• Title/Summary/Keyword: complex network

Search Result 2,246, Processing Time 0.028 seconds

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Deep Learning-based SISR (Single Image Super Resolution) Method using RDB (Residual Dense Block) and Wavelet Prediction Network (RDB 및 웨이블릿 예측 네트워크 기반 단일 영상을 위한 심층 학습기반 초해상도 기법)

  • NGUYEN, HUU DUNG;Kim, Eung-Tae
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.703-712
    • /
    • 2019
  • Single image Super-Resolution (SISR) aims to generate a visually pleasing high-resolution image from its degraded low-resolution measurement. In recent years, deep learning - based super - resolution methods have been actively researched and have shown more reliable and high performance. A typical method is WaveletSRNet, which restores high-resolution images through wavelet coefficient learning based on feature maps of images. However, there are two disadvantages in WaveletSRNet. One is a big processing time due to the complexity of the algorithm. The other is not to utilize feature maps efficiently when extracting input image's features. To improve this problems, we propose an efficient single image super resolution method, named RDB-WaveletSRNet. The proposed method uses the residual dense block to effectively extract low-resolution feature maps to improve single image super-resolution performance. We also adjust appropriated growth rates to solve complex computational problems. In addition, wavelet packet decomposition is used to obtain the wavelet coefficients according to the possibility of large scale ratio. In the experimental result on various images, we have proven that the proposed method has faster processing time and better image quality than the conventional methods. Experimental results have shown that the proposed method has better image quality by increasing 0.1813dB of PSNR and 1.17 times faster than the conventional method.

Management Automation Technique for Maintaining Performance of Machine Learning-Based Power Grid Condition Prediction Model (기계학습 기반 전력망 상태예측 모델 성능 유지관리 자동화 기법)

  • Lee, Haesung;Lee, Byunsung;Moon, Sangun;Kim, Junhyuk;Lee, Heysun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.413-418
    • /
    • 2020
  • It is necessary to manage the prediction accuracy of the machine learning model to prevent the decrease in the performance of the grid network condition prediction model due to overfitting of the initial training data and to continuously utilize the prediction model in the field by maintaining the prediction accuracy. In this paper, we propose an automation technique for maintaining the performance of the model, which increases the accuracy and reliability of the prediction model by considering the characteristics of the power grid state data that constantly changes due to various factors, and enables quality maintenance at a level applicable to the field. The proposed technique modeled a series of tasks for maintaining the performance of the power grid condition prediction model through the application of the workflow management technology in the form of a workflow, and then automated it to make the work more efficient. In addition, the reliability of the performance result is secured by evaluating the performance of the prediction model taking into account both the degree of change in the statistical characteristics of the data and the level of generalization of the prediction, which has not been attempted in the existing technology. Through this, the accuracy of the prediction model is maintained at a certain level, and further new development of predictive models with excellent performance is possible. As a result, the proposed technique not only solves the problem of performance degradation of the predictive model, but also improves the field utilization of the condition prediction model in a complex power grid system.

Analysis of Technology Association Rules Between CPC Codes of the 'Internet of Things(IoT)' Patent (CPC 코드 기반 사물인터넷(IoT) 특허의 기술 연관성 규칙 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.493-498
    • /
    • 2019
  • This study deals with the analysis of the technology association rules between CPC codes of the Internet of Things(IoT) patent, the core of the Fourth Industrial Revolution ICT-based technology. The association rules between CPC codes were extracted using R, an open source for data mining. To this end, we analyzed 369 of the 605 patents related to the Internet of Things filed with the Patent Office until July 2019, with a complex CPC code, up to the subclass-level. As a result of the technology association rules, CPC codes with high support were [H04W ${\rightarrow}$ H04L](18.2%), [H04L ${\rightarrow}$ H04W](18.2%), [G06Q ${\rightarrow}$ H04L](17.3%), [H04L ${\rightarrow}$ G06Q](17.3%), [H04W ${\rightarrow}$ G06Q](9.8%), [G06Q ${\rightarrow}$ H04W](9.8%), [G06F ${\rightarrow}$ H04L](7.9%), [H04L ${\rightarrow}$ G06F](7.9%), [G06F ${\rightarrow}$ G06Q](6.2%), [G06Q ${\rightarrow}$ G06F](6.2%). After analyzing the technology interconnection network, the core CPC codes related to technology association rules are G06Q and H04L. The results of this study can be used to predict future patent trends.

Restoration of The Transportation Network between North and South Korea for Mt. Geumgang Tourism (금강산(내금강) 관광을 위한 남북연결 교통망에 관한 연구)

  • HONG, Gil-Jong;BAE, Sun-Hak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.51-64
    • /
    • 2019
  • Mt. Geumgang has been a scenic spot representing the Korean peninsula since the Joseon Dynasty, and became a symbol of inter-Korean exchanges with the Gaesong Industrial Complex after the division of the South and North. Mt. Geumgang Tour Course is divided into the Inner-Geumgang (Naegeumgang) and the Outer-Geumgang (Oegeumgang). It was common for the Mt. Geumgang tour route during the Joseon Dynasty and the Japanese Imperialization period to enter the Inner-Geumgang, near Seoul, and come to the East Sea through the Outer-Geumgang. However, the tour route starting from Goseong was utilized for the Mt. Geumgang tour course operated by Hyundai. Because North Korea opened only the Outer-Geumgang area. North Korea has only opened some of its tour courses to Hyundai, but if Geumgang tourism is resumed in the future, there is a high possibility that it will be opened further, such as opening some sections of the Inner-Geumgang in 2007. In this case, it is necessary to connect additional transportation networks to access Inner-Geumgang from South Korea. The best alternative was the restoration of the Mt. Geumgang Railway. However, considering the fact that the reconstruction of the Mt. Geumgang Railway can not be completed due to the construction of the Imnam Dam, it is the most realistic alternative to restore Route 31 connecting Yanggu and Geumgang-eup. As a result of the analysis of road connecting Inner-Geumgang, three routes were confirmed. All of which were adjacent to the existing National Route 31. These routes passing through Dutayeon and Mundeung-ri and joining the Route 31 from Inje. Considering road length, topography characteristics, and military facility layout, it seems that the connection of 'Dutaeyun - Mundeung - Geumgang' is a realistic alternative connecting from South Korea to Inner-Geumgang.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP (PageRank 특징을 활용한 RDP기반 내부전파경로 탐지 및 SHAP를 이용한 설명가능한 시스템)

