• Title/Summary/Keyword: false positive error

Search Result 72, Processing Time 0.021 seconds

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

The advantage of topographic prominence-adopted filter for the detection of short-latency spikes of retinal ganglion cells

  • Ahn, Jungryul;Choi, Myoung-Hwan;Kim, Kwangsoo;Senok, Solomon S.;Cho, Dong-il Dan;Koo, Kyo-in;Goo, Yongsook
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.21 no.5
    • /
    • pp.555-563
    • /
    • 2017
  • Electrical stimulation through retinal prosthesis elicits both short and long-latency retinal ganglion cell (RGC) spikes. Because the short-latency RGC spike is usually obscured by electrical stimulus artifact, it is very important to isolate spike from stimulus artifact. Previously, we showed that topographic prominence (TP) discriminator based algorithm is valid and useful for artifact subtraction. In this study, we compared the performance of forward backward (FB) filter only vs. TP-adopted FB filter for artifact subtraction. From the extracted retinae of rd1 mice, we recorded RGC spikes with $8{\times}8$ multielectrode array (MEA). The recorded signals were classified into four groups by distances between the stimulation and recording electrodes on MEA (200-400, 400-600, 600-800, $800-1000{\mu}m$). Fifty cathodic phase-$1^{st}$ biphasic current pulses (duration $500{\mu}s$, intensity 5, 10, 20, 30, 40, 50, $60{\mu}A$) were applied at every 1 sec. We compared false positive error and false negative error in FB filter and TP-adopted FB filter. By implementing TP-adopted FB filter, short-latency spike can be detected better regarding sensitivity and specificity for detecting spikes regardless of the strength of stimulus and the distance between stimulus and recording electrodes.

Vision-based Vehicle Detection and Inter-Vehicle Distance Estimation (영상 기반의 차량 검출 및 차간 거리 추정 방법)

  • Kim, Gi-Seok;Cho, Jae-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.1-9
    • /
    • 2012
  • In this paper, we propose a vision-based robust vehicle detection and inter-vehicle distance estimation algorithm for driving assistance system. We use the haar-like features of car rear-shadows, as well as the edge features for detecting of vehicles. The use of additional vehicle edge features greatly reduces the false-positive errors in the vehicle detection. And, after analyzing the conventional two inter-vehicle distance estimation methods: the location-based and the vehicle width-based, an improved inter-vehicle distance estimation algorithm which has the advantage of both method is proposed. Several experimental results show the effectiveness of the proposed method.

Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image (위·변조 영상의 에지 에너지 정보를 이용한 영상 포렌식 판정 알고리즘)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.75-81
    • /
    • 2014
  • In a distribution of the digital image, there is a serious problem that is distributed an illegal forgery image by pirates. For the problem solution, this paper proposes an image forensic decision algorithm using an edge energy information of forgery image. The algorithm uses SA (Streaking Artifacts) and SPAM (Subtractive Pixel Adjacency Matrix) to extract the edge energy informations of original image according to JPEG compression rate(QF=90, 70, 50 and 30) and the query image. And then it decides the forge whether or not by comparing the edge informations between the original and query image each other. According to each threshold in TCJCR (Threshold by Combination of JPEG Compression Ratios), the matching of the edge informations of original and query image is excused. Through the matching experiments, TP (True Positive) and FN (False Negative) is 87.2% and 13.8% respectively. Thus, the minimum average decision error is 0.1349. Also, it is confirmed that the performed class evaluation of the proposed algorithm is 'Excellent(A)' because of the AUROC (Area Under Receiver Operating Characteristic) curve is 0.9388 by sensitivity and 1-specificity.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

A Spelling Error Correction Model in Korean Using a Correction Dictionary and a Newspaper Corpus (교정사전과 신문기사 말뭉치를 이용한 한국어 철자 오류 교정 모델)

