrusion sensor using the variations of speckle patterns (스페클 패턴을 이용한 침입자 센서의 개발)

  • 엄년식;김요희;양승국;오상기;박재희;강신원
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.119-122
    • /
    • 2000
  • The speckle pattern is formed by laser light from a multimode optical fiber. The speckle fluctuation is the result of interference among propagation modes when the optical fiber is subjected to a mechanical distortion at any point along its length. The experiments were carried on for the study of the feasibility of producing an intrusion detection system using the speckle fluctuation. The speckle fluctuation signals were monitored at real time by an oscilloscope which was connected with an amplifier and a filter. The experiment results showed that the intrusion sensor had enough sensitivity to detect an intruder.

  • PDF