• Title/Summary/Keyword: Normal learning

Search Result 792, Processing Time 0.027 seconds

An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS

  • Kangseok Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.494-510
    • /
    • 2024
  • Internet users are exposed to sophisticated cyberattacks that intrusion detection systems have difficulty detecting. Therefore, research is increasing on intrusion detection methods that use artificial intelligence technology for detecting novel cyberattacks. Unsupervised learning-based methods are being researched that learn only from normal data and detect abnormal behaviors by finding patterns. This study developed an anomaly-detection method based on unsupervised machines and deep learning for a network intrusion detection system (NIDS). We present a hybrid anomaly detection approach based on unsupervised learning techniques using the autoencoder (AE), Isolation Forest (IF), and Local Outlier Factor (LOF) algorithms. An oversampling approach that increased the detection rate was also examined. A hybrid approach that combined deep learning algorithms and traditional machine learning algorithms was highly effective in setting the thresholds for anomalies without subjective human judgment. It achieved precision and recall rates respectively of 88.2% and 92.8% when combining two AEs, IF, and LOF while using an oversampling approach to learn more unknown normal data improved the detection accuracy. This approach achieved precision and recall rates respectively of 88.2% and 94.6%, further improving the detection accuracy compared with the hybrid method. Therefore, in NIDS the proposed approach provides high reliability for detecting cyberattacks.

Development of Firewall System for Automated Policy Rule Generation based on Machine learning (머신러닝 기반의 자동 정책 생성 방화벽 시스템 개발)

  • Han, Kyung-Hyun;Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.29-37
    • /
    • 2020
  • Conventional firewalls cannot cope with attacks immediately. It is because security professionals or administrators need to analyze them and enter relevant policies to the firewalls. In addition, those policies may often block even normal accesses. Even though the packet themselves are normal, there exist many attacks that cause denial of service due to the inflow of a large amount of those packets. In this paper, we propose a method to block attacks such as Flooding, Spoofing and Scanning while allowing normal accesses based on whitelist policies which are automatedly generated by learning normal access patterns.

Investigation of neural network-based cathode potential monitoring to support nuclear safeguards of electrorefining in pyroprocessing

  • Jung, Young-Eun;Ahn, Seong-Kyu;Yim, Man-Sung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.644-652
    • /
    • 2022
  • During the pyroprocessing operation, various signals can be collected by process monitoring (PM). These signals are utilized to diagnose process states. In this study, feasibility of using PM for nuclear safeguards of electrorefining operation was examined based on the use of machine learning for detecting off-normal operations. The off-normal operation, in this study, is defined as co-deposition of key elements through reduction on cathode. The monitored process signal selected for PM was cathode potential. The necessary data were produced through electrodeposition experiments in a laboratory molten salt system. Model-based cathodic surface area data were also generated and used to support model development. Computer models for classification were developed using a series of recurrent neural network architectures. The concept of transfer learning was also employed by combining pre-training and fine-tuning to minimize data requirement for training. The resulting models were found to classify the normal and the off-normal operation states with a 95% accuracy. With the availability of more process data, the approach is expected to have higher reliability.

Synthetic Data Generation and Performance Analysis for Anomaly Detection (이상 탐지를 위한 합성 데이터 생성 및 성능 분석)

  • Hwang, Ju-hyo;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.19-21
    • /
    • 2022
  • Anomaly detection using self-supervised learning typically generates synthetic data to learn to classify normal and abnormal, and uses real abnormal data as test data to measure anomaly detection performance. In a study using this method to generate synthetic data similar to normal data, anomaly detection was carried out by generating synthetic data by cutting and pasting a specific patch from the original image. In this way, the degree of similarity to normal data depends on the number and size of patches, which affects anomaly detection performance. In this paper, synthetic data were generated by varying patch sizes and numbers, and then similarity and analysis with normal data were conducted using a pre-trained model, and anomaly detection performance was measured by learning the model.

  • PDF

Adversarial Complementary Learning for Just Noticeable Difference Estimation

  • Dong Yu;Jian Jin;Lili Meng;Zhipeng Chen;Huaxiang Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.438-455
    • /
    • 2024
  • Recently, many unsupervised learning-based models have emerged for Just Noticeable Difference (JND) estimation, demonstrating remarkable improvements in accuracy. However, these models suffer from a significant drawback is that their heavy reliance on handcrafted priors for guidance. This restricts the information for estimating JND simply extracted from regions that are highly related to handcrafted priors, while information from the rest of the regions is disregarded, thus limiting the accuracy of JND estimation. To address such issue, on the one hand, we extract the information for estimating JND in an Adversarial Complementary Learning (ACoL) way and propose an ACoL-JND network to estimate the JND by comprehensively considering the handcrafted priors-related regions and non-related regions. On the other hand, to make the handcrafted priors richer, we take two additional priors that are highly related to JND modeling into account, i.e., Patterned Masking (PM) and Contrast Masking (CM). Experimental results demonstrate that our proposed model outperforms the existing JND models and achieves state-of-the-art performance in both subjective viewing tests and objective metrics assessments.

Effective Analsis of GAN based Fake Date for the Deep Learning Model (딥러닝 훈련을 위한 GAN 기반 거짓 영상 분석효과에 대한 연구)

  • Seungmin, Jang;Seungwoo, Son;Bongsuck, Kim
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.8 no.2
    • /
    • pp.137-141
    • /
    • 2022
  • To inspect the power facility faults using artificial intelligence, it need that improve the accuracy of the diagnostic model are required. Data augmentation skill using generative adversarial network (GAN) is one of the best ways to improve deep learning performance. GAN model can create realistic-looking fake images using two competitive learning networks such as discriminator and generator. In this study, we intend to verify the effectiveness of virtual data generation technology by including the fake image of power facility generated through GAN in the deep learning training set. The GAN-based fake image was created for damage of LP insulator, and ResNet based normal and defect classification model was developed to verify the effect. Through this, we analyzed the model accuracy according to the ratio of normal and defective training data.