  • Yun, Jiyoung;Kim, Dong-Wook;Shin, Gun-Yoon;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers inside. To solve this problem, studies on the lateral movement detection system that tracks and detects the attacker's movements have begun to emerge. Especially, the method of using the Remote Desktop Protocol (RDP) is simple but shows very good results. Nevertheless, previous studies did not consider the effects and relationships of each logon host itself, and the features presented also provided very low results in some models. There was also a problem that the model could not explain why it predicts that way, which resulted in reliability and robustness problems of the model. To address this problem, this study proposes an interpretable RDP-based lateral movement detection system using page rank algorithm and SHAP(Shapley Additive Explanations). Using page rank algorithms and various statistical techniques, we create features that can be used in various models and we provide explanations for model prediction using SHAP. In this study, we generated features that show higher performance in most models than previous studies and explained them using SHAP.

Image Based Damage Detection Method for Composite Panel With Guided Elastic Wave Technique Part I. Damage Localization Algorithm (복합재 패널에서 유도 탄성파를 이용한 이미지 기반 손상탐지 기법 개발 Part I. 손상위치 탐지 알고리즘)

  • Kim, Changsik;Jeon, Yongun;Park, Jungsun;Cho, Jin Yeon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • In this paper, a new algorithm is proposed to estimate the damage location in the composite panel by extracting the elastic wave signal reflected from the damaged area. The guided elastic wave is generated by a piezoelectric actuator and sensed by a piezoelectric sensor. The proposed algorithm adopts a diagnostic approach. It compares the non-damaged signal with the damaged signal, and extract damage information along with sensor network and lamb wave group velocity estimated by signal correlation. However, it is difficult to clearly distinguish the damage location due to the nonlinear properties of lamb wave and complex information composed of various signals. To overcome this difficulty, the cumulative summation feature vector algorithm(CSFV) and a visualization technique are newly proposed in this paper. CSFV algorithm finds the center position of the damage by converting the signals reflected from the damage to the area of distance at which signals reach, and visualization technique is applied that expresses feature vectors by multiplying damage indexes. Experiments are performed for a composite panel and comparative study with the existing algorithms is carried out. From the results, it is confirmed that the damage location can be detected by the proposed algorithm with more reliable accuracy.

Evaluation Research on the Protection and Regeneration of the Urban Historical and Cultural District of Pingjiang Road, Suzhou, China (중국 쑤저우 평강로 도시역사문화거리 보존 및 재생사업 평가연구)

  • Geng, Li;Yoon, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.561-580
    • /
    • 2021
  • This study analyses the historical and cultural streets at Pinggang Road in the city of Suzhou, by understanding the development and conservation of the area, and uses the following ways to investigate its development, re-organization, and current state. This paper comprehensively compares, collates and investigates 4 different historical and cultural areas in Insadong and Samcheong-dong in South Korea, and South Luogu Lane in China. From initial research and analysis, this paper gathers the cultural, economic, and societal perspectives as non-physical measures, and spatial structure, road structure, and building maintenance as physical factor framework. It is significant in that it can provide an evaluation model for the preservation and regeneration of historical and cultural streets by presenting the viewpoint of complex development of non-physical and physical elements in Pyeonggang-ro. In addition, it is necessary to conduct optimization and specific research on insufficient areas, such as maintenance and development of programs and signature systems for visitors, and continuous development of historical and cultural network platforms by combining on-site surveys. Basic data should be provided for reference on the street.

Controlling Factors on the Development and Connectivity of Fracture Network: An Example from the Baekildo Fault in the Goheung Area (단열계의 발달 및 연결성 제어요소: 고흥지역 백일도단층의 예)

  • Park, Chae-Eun;Park, Seung-Ik
    • Economic and Environmental Geology
    • /
    • v.54 no.6
    • /
    • pp.615-627
    • /
    • 2021
  • The Baekildo fault, a dextral strike-slip fault developed in Baekil Island, Goheung-gun, controls the distribution of tuffaceous sandstone and lapilli tuff and shows a complex fracture system around it. In this study, we examined the spatial variation in the geometry and connectivity of the fracture system by using circular sampling and topological analysis based on a detailed fracture trace map. As a result, both intensity and connectivity of the fracture system are higher in tuffaceous sandstone than in lapilli tuff. Furthermore, the degree of the orientation dispersion, intensity, and average length of fracture sets vary depending on the along-strike variation in structural position in the tuffaceous sandstone. Notably, curved fractures abutting the fault at a high angle occur at a fault bend. Based on the detailed observation and analyses of the fracture system, we conclude as follows: (1) the high intensity of the fracture system in the tuffaceous sandstone is caused by the higher content of brittle minerals such as quartz and feldspar. (2) the connectivity of the fracture system gets higher with the increase in the diversity and average length of the fracture sets. Finally, (3) the fault bend with geometric irregularity is interpreted to concentrate and disturb the local stress leading to the curved fractures abutting the fault at a high angle. This contribution will provide important insight into various geologic and structural factors that control the development of fracture systems around faults.