• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.034 seconds

Deobfuscation Processing and Deep Learning-Based Detection Method for PowerShell-Based Malware (파워쉘 기반 악성코드에 대한 역난독화 처리와 딥러닝 기반 탐지 방법)

  • Jung, Ho-jin;Ryu, Hyo-gon;Jo, Kyu-whan;Lee, Sangkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.501-511
    • /
    • 2022
  • In 2021, ransomware attacks became popular, and the number is rapidly increasing every year. Since PowerShell is used as the primary ransomware technique, the need for PowerShell-based malware detection is ever increasing. However, the existing detection techniques have limits in that they cannot detect obfuscated scripts or require a long processing time for deobfuscation. This paper proposes a simple and fast deobfuscation method and a deep learning-based classification model that can detect PowerShell-based malware. Our technique is composed of Word2Vec and a convolutional neural network to learn the meaning of a script extracting important features. We tested the proposed model using 1400 malicious codes and 8600 normal scripts provided by the AI-based PowerShell malicious script detection track of the 2021 Cybersecurity AI/Big Data Utilization Contest. Our method achieved 5.04 times faster deobfuscation than the existing methods with a perfect success rate and high detection performance with FPR of 0.01 and TPR of 0.965.

Intrusion Detection and Monitoring System Using Webcam and Infrared Thermal Camera Module (웹캠과 적외선 열화상 카메라 모듈을 활용한 침입 탐지 및 감시 시스템)

  • Seung-Tae Ham;Sung-Hwa Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.5
    • /
    • pp.754-759
    • /
    • 2024
  • In this paper, we implemented a detection and surveillance system using webcam and thermal camera modules as a method to counter various crimes that are increasing in modern society. For human detection using a webcam, we applied a detection method called Haar-like features, which utilizes the characteristics of dark and bright areas in different parts of the face. We also integrated two approaches, one is a contactless method that detects the infrared radiation emitted from the subject and displays information, and the other is a method that detects infrared radiation emitted from the human body and displays thermal images using an interpolation technique. To accomplish this, we equipped Raspberry Pi with these two modules and built the system. It is expected that by using this interpolation technique, the efficiency of recognition information will be enhanced when integrating with various information sensors in the future.

Digital Watermarking Technique for Images with Perspective Distortion

  • Chotikakamthorn, Nopporn;Yawai, Wiyada
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1090-1093
    • /
    • 2004
  • In this paper, a problem of geometrically distorted images is considered. In particular, the paper discusses the detection of a watermark from a photographed image of the watermarked picture. The image is possibly obtained by using a digital camera. This watermark detection problem is made difficult by various geometric distortions added to the original picture through the printing and photographing processes. In particular, the paper focuses on the geometric distortion due to a projective transformation, as part of a camera 3D-to-2D imaging process. It is well-known that a cross ratio of collinear points is invariant under a perspective projection. By exploiting this fact, a projective-invariant digital watermarking technique is developed. By detecting the picture's corners, and the image center point at the intersection of two main diagonal lines, predefined cross ratios are used to compute the watermark embedded locations. From those identified embedding pixel locations, a watermark can be detected by performing a correlation between a watermark pattern and the image over those pixels. The proposed method does not require an inverse transformation on the distorted image, thus simplifying the detection process. Performance of the proposed method has been analyzed through computer experiments

  • PDF

Infant Retinal Images Optic Disk Detection Using Active Contours

  • Charmjuree, Thammanoon;Uyyanonvara, Bunyarit;Makhanov, Stanislav S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.312-316
    • /
    • 2004
  • The paper presents a technique to identify the boundary of the optic disc in infant retinal digital images using an approach based on active contours (snakes). The technique can be used to be develop a automate system in order to help the ophthalmologist's diagnosis the retinopathy of prematurity (ROP) disease which may occurred on preterm infant,. The optic disc detection is one of the fundamental step which could help to create an automate diagnose system for the doctors we use a new kind of active contour (snake) method has been developed by Chenyang et. al. [1], based on a new type of external force field, called gradient vector flow, or GVF. GVF is computed as a diffusion of the gradient vectors of a gray-level or binary edge map derived from the image. The testing results on a set of infant retinal ROP images verify the effectiveness of the proposed methods. We show that GVF has a large capture range and it's able to move snakes into boundary concavities of optic disc and finally the optic disk boundary was determined.

