• Title/Summary/Keyword: detection mechanism

Search Result 850, Processing Time 0.026 seconds

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

An Empirical Comparison Study on Attack Detection Mechanisms Using Data Mining (데이터 마이닝을 이용한 공격 탐지 메커니즘의 실험적 비교 연구)

  • Kim, Mi-Hui;Oh, Ha-Young;Chae, Ki-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.208-218
    • /
    • 2006
  • In this paper, we introduce the creation methods of attack detection model using data mining technologies that can classify the latest attack types, and can detect the modification of existing attacks as well as the novel attacks. Also, we evaluate comparatively these attack detection models in the view of detection accuracy and detection time. As the important factors for creating detection models, there are data, attribute, and detection algorithm. Thus, we used NetFlow data gathered at the real network, and KDD Cup 1999 data for the experiment in large quantities. And for attribute selection, we used a heuristic method and a theoretical method using decision tree algorithm. We evaluate comparatively detection models using a single supervised/unsupervised data mining approach and a combined supervised data mining approach. As a result, although a combined supervised data mining approach required more modeling time, it had better detection rate. All models using data mining techniques could detect the attacks within 1 second, thus these approaches could prove the real-time detection. Also, our experimental results for anomaly detection showed that our approaches provided the detection possibility for novel attack, and especially SOM model provided the additional information about existing attack that is similar to novel attack.

Fault Detection Algorithm of Photovoltaic Power Systems using Stochastic Decision Making Approach (확률론적 의사결정기법을 이용한 태양광 발전 시스템의 고장검출 알고리즘)

  • Cho, Hyun-Cheol;Lee, Kwan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.212-216
    • /
    • 2011
  • Fault detection technique for photovoltaic power systems is significant to dramatically reduce economic damage in industrial fields. This paper presents a novel fault detection approach using Fourier neural networks and stochastic decision making strategy for photovoltaic systems. We achieve neural modeling to represent its nonlinear dynamic behaviors through a gradient descent based learning algorithm. Next, a general likelihood ratio test (GLRT) is derived for constructing a decision malling mechanism in stochastic fault detection. A testbed of photovoltaic power systems is established to conduct real-time experiments in which the DC power line communication (DPLC) technique is employed to transfer data sets measured from the photovoltaic panels to PC systems. We demonstrate our proposed fault detection methodology is reliable and practicable over this real-time experiment.

A light-adaptive CMOS vision chip for edge detection using saturating resistive network (포화 저항망을 이용한 광적응 윤곽 검출용 시각칩)

  • Kong, Jae-Sung;Suh, Sung-Ho;Kim, Jung-Hwan;Shin, Jang-Kyoo;Lee, Min-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.430-437
    • /
    • 2005
  • In this paper, we proposed a biologically inspired light-adaptive edge detection circuit based on the human retina. A saturating resistive network was suggested for light adaptation and simulated by using HSPICE. The light adaptation mechanism of the edge detection circuit was quantitatively analyzed by using a simple model of the saturating resistive element. A light-adaptive capability of the edge detection circuit was confirmed by using the one-dimensional array of the 128 pixels with various levels of input light intensity. Experimental data of the saturating resistive element was compared with the simulated results. The entire capability of the edge detection circuit, implemented with the saturating resistive network, was investigated through the two-dimensional array of the $64{\times}64$ pixels

Optoelectronic Mixing Detection for the Extension of Useable Frequency Range in the Radio over Fiber Network (무선광네트웍(RoF)의 가용 주파수 대역 확장을 위한 광전믹싱 광검파)

  • Choi, Young-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2189-2196
    • /
    • 2009
  • Theoretical analysis is presented for expending of the usable frequency range of optoelectronic mixing detection in the radio over fiber network system. We define the normalized gain to evaluate the performance of the optical mixing detection, and conform the possibilities of detection for the high frequency signals beyond the cutoff frequency of a photodiode. Optical mixing detection mechanism is analyzed by solving the continuity equation for the carriers of a photodiode. The normalized gain is independent on the signal frequency and the frequency difference between the optical signal and the local signal. Also, the amplitude of the local signal and the bias voltage are needed to be optimized at the same time in order to maximize the normalized gain.

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

Applying tilt mechanism for high-resolution image acquisition (고해상도 영상 획득을 위한 틸트 메커니즘 적용 기법)

  • Song, Chun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.31-37
    • /
    • 2014
  • In this paper, to compensate the degraded performance in high-resolution infrared sensor due to assembling error, the influence of each component was evaluated through the sensitivity analysis of lens assembly, axis mirror, and detector and also suggested detector tilt mechanism for compensation. 3 detector tilt mechanisms were investigated. The first one is 'Shim plate' method which is applying shim on installing plane. The second one is 'Tilting screw' method that is using tilt screw for adjusting detection plane. The last one is 'Micrometer head' method that is installing micrometer on detection plane and acquiring quantitative data. Based on the investigation result, 'Tilting screw' method was applied due to ease of user control, small volume, and real-time controllability, thereby we could acquire high-resolution infrared images. The research result shows that the tilting mechanism is necessary technology for the implementation of high-resolution infrared imaging system.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Proposition for Retina Model Based on Electrophysiological Mechanism and Analysis for Spatiotemporal Response (전기생리학적 기전에 근거한 망막 모델의 제안과 시공간적 응답의 분석)

  • Lee, Jeong-Woo;Chae, Seung-Pyo;Cho, Jin-Ho;Kim, Myoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.6
    • /
    • pp.49-58
    • /
    • 2002
  • Based on electrophysiological retina mechanism, a retina model is proposed, which has similar response characteristics compared with the real primate retina. Photoreceptors, horizontal cells, and bipolar cells are modeled based on the previously studied retina models. And amacrine cells known to have relation to movements detection, and bipolar cell terminals are newly modeled using 3 NDP mechanism. The proposed model verified by analyzing the spatial response characteristics to stationary and moving stimuli, and characteristics for different speeds. Through this retina model, human vision system could be applied to computer vision systems for movement detection, and it could be the basic research for the implantable artificial retina.