• Title/Summary/Keyword: Rule-based module management

Search Result 20, Processing Time 0.026 seconds

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining (연관법칙 마이닝(Association Rule Mining)을 이용한 ANIDS (Advanced Network Based IDS) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2287-2297
    • /
    • 2007
  • The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Development of Rotating Machine Vibration Condition Monitoring System based upon Windows NT (Windows NT 기반의 회전 기계 진동 모니터링 시스템 개발)

  • 김창구;홍성호;기석호;기창두
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.7
    • /
    • pp.98-105
    • /
    • 2000
  • In this study, we developed rotating machine vibration condition monitoring system based upon Windows NT and DSP Board. Developed system includes signal analysis module, trend monitoring and simple diagnosis using threshold value. Trend analysis and report generation are offered with database management tool which was developed in MS-ACCESS environment. Post-processor, based upon Matlab, is developed for vibration signal analysis and fault detection using statistical pattern recognition scheme based upon Bayes discrimination rule and neural networks. Concerning to Bayes discrimination rule, the developed system contains the linear discrimination rule with common covariance matrices and the quadratic discrimination rule under different covariance matrices. Also the system contains k-nearest neighbor method to directly estimate a posterior probability of each class. The result of case studies with the data acquired from Pyung-tak LNG pump and experimental setup show that the system developed in this research is very effective and useful.

  • PDF

A study on the development on project scope management module using rule and case-based reasoning (규칙과 사례기반추론 기법을 이용한 프로젝트 범위관리 모듈 개발에 관한 연구)

  • Shin, Ho-Kun;Jeon, Sung-Ho;Kim, Chang-Ho
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.127-137
    • /
    • 2004
  • A Project planning is one of the most important processes that determines success and failure of a project. Scope management for a project planning is also essential job in system integration project. However project planning is very difficult because lots of factors and their relationships should be considered. Therefore project planning of system integration project has been done by project manager's own knowledge and experience. It is necessary to develop an algorithm of WBS(Work Breakdown Structure) identification & document selection along to project's specificity in project management system using AI technique. This study presents a methodology to cope with the limitations of the existing studies that have uniformly been customizing the methodology by only project complexity. We propose PPSM(Project planning support module) based on determination rules regarding route maps and document levels, and CBR(Case-Based Reasoning) for WBS identification.

  • PDF

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

Integrating a Machine Learning-based Space Classification Model with an Automated Interior Finishing System in BIM Models

  • Ha, Daemok;Yu, Youngsu;Choi, Jiwon;Kim, Sihyun;Koo, Bonsang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.4
    • /
    • pp.60-73
    • /
    • 2023
  • The need for adopting automation technologies to improve inefficiencies in interior finishing modeling work is increasing during the Building Information Modeling (BIM) design stage. As a result, the use of visual programming languages (VPL) for practical applications is growing. However, undefined or incorrect space designations in BIM models can hinder the development of automated finishing modeling processes, resulting in erroneous corrections and rework. To address this challenge, this study first developed a rule-based automated interior finishing detailing module for floors, walls, and ceilings. In addition, an automated space integrity checking module with 86.69% ACC using the Multi-Layer Perceptron (MLP) model was developed. These modules were integrated into a design automation module for interior finishing, which was then verified for practical utility. The results showed that the automation module reduced the time required for modeling and integrity checking by 97.6% compared to manual work, confirming its utility in assisting BIM model development for interior finishing works.

Development of the Fundamental Technology for Ubiquitous Road Disaster Management System (유비쿼터스 도로재해관리시스템을 위한 기반기술 개발)

  • Choi, Young-Taek;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.3 s.37
    • /
    • pp.39-46
    • /
    • 2006
  • This study is aimed at the development of ubiquitous based road disaster management system. The fundamental technologies used for developing this system are classified into three modules - wireless internet communication module, mobile module and server module. These fundamental technologies can be used not only for developing road disaster management system but also for developing various mobile or ubiquitous systems. With this system, workers can download many DB (Digital map, Attribute information etc.) from server to the field in realtime. The accuracy and objectivity of the DB could be improved with these informations collected at fields because these data can be used as basic data for road disaster information collection. Because in the web based server module - Web based Road Disaster Management System (URDMS) - field disaster information was showed link up with exist DB on road by absolute coordinate, the decision making with all of the field information was made and it sent to a field staff in realtime. The problems of current road disaster management rule ran be solved by this URDMS.

  • PDF

Warehouse System of Parts in Variable Location by Rule-Based Module Management for Context Awareness (규칙기반 상황인식 모듈관리에 의한 가변위치 부품창고 시스템)

  • Min, Deul-Le;Jun, Byung-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.111-120
    • /
    • 2009
  • In this paper, we propose ubiWarehouse system which can efficiently manages mass and many kinds of parts such as automotive parts. First, user's work situation is defined systematically as context type of 5W1H, context-aware system is separated on function, and each module operates independently. An efficient route is selected and relevant parts frequently treated at the same time are gathered by calculating the suitability of parts and racks. If other users currently are on a visit or are supposed to visit soon, the hun of visit is changed making a concession for preventing collision. As a result, the proposed system with avoiding competition can provide users with routes for inbound or outbound parts, and can effectively use spaces of a warehouse by arranging racks to gather relevant parts to near location. Also, individual service can be offered by evaluating user propensity using history of the warehouse job, and the accuracy of stock information can be improved by processing of unexpected context and real-time renewing of warehousing and delivering.

Design and Implementation of Nools-based Rule Engine for Smart IoE Platform (지능형 IoE 플랫폼을 위한 Nools 기반 룰 엔진의 설계 및 구현)

  • Lee, Sung-Hun;Hwang, Chae-Eun;Jeong, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.379-387
    • /
    • 2018
  • In order to make the IoT ecosystem more usable and friendly to general users, the interaction between the users and platforms/devices and its UX must be improved. In this study, a web-based rule engine system to help users intuitively interact with the various devices and services in IoE (Internet of Everything) platform is proposed. The proposed system consists of web interfaces and UI components for creating and managing rule-based scenarios using sensors, actuators, and external services in an intuitive way. Also, a rule management module for automatically translating the rules from the web interface into Nools rule engine compatible ones is proposed. Finally, we show the usability and feasibility of the proposed system by demonstration of rule-based use cases of IoT devices and external services.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.