• Title/Summary/Keyword: anomaly-based detection

Search Result 447, Processing Time 0.027 seconds

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Interpretation of Airborne Magnetic and Radioactive Data for the Uranium Deposit in Geumsan Area (금산 함우라늄광상 분포지역의 항공자력/방사능 탐사자료 해석)

  • Shin, Eun-Ju;Ko, Kwangbeom;An, Dongkuk;Han, Kyeongsoo
    • Geophysics and Geophysical Exploration
    • /
    • v.16 no.1
    • /
    • pp.36-44
    • /
    • 2013
  • We conducted the airborne magnetic and radiometric survey for the characterization of the black shale related and pyrometamorphic uranium deposits distributed in Geumsan area. For the successful characterization of the uranium deposits, the general geological and structural geological features were investigated based on the lithological and linear feature analysis to individual magnetic and radiometric data as the first step. Lithological analysis from the magnetic reduction to the pole and downward continuation map revealed that prominent positive anomalies caused by black and dark gray slate member were clearly recognized as magnetic sources. These results indicate that magnetic survey, even though it is not a direct method for the detection of uranium, can be a useful tool in uranium detection. By the linear feature analysis based on 2nd vertical derivative and curvature map, two linearments corresponded the gray hornfels and black slate member were extracted and in succession, the additional uranium potential zone was inferred. Final discrimination whether uranium-rich or not was confirmed by radiometric and uranium anomaly map. From these analysis, we finally concluded that uranium deposit originated by pyrometamorphic process was confined near the intrusive area only. On the contrary, it was found that black shale related uranium deposit is distributed and extended through out the entire survey area with south-west to north-east direction. In addition, from the linear feature analysis based on radiometric total anomaly map, the typical discontinuous characteristics were recognized in areas where uranium-contained linearments cross the faults. From the above discussion, we concluded that airborne magnetic and radiometric survey are complementary to each other. So it is preferable to carry out simultaneously for the efficient data processing and fruitful interpretation.

A Dynamic Correction Technique of Time-Series Data using Anomaly Detection Model based on LSTM-GAN (LSTM-GAN 기반 이상탐지 모델을 활용한 시계열 데이터의 동적 보정기법)

  • Hanseok Jeong;Han-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.103-111
    • /
    • 2023
  • This paper proposes a new data correction technique that transforms anomalies in time series data into normal values. With the recent development of IT technology, a vast amount of time-series data is being collected through sensors. However, due to sensor failures and abnormal environments, most of time-series data contain a lot of anomalies. If we build a predictive model using original data containing anomalies as it is, we cannot expect highly reliable predictive performance. Therefore, we utilizes the LSTM-GAN model to detect anomalies in the original time series data, and combines DTW (Dynamic Time Warping) and GAN techniques to replace the anomaly data with normal data in partitioned window units. The basic idea is to construct a GAN model serially by applying the statistical information of the window with normal distribution data adjacent to the window containing the detected anomalies to the DTW so as to generate normal time-series data. Through experiments using open NAB data, we empirically prove that our proposed method outperforms the conventional two correction methods.

An Abnormal Worker Movement Detection System Based on Data Stream Processing and Hierarchical Clustering

  • Duong, Dat Van Anh;Lan, Doi Thi;Yoon, Seokhoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.88-95
    • /
    • 2022
  • Detecting anomalies in human movement is an important task in industrial applications, such as monitoring industrial disasters or accidents and recognizing unauthorized factory intruders. In this paper, we propose an abnormal worker movement detection system based on data stream processing and hierarchical clustering. In the proposed system, Apache Spark is used for streaming the location data of people. A hierarchical clustering-based anomalous trajectory detection algorithm is designed for detecting anomalies in human movement. The algorithm is integrated into Apache Spark for detecting anomalies from location data. Specifically, the location information is streamed to Apache Spark using the message queuing telemetry transport protocol. Then, Apache Spark processes and stores location data in a data frame. When there is a request from a client, the processed data in the data frame is taken and put into the proposed algorithm for detecting anomalies. A real mobility trace of people is used to evaluate the proposed system. The obtained results show that the system has high performance and can be used for a wide range of industrial applications.

Defect Detection in Laser Welding Using Multidimensional Discretization and Event-Codification (Multidimensional Discretization과 Event-Codification 기법을 이용한 레이저 용접 불량 검출)

  • Baek, Su Jeong;Oh, Rocku;Kim, Duck Young
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • In the literature, various stochastic anomaly detection methods, such as limit checking and PCA-based approaches, have been applied to weld defect detection. However, it is still a challenge to identify meaningful defect patterns from very limited sensor signals of laser welding, characterized by intermittent, discontinuous, very short, and non-stationary random signals. In order to effectively analyze the physical characteristics of laser weld signals: plasma intensity, weld pool temperature, and back reflection, we first transform the raw data of laser weld signals into the form of event logs. This is done by multidimensional discretization and event-codification, after which the event logs are decoded to extract weld defect patterns by $Na{\ddot{i}}ve$ Bayes classifier. The performance of the proposed method is examined in comparison with the commercial solution of PRECITEC's LWM$^{TM}$ and the most recent PCA-based detection method. The results show higher performance of the proposed method in terms of sensitivity (1.00) and specificity (0.98).

