• Title/Summary/Keyword: detection technique

Search Result 4,102, Processing Time 0.051 seconds

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

Development of Leak Detection System of Heat Exchanger using Acoustic Emission Technique (음향방출기법을 이용한 열교환기 누설검출시스템 개발)

  • Lee, Min-Rae;Lee, Jun-Hyeon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.5
    • /
    • pp.864-871
    • /
    • 2002
  • Acoustic emission(AE) technique has been applied to not only mechanical property testing but also on-line monitoring of the entire structure or a limit zone only. Although several AE devices have already been developed for on-line monitoring, the price of these systems is very high and it is difficult for the field to apply yet. In this study, we developed a specially designed PC-based leak detection system using A/D board. In this paper, AE technique has been applied to detect leak for heat exchanger by analyzing the characteristics of signal obtained from leak. It was confirmed that the characteristics of the signal generated by the turbulence of gas in the heat exchanger is narrow band signal having between 130-250kHz. Generally, the amplitude of leak signal is increased as the leak size increasing, but showed no significant change at frequency characteristic. Leak source location can be found by determining for the paint of highest signal amplitude by comparing with several fixed sensors. In this paper, AE results are compared with the PC-based leak detection system using A/D board.

Memory Leak Detection Using Adaptive Cyclic Memory Allocation (동적 순환 메모리 할당 기법을 이용한 메모리 누수 검출)

  • Lim, Woo-Sup;Han, Hwan-Soo;Lee, Sang-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.760-767
    • /
    • 2010
  • There are many memory leak detection tools. However, programmers, who develop very large programs, tend to avoid testing their programs with memory leak detection tools since these tools require runtime and space overheads. Thus, we present a memory leak detection technique which enables programmers to test their modules in their unit test phase with low overheads. To achieve this goal, we extend the existing cyclic memory allocation technique and evaluate our memory leak detection technique on a tiny DBMS. In our experiments, we find our tool has reasonably low runtime and space overheads and it reports only a small number of false positives.

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

Measurement Uncertainty on Subsurface Defects Detection Using Active Infrared Thermographic Technique (능동 적외선열화상 기법을 이용한 이면결함 검출에서의 측정 불확도)

  • Chung, Yoonjae;Kim, Wontae;Choi, Wonjae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.5
    • /
    • pp.341-348
    • /
    • 2015
  • Active infrared thermography methods have been known to possess good fault detection capabilities for the detection of defects in materials compared to the conventional passive thermal infrared imaging techniques. However, the reliability of the technique has been under scrutiny. This paper proposes the lock-in thermography technique for the detection and estimation of artificial subsurface defect size and depth with uncertainty measurement.

Environment Implementation of Real-time Supervisory System Using Motion Detection Method (동작 검출 기법을 이용한 실시간 감시시스템의 구현)

  • 김형균;고석만;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.999-1002
    • /
    • 2003
  • In this study, embodied supervisory system that apply motion detection technique to small web camera and detects watch picture. Motion detection technique that use pixel value of car image that use in existing need memory to store background image. Also, there is sensitive shortcoming at increase of execution time by data process of pixel unit and noise. Suggested technique that compare extracting motion information by block unit to do to have complexion that solve this shortcoming and is strong at noise. Because motion information by block compares block characteristic value of image without need frame memory, store characteristic cost by block of image. Also, can get effect that reduce influence about noise and is less sensitive to flicker etc.. of camera more than motion detection that use pixel value in process that find characteristic value by block unit.

  • PDF

Face Detection using Brightness Distribution in the Surrounding Area of Eye (눈 주변영역의 명암분포를 이용한 얼굴탐지)

  • Hwang, Dae-Dong;Park, Joo-Chul;Kim, Gye-Young
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.443-450
    • /
    • 2009
  • This paper develops a novel technique of face detection using brightness distribution in the surrounding area of eye. The proposed face detection consists of facial component candidate extraction, facial component candidate filtering through eye-lip combination, left/right eye classification using brightness distribution, face verification confirming edges in nose region. Because the proposed technique don't use any skin color, it can detect multiple faces in color images with complicated backgrounds and different illumination levels. The experimental results reveal that the proposed technique is better than the traditional techniques in terms of detection ratio.

A Study on the Underwater Target Detection Using the Waveform Inversion Technique (파형역산 기법을 이용한 수중표적 탐지 연구)

  • Bae, Ho Seuk;Kim, Won-Ki;Kim, Woo Shik;Choi, Sang Moon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.487-492
    • /
    • 2015
  • A short-range underwater target detection and identification techniques using mid- and high-frequency bands have been highly developed. However, nowadays the long-range detection using the low-frequency band is requested and one of the most challengeable issues. The waveform inversion technique is widely used and the hottest technology in both academia and industry of the seismic exploration. It is based on the numerical analysis tool, and could construct more than a few kilometers of the subsurface structures and model-parameters such as P-wave velocity using a low-frequency band. By applying this technique to the underwater acoustic circumstance, firstly application of underwater target detection is verified. Furthermore, subsurface structures and it's parameters of the war-field are well reconstructed. We can confirm that this technique greatly reduces the false-alarm rate for the underwater targets because it could accurately reproduce both the shape and the model-parameters at the same time.

Automatic Crack Detection on Pressed Panels Using Camera Image Processing with Local Amplitude Mapping (카메라 이미지 처리를 통한 프레스 패널의 크랙결함 검출)

  • Lee, Chang Won;Jung, Hwee Kwon;Park, Gyuhae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.36 no.6
    • /
    • pp.451-459
    • /
    • 2016
  • Crack detection on panels during manufacturing process is an important step for ensuring the product quality. The accuracy and efficiency of traditional crack detection methods, which are performed by eye inspection, are dependent on human inspectors. Therefore, implementation of an on-line and precise crack detection is required during the panel pressing process. In this paper, a regular CCTV camera system is utilized to obtain images of panel products and an image process based crack detection technique is developed. This technique uses a comparison between the base image and a test image using an amplitude mapping of the local image. Experiments are performed in the laboratory and in the actual manufacturing lines to evaluate the performance of the developed technique. Experimental results indicate that the proposed technique could be used to effectively detect a crack on panels with high speed.

PE Header Characteristics Analysis Technique for Malware Detection (악성프로그램 탐지를 위한 PE헤더 특성 분석 기술)

  • Choi, Yang-Seo;Kim, Ik-Kyun;Oh, Jin-Tae;Ryu, Jae-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.63-70
    • /
    • 2008
  • In order not to make the malwares be easily analyzed, the hackers apply various anti-reversing and obfuscation techniques to the malwares. However, as the more anti-revering techniques are applied to the malwares the more abnormal characteristics in the PE file's header which are not shown in the normal PE file, could be observed. In this letter, a new malware detection technique is proposed based on this observation. For the malware detection, we define the Characteristics Vector(CV) which can represent the characteristics of a PE file's header. In the learning phase, we calculate the average CV(ACV) of malwares(ACVM) and normal files(ACVN). To detect the malwares we calculate the 2 Weighted Euclidean Distances(WEDs) from a file's CV to ACVs and they are used to decide whether the file is a malware or not. The proposed technique is very fast and detection rate is fairly high, so it could be applied to the network based attack detection and prevention devices. Moreover, this technique is could be used to detect the unknown malwares because it does not utilize a signature but the malware's characteristics.

  • PDF