• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.026 seconds

The Malware Detection Using Deep Learning based R-CNN (딥러닝 기반의 R-CNN을 이용한 악성코드 탐지 기법)

  • Cho, Young-Bok
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1177-1183
    • /
    • 2018
  • Recent developments in machine learning have attracted a lot of attention for techniques such as machine learning and deep learning that implement artificial intelligence. In this paper, binary malicious code using deep learning based R-CNN is imaged and the feature is extracted from the image to classify the family. In this paper, two steps are used in deep learning to image malicious code using CNN. And classify the characteristics of the family of malicious codes using R-CNN. Generate malicious code as an image, extract features, classify the family, and automatically classify the evolution of malicious code. The detection rate of the proposed method is 93.4% and the accuracy is 98.6%. In addition, the CNN processing speed for image processing of malicious code is 23.3 ms, and the R-CNN processing speed is 4ms to classify one sample.

Automatic Machine Fault Diagnosis System using Discrete Wavelet Transform and Machine Learning

  • Lee, Kyeong-Min;Vununu, Caleb;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1299-1311
    • /
    • 2017
  • Sounds based machine fault diagnosis recovers all the studies that aim to detect automatically faults or damages on machines using the sounds emitted by these machines. Conventional methods that use mathematical models have been found inaccurate because of the complexity of the industry machinery systems and the obvious existence of nonlinear factors such as noises. Therefore, any fault diagnosis issue can be treated as a pattern recognition problem. We present here an automatic fault diagnosis system of hand drills using discrete wavelet transform (DWT) and pattern recognition techniques such as principal component analysis (PCA) and artificial neural networks (ANN). The diagnosis system consists of three steps. Because of the presence of many noisy patterns in our signals, we first conduct a filtering analysis based on DWT. Second, the wavelet coefficients of the filtered signals are extracted as our features for the pattern recognition part. Third, PCA is performed over the wavelet coefficients in order to reduce the dimensionality of the feature vectors. Finally, the very first principal components are used as the inputs of an ANN based classifier to detect the wear on the drills. The results show that the proposed DWT-PCA-ANN method can be used for the sounds based automated diagnosis system.

A Node Scheduling Control Scheme with Time Delay Requirement in Wireless Sensor Actuator Networks (무선 센서 엑츄에이터 네트워크에서의 시간지연을 고려한 노드 스케줄링 제어 기법)

  • Byun, Heejung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.17-23
    • /
    • 2016
  • Wireless sensor-actuator networks (WSANs) enhance the existing wireless sensor networks (WSNs) by equipping sensor nodes with an actuator. The actuators work with the sensor nodes and perform application-specific operations. The WSAN systems have several applications such as disaster relief, intelligent building, military surveillance, health monitoring, and infrastructure security. These applications require capability of reliable data transfer to act responsively and accurately. Biologically inspired modeling techniques have received considerable attention for achieving robustness, scalability, and adaptability, while retaining individual simplicity. In this paper, an epidemic-inspired algorithm for data dissemination with delay constraints while minimizing energy consumption in WSAN is proposed. The steady states and system stability are analyzed using control theory. Also, simulation results indicate that the proposed scheme provides desirable dissemination delay and energy saving.

Development of Hazardous Work Mapping Methodology Based on Layout of Workplace Handling The Accident Preparedness Substances (사고대비물질 취급 사업장 Layout기반 위험작업 Mapping 방법론 개발)

  • Kim, Jin Hyung;Yang, Jae Mo;Yong, Jong-Won;Ko, Byung Seok;Yoo, Byungtae;Ko, Jae Wook
    • Korean Chemical Engineering Research
    • /
    • v.52 no.6
    • /
    • pp.736-742
    • /
    • 2014
  • If an accident occurs at work places that handle 'the accident preparedness substances', it causes more property damage and casualties than accidents of normal chemical substances. Even though various systems and regulations have been operated in order to prevent accidents, techniques for reducing and removing human error, which is one of the main reasons of accidents, are still inadequate. In this paper, hazardous work digitization, potential hazard verification, and work evaluation based on domestic technical guidelines have been performed through a case study of the accident of hydrofluoric acid leakage in Gumi in September 2012, and development of a new risk mapping method has been studied to supplement existing systems.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