  • PDF

PCA-Base Real-Time Face Detection and Tracking

  • Jung, Do-Joon;Lee, Chang-Woo;Lee, Yeon-Chul;Bak, Sang-Yong;Kim, Jong-Bae;Hyun Kang;Kim, Hang-Joon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.615-618
    • /
    • 2002
  • This paper proposes a real-time face detection and tracking a method in complex backgrounds. The proposed method is based on the principal component analysis (PCA) technique. For the detection of a face, first, we use a skin color model and motion information. And then using the PCA technique the detected regions are verified to determine which region is indeed the face. The tracking of a face is based on the Euclidian distance in eigenspace between the previously tracked face and the newly detected faces. Camera control for the face tracking is done in such a way that the detected face region is kept on the center of the screen by controlling the pan/tilt platform. The proposed method is extensible to other systems such as teleconferencing system, intruder inspection system, and so on.

  • PDF

Study on Bruise Detection of 'Fuji' apple using Hyperspectral Reflectance Imagery (초분광 반사광 영상을 이용한 '후지' 사과의 멍 검출에 관한 연구)

  • Cho, Byoung-Kwan;Baek, In-Suck;Lee, Nam-Geun;Mo, Chang-Yeun
    • Journal of Biosystems Engineering
    • /
    • v.36 no.6
    • /
    • pp.484-490
    • /
    • 2011
  • Defects exist underneath the fruit skin are not easily discernable by using conventional color imaging technique in the visible wavelength ranges. Development of sensitive detection methods for the defects is necessary to ensure accurate quality sorting of fruits. Hyperspectral imaging techniques, which combine the features of image and spectroscopy to acquire spatial and spectral information simultaneously, have demonstrated good potentials for identifying and detecting anomalies on biological substances. In this study, a high spatial resolution hyperspectral reflectance technique was presented as a tool for detecting bruises on apple. The two-band ratio (494 nm / 952 nm) and simple threshold methods were applied to investigate the feasibility of discriminating the bruises from sound tissue of apple. The pixel wise accuracy of the discrimination was 74%. The resultant images processed with selected wavebands and morphologic algorithm distinctively showed the early stages of bruises on apple which were not discernable by naked eyes as well as a conventional color camera. Results demonstrated good potential of the hyperspectral reflectance imaging for detection of bruises on apple.

Variable Rate Limiter in Virus Throttling for Reducing Connection Delay (연결설정 지연 단축을 위한 바이러스 쓰로틀링의 가변 비율 제한기)

  • Shim, Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.559-566
    • /
    • 2006
  • Virus throttling technique, one of many early worm detection techniques, detects the Internet worm propagation by limiting the connect requests within a certain ratio. The typical virus throttling detects worm occurrence by monitoring the length of delay queue with the fixed period of rate limiter. In this paper, we propose an algorithm that controls the period of rate limiter autonomically by utilizing the weighted average delay queue length and suggest various period determination policies that use the weighted average delay queue length as an input parameter. Through deep experiments, it is verified that the proposed technique is able to lessen inconvenience of users by reducing the connection delay time with haying just little effect on worm detection time.

Modeling and Analysis of Modified Active Frequency Drift Method (개선된 AFD기법의 모델링 및 분석)

  • An, Jin-Ung;Yu, Gwon-Jong;Choy, Ich;Choi, Ju-Yeop;Lee, Ki-Ok
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.2
    • /
    • pp.145-151
    • /
    • 2011
  • In this paper, among the active islanding detection techniques, the modified active frequency drift method was analyzed, which is relatively easy to apply to the single-phase grid-connected PV PCS. The existing designs for turbulences in these applications were empirically conducted, and do not have sufficient reliability and performance. Therefore, three application forms of the modified active frequency drift technique were modeled, based on which the proper magnitude of turbulence, which is the frequency acceleration component, was calculated. Using the results, the magnitude of and injection method for turbulence for ensuring the islanding detection performance and improving the output power quality were proposed, and they were verified via simulations and experiment to prove that the reliable islanding detection technique can be developed merely by measuring the basic output power quality, without the need for expensive islanding simulation equipment.

A Fault Severity Index for Stator Winding Faults Detection in Vector Controlled PM Synchronous Motor

  • Hadef, M.;Djerdir, A.;Ikhlef, N.;Mekideche, M.R.;N'diaye, A. O.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.6
    • /
    • pp.2326-2333
    • /
    • 2015
  • Stator turn faults in permanent magnet synchronous motors (PMSMs) are more dangerous than those in induction motors (IMs) because of the presence of spinning rotor magnets that can be turned off at will. Condition monitoring and fault detection and diagnosis of the PMSM have been receiving a growing amount of attention among scientists and engineers in the past few years. The aim of this study is to propose a new detection technique of stator winding faults in a three-phase PMSM. This technique is based on the image analysis and recognition of the stator current Concordia patterns, and will allow the identification of turn faults in the stator winding as well as its correspondent fault index severity. A test bench of a vector controlled PMSM motor behaviors under short circuited turn in two phases stator windings has been built. Some experimental results of the phase to phase short circuits have been performed for diagnosis purpose.

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.