• Title/Summary/Keyword: Issue Detection

Search Result 583, Processing Time 0.033 seconds

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Inverse Perturbation Method and Sensor Location for Structural Damage Detection (구조물의 손상탐지를 위한 역섭동법과 센서위치의 선정)

  • Park, Yun Cheol;Choe, Yeong Jae;Jo, Jin Yeon;Kim, Gi Uk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.3
    • /
    • pp.31-38
    • /
    • 2003
  • In the present work, a nonlinear inverse perturbation method which has been used in the structural optimization, is adopted so as to identify the structural damages. Unlike the structural optimization, a larger number of constrained equations than the number of unknown parameters are often required detect structural damage. Therefore, nonlinear least squares method is utilized to solve the problem. Because only a limited number of sensors are available I real situation of damage detection, the determination of sensor location becomes one of the most important issues. Hence, this work concentrates on the issue of sensor placement in the framework of nonlinear inverse perturbation method, and the performances of various methodologies concerning to sensor placement are compared with each other. The comparisons show tat the successive elimination method gets good performance for sensor placement. From the several numerical studies, it is confirmed that the inverse perturbation method, combined with the successive elimination method, is very promising in structural damage detection.

Automatic Ultrasonic Inspection on Heater Sleeves and J-Groove Welds of Pressurizer (가압기 전열기 슬리브 및 J-Groove 용접부의 자동 초음파검사)

  • Ryu, Sung Woo;Chang, Hee Jun;Kim, Sun Je;Lee, Sang Duck;Sung, Jong Hwan
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.6 no.2
    • /
    • pp.20-27
    • /
    • 2010
  • In order to prevent the corrosion of component contacted primary water designed alloy 600 material in the nuclear power plant. But the primary water stress corrosion cracking(PWSCC) of alloy 600 and weld area occurs continuously due to the residual stress. The leakage accident resulted from PWSCC in the drain nozzle of the steam generator of domestic power plants. Heater sleeves of the pressurizer are welded with alloy 600 weld material and therefore exposed to the primary water environment. PWSCC occurred in heater sleeve material and weld area of many foreign power plants. The current issue of domestic nuclear power plants are consequently concentrated to PWSCC of similar material. In order to improve the detection and the sizing of the PWSCC in the welding sleeve of the pressurizer, the automatic UT system and multi-directions probe sets have been developed. The experimental studies have been performed using the mock-up block containing artificial reflectors(ID connected EDM notch) and semi-artificial cracks made from thermal fatigue. The automatic UT System is applied in the detection and the length sizing of the ID/OD on the tube and the J-groove weld area of the artificial reflectors and results of the detection and the sizing are compared respectively. Also, the developed automatic UT system is successfully accomplished to inspect the heater sleeve and the J-groove weld area on the pressurizer for the detection of PWSCC.

  • PDF

A Study on Optimization of Intelligent Video Surveillance System based on Embedded Module (임베디드 모듈 기반 지능형 영상감시 시스템의 최적화에 관한 연구)

  • Kim, Jin Su;Kim, Min-Gu;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.40-46
    • /
    • 2018
  • The conventional CCTV surveillance system for preventing accidents and incidents misses 95% of the data after 22 minutes where one person monitors multiple CCTV. To address this issue, researchers have studied the computer-based intelligent video surveillance system for notifying people of the abnormal situation. However, because the system is involved in the problems of power consumption and costs, the intelligent video surveillance system based on embedded modules has been studied. This paper implements the intelligent video surveillance system based on embedded modules for detecting intruders, detecting fires and detecting loitering, falling. Moreover, the algorithm and the embedded module optimization method are applied to implement real-time processing. The intelligent video surveillance system based on embedded modules is implemented in Raspberry Pi. The algorithm processing time is 0.95 seconds on Raspberry Pi before optimization, and 0.47 seconds on Raspberry Pi after optimization, reduced processing time by 50.52%. Therefore, this suggests real processing possibility of the intelligent video surveillance system based on the embedded modules is possible.

