• 제목/요약/키워드: detection mechanism

검색결과 850건 처리시간 0.024초

SVM을 이용한 SNMP MIB에서의 트래픽 폭주 공격 탐지 (Traffic Flooding Attack Detection on SNMP MIB Using SVM)

  • 유재학;박준상;이한성;김명섭;박대희
    • 정보처리학회논문지C
    • /
    • 제15C권5호
    • /
    • pp.351-358
    • /
    • 2008
  • DoS/DDoS로 대표되는 트래픽 폭주 공격은 대상 시스템뿐만 아니라 네트워크 대역폭 및 프로세서 처리능력, 시스템 자원 등을 고갈시킴으로써 네트워크에 심각한 장애를 유발하기 때문에, 신속한 트래픽 폭주 공격의 탐지는 안정적인 서비스의 제공 및 시스템의 운영에 필수요건이다. 전통적인 패킷 수집을 통한 DoS/DDoS의 탐지방법은 공격에 대한 상세한 분석은 가능하나 설치의 확장성 부족, 고가의 고성능 분석시스템의 요구, 신속한 탐지를 보장하지 못하는 문제점을 갖고 있다. 본 논문에서는 MIB 정보 갱신 시점 단위로 수집된 SNMP MIB 객체 정보를 바탕으로 Support Vector Data Description(SVDD)을 이용하여 보다 빠르고 정확한 침입탐지와 쉬운 확장성, 저비용탐지 및 정확한 공격유형별 분류를 가능케 하는 새로운 시스템을 설계 및 구현하였다. 실험을 통하여 만족스러운 침입 탐지율과 안전한 False Negative Rate(FNR), 공격유형별 분류율 수치 등을 확인함으로써 제안된 시스템의 성능을 검증하였다.

Approximate Detection Method for Image Up-Sampling

  • Tu, Ching-Ting;Lin, Hwei-Jen;Yang, Fu-Wen;Chang, Hsiao-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.462-482
    • /
    • 2014
  • This paper proposes a new resampling detection method for images that detects whether an image has been resampled and recovers the corresponding resampling rate. The proposed method uses a given set of zeroing masks for various resampling factors to evaluate the convolution values of the input image with the zeroing masks. Improving upon our previous work, the proposed method detects more resampling factors by checking for some periodicity with an approximate detection mechanism. The experimental results demonstrate that the proposed method is effective and efficient.

High sensitivity biosensor for mycotoxin detection based on conducting polymer supported electrochemically polymerized biopolymers

  • Dhayal, Marshal;Park, Gye-Choon;Park, Kyung-Hee;Gu, Hal-Bon
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 한국신재생에너지학회 2010년도 춘계학술대회 초록집
    • /
    • pp.243.1-243.1
    • /
    • 2010
  • Devices based on nanomaterials platforms are emerging as a powerful tool for ultrasensitive sensors for the direct detection of biological and chemical species. In this talk, we will report the preparation and the full characterization of electrochemical polymerization of biopolymers platforms and nano-structure formation for electrochemical detection of enzymatic activity and toxic compound in electrolyte for biosensor applications. Formation of an electroactive polymer film of two different compounds has been quantified by observing new redox peak at higher potentials in cyclic voltammogram measurements. RCT value of at various biopolymer concentration based hybrid films has been obtained from electrochemical impedance spectroscopy analysis and possible mechanism for formation of complexes during electrochemical polymerization on conducting substrates has been investigated. Biosensors developed based on these hybrid biopolymers have very high sensitivity.

  • PDF

Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구 (The Study of System Security Technique for Mobile Ad Hoc Network)

  • 양환석
    • 디지털콘텐츠학회 논문지
    • /
    • 제9권1호
    • /
    • pp.33-39
    • /
    • 2008
  • Ad Hoc Network는 인프라스트럭처 기반의 네트워크가 아니고 노드들이 분포되어 있기 때문에 공격을 받기가 쉽다. 침입탐지시스템은 다른 노드들의 신뢰 수준을 감지하고 노드의 로컬 보안에 대한 검사와 감시 능력을 제공한다. 본 논문에서는 침입 탐지를 하는데 오버헤드를 줄이기 위해 클러스터링 기법을 적용하였다. 그리고 노드들 간의 신뢰도를 측정하기 위해 클러스터 헤드가 멤버 노드로부터 받은 신뢰 정보와 자신의 정보를 조합하여 다른 노드의 신뢰도를 평가한다. 이렇게 함으로써 네트워크내의 노드들의 대한 인증을 정확하게 수행할 수 있게 되어 안전한 데이터 전송을 제공하게 된다.