Research about muscle ache curer design development for hospital (병원용 근육통증 치료기 디자인 개발에 관한 연구)

  • Oh, Sung-Jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.856-859
    • /
    • 2006
  • Patient's position who muscle ache curer for hospital undergoes person entrance and treatment that take advantage of biological, physical force of low frequency and it is equipment that treat body muscle ache, but use equipment when use patient into compensation in hospital specially, that consider everybody is important first of all. This research question investigation with market survey of old product enforce because preference degree reflected officer a result and apply opinion tuned with product development connection engineers on DESIGN direction via typical product design development process close. This curer development research analyzed data involved directly taking advantage of FGI techniques with literature investigation collection. Investigation examined laying stress on muscle ache curer for hospital and a nurse than a doctor answered on question and purchase selection criterion or price portion to user focus. Direct market survey research that see item indicated by competition four provision shortcomings consequently in NEW MODEL development hereafter supplement and expectation. by contributing greatly in M/S security strategy hereafter because design development consisted for side that improve.

  • PDF

A Study of Fusion Image System and Simulation based on Mutual Information (상호정보량에 의한 이미지 융합시스템 및 시뮬레이션에 관한 연구)

  • Kim, Yonggil;Kim, Chul;Moon, Kyungil
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.1
    • /
    • pp.139-148
    • /
    • 2015
  • The purpose of image fusion is to combine the relevant information from a set of images into a single image, where the resultant fused image will be more informative and complete than any of the input images. Image fusion techniques can improve the quality and increase the application of these data important applications of the fusion of images include medical imaging, remote sensing, and robotics. In this paper, we suggest a new method to generate a fusion image using the close relation of image features obtained through maximum entropy threshold and mutual information. This method represents a good image registration in case of using a blurring image than other image fusion methods.

Carrier Sensing Techniques for Long Range Internet of Things (장거리 사물인터넷을 위한 케리어 센싱 기술)

  • Lee, Il-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.33-39
    • /
    • 2018
  • In the Internet of Things (IoT) era, objects are connected to each other by wired and wireless networks, and information is exchanged whenever necessary. Channel and network environments change over time; thus, a carrier sensing function that identifies whether signals containing information are present in the channel is essential. The carrier sensing circuit of a wireless communication system determines the receiver sensitivity, and the receiver sensitivity is closely related to the service coverage and service quality of the system. As the receiver sensitivity decreases, the service coverage increases but it becomes sensitive to noise. However, as the receiver sensitivity increases, the service coverage decreases but it becomes insensitive to the noise. Therefore, carrier sensing design and optimization are very important from the viewpoint of the receiver sensitivity and noise sensitivity. This paper proposes an effective carrier sensing technique from the viewpoint of the receiver sensitivity for the long range IoT.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

Development of a Rapeseed Seeder Attached to Tractors (트랙터 부착용 유채파종기 개발)

  • Lee, C.K.;Choi, Y.;Jun, H.J.;Choi, D.K.;Kim, Y.J.;Lee, S.K.;Moon, S.D.;Han, B.H.
    • Journal of Biosystems Engineering
    • /
    • v.34 no.3
    • /
    • pp.147-154
    • /
    • 2009
  • Suitable rapeseed cultivation techniques of domestic agriculture are essential for stable security, supply and demand of rapeseed. This research developed a rapeseed seeder for bio-diesel and analyzed the seeding performance improving an existent granule fertilizer applicator. The relational expression of metering groove size and discharge rate per time displayed high correlation with a coefficient of determination of 0.988. Also, the scattering types were analyzed by forwarding speed and discharge rate. Validity application width was decided as 7.0 m by analyzing application uniformity at application widths of 7.6 m, 6.6 m, 5.6 m. All average coefficients of variation values were less than 20%. The best application uniformity was obtained in the condition of a work speed of 1.3 m/s and a sowing rate of 19.0 g/s. It was better average coefficient of variation values under 10% at superposition application of rapeseed seeder. Also, scattering amount rates of right and left were within 0.89${\sim}$1.0.