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

A Study on Effective Interpretation of AI Model based on Reference (Reference 기반 AI 모델의 효과적인 해석에 관한 연구)

  • Hyun-woo Lee;Tae-hyun Han;Yeong-ji Park;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.411-425
    • /
    • 2023
  • Today, AI (Artificial Intelligence) technology is widely used in various fields, performing classification and regression tasks according to the purpose of use, and research is also actively progressing. Especially in the field of security, unexpected threats need to be detected, and unsupervised learning-based anomaly detection techniques that can detect threats without adding known threat information to the model training process are promising methods. However, most of the preceding studies that provide interpretability for AI judgments are designed for supervised learning, so it is difficult to apply them to unsupervised learning models with fundamentally different learning methods. In addition, previously researched vision-centered AI mechanism interpretation studies are not suitable for application to the security field that is not expressed in images. Therefore, In this paper, we use a technique that provides interpretability for detected anomalies by searching for and comparing optimization references, which are the source of intrusion attacks. In this paper, based on reference, we propose additional logic to search for data closest to real data. Based on real data, it aims to provide a more intuitive interpretation of anomalies and to promote effective use of an anomaly detection model in the security field.

Fault Detection in Diecasting Process Based on Deep-Learning (다단계 딥러닝 기반 다이캐스팅 공정 불량 검출)

  • Jeongsu Lee;Youngsim, Choi
    • Journal of Korea Foundry Society
    • /
    • v.42 no.6
    • /
    • pp.369-376
    • /
    • 2022
  • The die-casting process is an important process for various industries, but there are limitations in the profitability and productivity of related companies due to the high defect rate. In order to overcome this, this study has developed die-casting fault detection modules based on industrial AI technologies. The developed module is constructed from three-stage models depending on the characteristics of the dataset. The first-stage model conducts fault detection based on supervised learning from the dataset without labels. The second-stage model realizes one-class classification based on semi-supervised learning, where the dataset only has production success labels. The third-stage model corresponds to fault detection based on supervised learning, where the dataset includes a small amount of production failure cases. The developed fault detection module exhibited outstanding performance with roughly 96% accuracy for actual process data.

Structural novelty detection based on sparse autoencoders and control charts

  • Finotti, Rafaelle P.;Gentile, Carmelo;Barbosa, Flavio;Cury, Alexandre
    • Structural Engineering and Mechanics
    • /
    • v.81 no.5
    • /
    • pp.647-664
    • /
    • 2022
  • The powerful data mapping capability of computational deep learning methods has been recently explored in academic works to develop strategies for structural health monitoring through appropriate characterization of dynamic responses. In many cases, these studies concern laboratory prototypes and finite element models to validate the proposed methodologies. Therefore, the present work aims to investigate the capability of a deep learning algorithm called Sparse Autoencoder (SAE) specifically focused on detecting structural alterations in real-case studies. The idea is to characterize the dynamic responses via SAE models and, subsequently, to detect the onset of abnormal behavior through the Shewhart T control chart, calculated with SAE extracted features. The anomaly detection approach is exemplified using data from the Z24 bridge, a classical benchmark, and data from the continuous monitoring of the San Vittore bell-tower, Italy. In both cases, the influence of temperature is also evaluated. The proposed approach achieved good performance, detecting structural changes even under temperature variations.

Improvement of concrete crack detection using Dilated U-Net based image inpainting technique (Dilated U-Net에 기반한 이미지 복원 기법을 이용한 콘크리트 균열 탐지 개선 방안)

  • Kim, Su-Min;Sohn, Jung-Mo;Kim, Do-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.65-68
    • /
    • 2021
  • 본 연구에서는 Dilated U-Net 기반의 이미지 복원기법을 통해 콘크리트 균열 추출 성능 개선 방안을 제안한다. 콘크리트 균열은 구조물의 미관상의 문제뿐 아니라 추후 큰 안전사고의 원인이 될 수 있어 초기대응이 중요하다. 현재는 점검자가 직접 육안으로 검사하는 외관 검사법이 주로 사용되고 있지만, 이는 정확성 및 비용, 시간, 그리고 안전성 면에서 한계를 갖고 있다. 이에 콘크리트 구조물 표면에 대해 획득한 영상 처리 기법을 사용한 검사 방식 도입의 관심이 늘어나고 있다. 또한, 딥러닝 기술의 발달로 딥러닝을 적용한 영상처리의 연구 역시 활발하게 진행되고 있다. 본 연구는 콘크리트 균열 추개선출 성능 개선을 위해 Dilated U-Net 기반의 이미지 복원기법을 적용하는 방안을 제안하였고 성능 검증 결과, 기존 U-Net 기반의 정확도가 98.78%, 조화평균 82.67%였던 것에 비해 정확도 99.199%, 조화평균 88.722%로 성능이 되었음을 확인하였다.

  • PDF