Improved Environment Recognition Algorithms for Autonomous Vehicle Control (자율주행 제어를 위한 향상된 주변환경 인식 알고리즘)

  • Bae, Inhwan;Kim, Yeounghoo;Kim, Taekyung;Oh, Minho;Ju, Hyunsu;Kim, Seulki;Shin, Gwanjun;Yoon, Sunjae;Lee, Chaejin;Lim, Yongseob;Choi, Gyeungho
    • Journal of Auto-vehicle Safety Association
    • /
    • v.11 no.2
    • /
    • pp.35-43
    • /
    • 2019
  • This paper describes the improved environment recognition algorithms using some type of sensors like LiDAR and cameras. Additionally, integrated control algorithm for an autonomous vehicle is included. The integrated algorithm was based on C++ environment and supported the stability of the whole driving control algorithms. As to the improved vision algorithms, lane tracing and traffic sign recognition were mainly operated with three cameras. There are two algorithms developed for lane tracing, Improved Lane Tracing (ILT) and Histogram Extension (HIX). Two independent algorithms were combined into one algorithm - Enhanced Lane Tracing with Histogram Extension (ELIX). As for the enhanced traffic sign recognition algorithm, integrated Mutual Validation Procedure (MVP) by using three algorithms - Cascade, Reinforced DSIFT SVM and YOLO was developed. Comparing to the results for those, it is convincing that the precision of traffic sign recognition is substantially increased. With the LiDAR sensor, static and dynamic obstacle detection and obstacle avoidance algorithms were focused. Therefore, improved environment recognition algorithms, which are higher accuracy and faster processing speed than ones of the previous algorithms, were proposed. Moreover, by optimizing with integrated control algorithm, the memory issue of irregular system shutdown was prevented. Therefore, the maneuvering stability of the autonomous vehicle in severe environment were enhanced.

Detection of Crosswalk for the Walking Guide of the Blind People (시각장애인 보행 안내를 위한 횡단보도 검출 및 방향 판단)

  • Kim, Seon-il;Jeong, Yu-Jin;Lee, Dong-Hee;Jung, Kyeong-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.45-48
    • /
    • 2019
  • Detection of crosswalk is an important issue for the blind to walk without the help of others. There is a braille block on the sidewalk, which helps the blind to walk. On the other hand, crosswalk is more dangerous due to the moving vehicles. However, there is no appropriate means to induce the blind. In this paper, we propose a method to detect crosswalk in front of a blind and estimate its direction using an image sensor. We adopt multi-ROIs and make their binary versions. In order to determine whether it is a crosswalk, two features are extracted; one is the number of crossing in the binary image and the other is the ratio of white area. We can also estimate the direction of the crosswalk through the slope of the projection data. We evaluated the performance using experimental dataset and the proposed algorithm showed 80% accuracy of detection.

  • PDF

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.

Beam Scheduling and Task Design Method using TaP Algorithm at Multifunction Radar System (다기능 레이다 시스템에서 TaP(Time and Priority) 알고리즘을 이용한 빔 스케줄링 방안 및 Task 설계방법)

  • Cho, In-Cheol;Hyun, Jun-Seok;Yoo, Dong-Gil;Shon, Sung-Hwan;Cho, Won-Min;Song, Jun-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • In the past, radars have been classified into fire control radars, detection radars, tracking radars, and image acquisition radars according to the characteristics of the mission. However, multi-function radars perform various tasks within a single system, such as target detection, tracking, identification friend or foe, jammer detection and response. Therefore, efficient resource management is essential to operate multi-function radars with limited resources. In particular, the target threat for tracking the detected target and the method of selecting the tracking cycle based on this is an important issue. If focus on tracking a threat target, Radar can't efficiently manage the targets detected in other areas, and if you focus on detection, tracking performance may decrease. Therefore, effective scheduling is essential. In this paper, we propose the TaP (Time and Priority) algorithm, which is a multi-functional radar scheduling scheme, and a software design method to construct it.

YOLOv5-based Chimney Detection Using High Resolution Remote Sensing Images (고해상도 원격탐사 영상을 이용한 YOLOv5기반 굴뚝 탐지)

  • Yoon, Young-Woong;Jung, Hyung-Sup;Lee, Won-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1677-1689
    • /
    • 2022
  • Air pollution is social issue that has long-term and short-term harmful effect on the health of animals, plants, and environments. Chimneys are the primary source of air pollutants that pollute the atmosphere, so their location and type must be detected and monitored. Power plants and industrial complexes where chimneys emit air pollutants, are much less accessible and have a large site, making direct monitoring cost-inefficient and time-inefficient. As a result, research on detecting chimneys using remote sensing data has recently been conducted. In this study, YOLOv5-based chimney detection model was generated using BUAA-FFPP60 open dataset create for power plants in Hebei Province, Tianjin, and Beijing, China. To improve the detection model's performance, data split and data augmentation techniques were used, and a training strategy was developed for optimal model generation. The model's performance was confirmed using various indicators such as precision and recall, and the model's performance was finally evaluated by comparing it to existing studies using the same dataset.