  • PDF

Prediction of User Preferred Cosmetic Brand Based on Unified Fuzzy Rule Inference

  • 김진성
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2005년도 추계학술대회 학술발표 논문집 제15권 제2호
    • /
    • pp.271-275
    • /
    • 2005
  • In this research, we propose a Unified Fuzzy rule-based knowledge Inference Systems UFIS) to help the expert in cosmetic brand detection. Users' preferred cosmetic product detection is very important in the level of CRM. To this Purpose, many corporations trying to develop an efficient data mining tool. In this study, we develop a prototype fuzzy rule detection and inference system. The framework used in this development is mainly based on two different mechanisms such as fuzzy rule extraction and RDB (Relational DB)-based fuzzy rule inference. First, fuzzy clustering and fuzzy rule extraction deal with the presence of the knowledge in data base and its value is presented with a value between $0\∼1$. Second, RDB and SQL(Structured Query Language)-based fuzzy rule inference mechanism provide more flexibility in knowledge management than conventional non-fuzzy value-based KMS(Knowledge Management Systems)

  • PDF

통신해양기상위성 자이로센서 FDIR 설계 및 검증에 관한 연구 (A Study of FDIR S/W Design and Verification for Gyro Sensor of COMS Satellite)

  • 이훈희
    • 항공우주기술
    • /
    • 제7권2호
    • /
    • pp.95-102
    • /
    • 2008
  • 2009년에 발사될 통신해양기상위성은 다중화 구조설계를 통해 발생 가능성이 있는 고장으로부터 자동 회복을 수행할 수 있도록 자동조치기능이 탑재되어 있다. 본 연구에서는 자이로 센서의 고장이 COMS 임무에 미치는 영향을 살펴보고 장치 레벨의 자이로 센서 고장 처리를 위한 고장감지 방법과 기준, 고장고립과 회복 동작에 대한 메커니즘을 분석하였다 또한 시뮬레이터를 이용하여 고장 발생에 대한 자동조치 동작검증 결과를 확인하였다.

  • PDF

Firing State와 Observing State를 갖는 Lanchester형 전투모형에 관한 연구 (A Study on the Development of a Lanchester-Type Model Incorporating Firing & Observing States in the Direct Fire Engagement)

  • 함일환;최상영;송문호
    • 한국국방경영분석학회지
    • /
    • 제17권2호
    • /
    • pp.44-53
    • /
    • 1991
  • This paper is aimed to develop a Lanchester type combat model for the direct-fire engagement. This model incorporates number of combatants, inter-firing time, detection time by movement, detection probability by the signature of fire, where the inter-firing time and the detection time are assumed to follow a negative exponential distribution. The approach to modeling is as follows : in the process of an engagement, a combatant takes one of the states('observing' state or 'firing' state), a combatant is initially in the observing state, if the combatant detects a target, he changes his state from 'observing' to 'firing' and will cause attrition to the opposing forces. Thus this transition mechanism is embodied into the differential equation form with each transition rate. A limited examination of the validity has been conducted by comparison with the Monte-Carlo simulation model 'BAGSIM', and with a traditional Deterministic Lanchester model.

  • PDF

반사계수를 이용한 동시통화 검출기 (A doulbe talk detector using the reflection coefficients)

  • 유재하;조성호;윤대희
    • 전자공학회논문지S
    • /
    • 제34S권10호
    • /
    • pp.141-150
    • /
    • 1997
  • In this paepr, we propose an intelligent double talk detector that can enhance the performance of the acoustic echo cancellation system. The conventional double talk detection methods often misunderstand the echo path changes as double talk. Although there exist several detection methods that can distinguish the echo path changes from the double-talks, they show poor tracking performance because of the excessive decision delay for the discrimination and can only be used after the adaptive digital filter converges. A new and more effective ditetion algorithm has been proposed, where the detection mechanism is performed by observing the change rate of the reflection coefficients of the two lattice predictors that re placed on the near-end and far-end terminals. The excellence of the proposed method is verified by extensive computer simulations using real speech signals.

  • PDF

Highlight-Detection-Based Color Correction Method for Multiview Images

  • Shao, Feng;Jiang, Gangyi;Yu, Mei;Ho, Yo-Sung
    • ETRI Journal
    • /
    • 제31권4호
    • /
    • pp.448-450
    • /
    • 2009
  • In multiview imaging systems, color correction is adopted to eliminate color inconsistency between views. However, the influence of highlights on color correction has not been considered before. In this letter, a new color correction method based on highlight detection is proposed. The method is designed to treat highlight and highlight-removal regions independently when calculating correction parameters. Finial correction is implemented with a fusion mechanism. Experimental results show that the proposed method can improve objective and subjective correction performance, while achieving better coding performance than other correction methods.

침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션 (Security Simulation with Collaboration of Intrusion Detection System and Firewall)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF