• Title/Summary/Keyword: Intrusion Sensor

Search Result 92, Processing Time 0.024 seconds

An Intrusion Detection System Based on Sensor (센서 개념을 적용한 침입 탐지 시스템)

  • 장철연;김근래;조성제;김준모
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.454-456
    • /
    • 2002
  • 본 논문에서는 센서(센서 파일, 센서 데이터 등)를 이용한 침입 탐지 시스템인 SbIDS(Sensor based Intrusion Detection System)를 제안한다. 리눅스 시스템에 구현된 SbIDS는 호스트 기반 침입탐지 기법과 네트워크 기반 침입탐지 기법이 통합된 시스템으로, 일차적으로 커털 수준에서 침입을 감지하고 대응하는 KMOD 모듈과 이차적으로 네트워크 수준에서 침입을 감지하고 대응하는 NetMOD 모듈로 구성되어 있어 호스트 내에서의 침입과 네트워크를 통한 침입을 동시에 탐지할 수 있다. SbIDS를 이용한 침입 탐지를 위해 먼저 주요 디렉토리에는 센서 파일을, 주요 파일에는 센서 데이터를 설치한다. 그 다음, 침입자에 의해 센서가 접근될 때마다 위기 상황으로 보고 커널 수준과 네트워크 수줄에서 로그를 작성하며, 공격자를 식별하여 추적할 수 있고 침입으로 판단될 경우 해당 프로세스를 조기에 종료시킬 수 있도록 구현하였다.

  • PDF

Analyses of Security Mechanism for Wireless Sensor Network (무선 센서 네트워망에서의 보안 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.744-747
    • /
    • 2008
  • Sensor networks will play an important role in the next generation pervasive computing. But its characteristic of wireless communication brings a peat challenge to the security measures used in the communication protocols. These measures are different from conventional security methods. In this paper, we proposed a security architecture for self-organizing mobile wireless sensor networks. It can prevent most of attacks based on intrusion detection.

  • PDF

Intruder Detection System Based on Pyroelectric Infrared Sensor (PIR 센서 기반 침입감지 시스템)

  • Jeong, Yeon-Woo;Vo, Huynh Ngoc Bao;Cho, Seongwon;Cuhng, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.5
    • /
    • pp.361-367
    • /
    • 2016
  • The intruder detection system using digital PIR sensor has the problem that it can't recognize human correctly. In this paper, we suggest a new intruder detection system based on analog PIR sensor to get around the drawbacks of the digital PIR sensor. The analog type PIR sensor emits the voltage output at various levels whereas the output of the digitial PIR sensor is binary. The signal captured using analog PIR sensor is sampled, and its frequency feature is extracted using FFT or MFCC. The extracted features are used for the input of neural networks. After neural network is trained using various human and pet's intrusion data, it is used for classifying human and pet in the intrusion situation.

Implementing a Dedicated WIPS Sensor Using Raspberry Pi (라즈베리파이를 이용한 전용 WIPS 센서 구현)

  • Yun, Kwang-Wook;Choi, Suck-Hwan;An, Sang-Un;Kim, Jeong-Goo;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.397-407
    • /
    • 2017
  • Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take advantage of the vulnerabilities created by a wireless AP (Access Point). Public organizations and companies have gradually selected the WIPS (Wireless Intrusion Prevention System) to block wireless security threats and protect the internal network. However, it is very costly for other organizations and companies to introduce the WIPS solution. This paper proposes implementing a WIPS Sensor by using Raspberry Pi to reduce these costs and to block the various wireless LAN security threats. This implementation would protect corporate information and provide consistent services at a relatively reasonable price.

Development of Long-perimeter Intrusion Detection System Aided by deep Learning-based Distributed Fiber-optic Acoustic·vibration Sensing Technology (딥러닝 기반 광섬유 분포 음향·진동 계측기술을 활용한 장거리 외곽 침입감지 시스템 개발)

  • Kim, Huioon;Lee, Joo-young;Jung, Hyoyoung;Kim, Young Ho;Kwon, Jun Hyuk;Ki, Song Do;Kim, Myoung Jin
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.1
    • /
    • pp.24-30
    • /
    • 2022
  • Distributed fiber-optic acoustic·vibration sensing technology is becoming increasingly popular in many industrial and academic areas such as in securing large edifices, exploring underground seismic activity, monitoring oil well/reservoir, etc. Long-range perimeter intrusion detection exemplifies an application that not only detects intrusion, but also pinpoints where it happens and recognizes kinds of threats made along the perimeter where a single fiber cable was installed. In this study, we developed a distributed fiber-optic sensing device that measures a distributed acoustic·vibration signature (pattern) for intrusion detection. In addition, we demontrate the proposed deep learning algorithm and how it classifies various intrusion events. We evaluated the sensing device and deep learning algorithm in a practical testbed setup. The evaluation results confirm that the developed system is a promising intrusion detection system for long-distance and seamless recognition requirements.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Radar-based Security System: Implementation for Cluttered Environment

  • Lee, Tae-Yun;Skvortsov, Vladimir;Ka, Min-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2015
  • We present an experimental implementation of the inexpensive microwave security sensor that can detect both static and slowly moving objects in cluttered environment. The prototype consists of a frequency-modulated continuous wave radar sensor, control board or computer and software. The prototype was tested in a cluttered indoor environment. In case of intrusion or change of environment the sensor will give an alarm, determine the location of new object, change in its location and can detect a slowly moving target. To make a low-cost unit we use commercially available automotive radar and own signal processing techniques for object detection and tracking. The intruder detection is based on a comparison between current 'image' in memory and 'no-intrusion' reference image. The main challenge is to develop a reliable technique for detection of a relatively low-magnitude object signals hidden in multipath clutter echo signals. Various experimental measurements and computations have shown the feasibility and performance of the system.

Development of intrusion detection technique using fiber optic ROTDR sensor (광섬유 ROTDR 센서를 이용한 침입 탐지기법의 개발)

  • Baik, Se-Jong;Kwon, Il-Bum;Chung, Chul;Yu, Jae-Wang
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.209-217
    • /
    • 2002
  • The developing of buried fiber optic sensor with high sensitivity and broad-area detecting intruders is carried out using fiber optic ROTDR(Rayleigh Optical Time Domain Reflectometry). The sensing part was designed to be able to broad-area detect intrusion effect per optical fiber length under ground. The bending light losses in optical fibers are investigated by commercial mini ROTDR with wavelength $1.55{\mu}m$, distance range 5km, pulse width 20ns, SNR=5.7. The sensing fibers are selected as the common telecommunication fibers are the 1.5mm, 3.5 mm outer diameter, 4km each length fiber products. Experiments were investigate the characteristics of signal sensitivity according to applied intrusion weight. The relation between the applied weight and the bending loss was almost linear, and broad-area detect intrusion effects are the 2m resolution and $1.3m^2$ per optical fiber length respectively. The light loss by the applied weight on fiber was 0.17 dB/kg. that the sensitivity of the optical fiber sensor was sufficient to detect intruders passing over the buried optical fiber.

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

  • Guo, Weipeng;Chen, Yonghong;Cai, Yiqiao;Wang, Tian;Tian, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5574-5591
    • /
    • 2017
  • Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimum black hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.