Indirect Inspection Signal Diagnosis of Buried Pipe Coating Flaws Using Deep Learning Algorithm (딥러닝 알고리즘을 이용한 매설 배관 피복 결함의 간접 검사 신호 진단에 관한 연구)

  • Sang Jin Cho;Young-Jin Oh;Soo Young Shin
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.19 no.2
    • /
    • pp.93-101
    • /
    • 2023
  • In this study, a deep learning algorithm was used to diagnose electric potential signals obtained through CIPS and DCVG, used indirect inspection methods to confirm the soundness of buried pipes. The deep learning algorithm consisted of CNN(Convolutional Neural Network) model for diagnosing the electric potential signal and Grad CAM(Gradient-weighted Class Activation Mapping) for showing the flaw prediction point. The CNN model for diagnosing electric potential signals classifies input data as normal/abnormal according to the presence or absence of flaw in the buried pipe, and for abnormal data, Grad CAM generates a heat map that visualizes the flaw prediction part of the buried pipe. The CIPS/DCVG signal and piping layout obtained from the 3D finite element model were used as input data for learning the CNN. The trained CNN classified the normal/abnormal data with 93% accuracy, and the Grad-CAM predicted flaws point with an average error of 2m. As a result, it confirmed that the electric potential signal of buried pipe can be diagnosed using a CNN-based deep learning algorithm.

Design of the 3D Object Recognition System with Hierarchical Feature Learning (계층적 특징 학습을 이용한 3차원 물체 인식 시스템의 설계)

  • Kim, Joohee;Kim, Dongha;Kim, Incheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.1
    • /
    • pp.13-20
    • /
    • 2016
  • In this paper, we propose an object recognition system that can effectively find out its category, its instance name, and several attributes from the color and depth images of an object with hierarchical feature learning. In the preprocessing stage, our system transforms the depth images of the object into the surface normal vectors, which can represent the shape information of the object more precisely. In the feature learning stage, it extracts a set of patch features and image features from a pair of the color image and the surface normal vector through two-layered learning. And then the system trains a set of independent classification models with a set of labeled feature vectors and the SVM learning algorithm. Through experiments with UW RGB-D Object Dataset, we verify the performance of the proposed object recognition system.

A Study of the Effects of Learner Characteristics on the Self-Regulated Learning Ability: A Comparison of Korea and China

  • HONG, Zhao;IM, Yeonwook;LI, Chen
    • Educational Technology International
    • /
    • v.17 no.1
    • /
    • pp.59-85
    • /
    • 2016
  • The purpose of the study is to report differences in the effects of learner characteristics on the self-regulated learning (SRL) abilities between Chinese and Korean distance learners by using a structured SRL scale. A standardized 54-item self-regulated learning scale (SRAS) was used. The reliability was tested both in China and Korea which showed the scale had good reliability. The comparative study were conducted by administering the SRAS on 1999 Chinese distance learners from the Open Distance Education Center of Beijing Normal University and 1941 Korean distance learners from H Cyber University. Data on four dimensions of SRL - planning, control, regulating, and evaluation - were analyzed using 't-test' and 'ANOVA' with regards to the learner characteristics such as gender, age, prior education level, semesters, location and major. Results indicated that the average participant had an above medium level of SRL ability in all of the four dimensions. There were significant differences in the self-regulated learning ability between Chinese and Korean distance learners. Chinese distance learners scored higher in SRAS than Korean distance learners. The effects of learner characteristics on the SRL ability showed different patterns in the two countries. As for gender, male learners scored better in SRL than female learners in China, whereas it was just the opposite in Korea. No age differences were found in China, but Korean data exhibited a consistent age effect in all dimensions. In Korea, the age group older than 46 scored the highest, followed by the group between 35 to 45 years old, the group between 26 to 35 years old and the group younger than 25. As for location, Korean distance students from metropolitan were better than those from other regions, whereas it was on the contrary in China, albeit the location effect was not statistically significant. Prior education level had a clear and consistent effect on the SRL ability in both countries: the distance learners from junior colleges had better planning, regulating and evaluating abilities than those who came from senior high schools. These results have been discussed in various contexts of distance/online education as well as in relation to different culture between China and Korea. The results will also have implications for designing distance and online learning generally.

User Experience(UX) Qualitative Evaluation of Dialogue e-learning contents (대화형 이러닝 콘텐츠에 관한 사용자 경험(UX) 질적 평가)

  • Lee, Youngju
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.6
    • /
    • pp.623-631
    • /
    • 2020
  • In the era of COVID-19 global pandemic, e-learning has become new standards and daily life in the name of 'new normal'. This study developed dialogue e-learning contents as opposed to monologue e-learning which is unidirectional and instructor centered and conducted qualitative user experience evaluation of dialogue e-learning contents. A total number of 20 adult students participated and were individually interviewed. Qualitative data analysis was performed. The findings include students' positive perceptions of dialogue e-learning contents such as empathy for various ideas and new format. With regard to personal preference, 55% of participants preferred dialogue e-learning contents because it enables them to focus and share real experiences. Meanwhile, in terms of learning effects, 60% participants selected monologue e-learning contents and mentioned adequate explanations of concepts and explicit information delivery. Based on the results, suggestions on the design and development of dialogue e-learning contents were presented.