  • Lee, Se-Hee;Kim, Hark-Soo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.5
    • /
    • pp.427-434
    • /
    • 2009
  • With the rapid evolution of the Internet and mobile environments, text including spelling errors such as newly-coined words and abbreviated words are widely used. These spelling errors make it difficult to develop NLP (natural language processing) applications because they decrease the readability of texts. To resolve this problem, we propose a spelling error correction model using a spelling error correction dictionary and a newspaper corpus. The proposed model has the advantage that the cost of data construction are not high because it uses a newspaper corpus, which we can easily obtain, as a training corpus. In addition, the proposed model has an advantage that additional external modules such as a morphological analyzer and a word-spacing error correction system are not required because it uses a simple string matching method based on a correction dictionary. In the experiments with a newspaper corpus and a short message corpus collected from real mobile phones, the proposed model has been shown good performances (a miss-correction rate of 7.3%, a F1-measure of 97.3%, and a false positive rate of 1.1%) in the various evaluation measures.

Robust Sign Recognition System at Subway Stations Using Verification Knowledge

  • Lee, Dongjin;Yoon, Hosub;Chung, Myung-Ae;Kim, Jaehong
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.696-703
    • /
    • 2014
  • In this paper, we present a walking guidance system for the visually impaired for use at subway stations. This system, which is based on environmental knowledge, automatically detects and recognizes both exit numbers and arrow signs from natural outdoor scenes. The visually impaired can, therefore, utilize the system to find their own way (for example, using exit numbers and the directions provided) through a subway station. The proposed walking guidance system consists mainly of three stages: (a) sign detection using the MCT-based AdaBoost technique, (b) sign recognition using support vector machines and hidden Markov models, and (c) three verification techniques to discriminate between signs and non-signs. The experimental results indicate that our sign recognition system has a high performance with a detection rate of 98%, a recognition rate of 99.5%, and a false-positive error rate of 0.152.

Estimation in Group Testing when a Dilution Effect exists

  • Kwon, Se-Hyug
    • Communications for Statistical Applications and Methods
    • /
    • v.13 no.3
    • /
    • pp.787-794
    • /
    • 2006
  • In group testing, the test unit consists of a group of individuals and each group is tested to classify units from a population as infected or non-infected or estimate the infection rate. If the test group is infected, one or more individuals in the group are presumed to be infected. It is assumed in group testing that classification of group as positive or negative is without error. But, the possibility of false negatives as a result of dilution effects happens often in practice, specially in many clinical researches. In this paper, dilution effect models in group testing are discussed and estimation methods of infection rate are proposed when a dilution effect exists.

Exploration of errors in variance caused by using the first-order approximation in Mendelian randomization

  • Kim, Hakin;Kim, Kunhee;Han, Buhm
    • Genomics & Informatics
    • /
    • v.20 no.1
    • /
    • pp.9.1-9.6
    • /
    • 2022
  • Mendelian randomization (MR) uses genetic variation as a natural experiment to investigate the causal effects of modifiable risk factors (exposures) on outcomes. Two-sample Mendelian randomization (2SMR) is widely used to measure causal effects between exposures and outcomes via genome-wide association studies. 2SMR can increase statistical power by utilizing summary statistics from large consortia such as the UK Biobank. However, the first-order term approximation of standard error is commonly used when applying 2SMR. This approximation can underestimate the variance of causal effects in MR, which can lead to an increased false-positive rate. An alternative is to use the second-order approximation of the standard error, which can considerably correct for the deviation of the first-order approximation. In this study, we simulated MR to show the degree to which the first-order approximation underestimates the variance. We show that depending on the specific situation, the first-order approximation can underestimate the variance almost by half when compared to the true variance, whereas the second-order approximation is robust and accurate.

The Unified Framework for AUC Maximizer

  • Jun, Jong-Jun;Kim, Yong-Dai;Han, Sang-Tae;Kang, Hyun-Cheol;Choi, Ho-Sik
    • Communications for Statistical Applications and Methods
    • /
    • v.16 no.6
    • /
    • pp.1005-1012
    • /
    • 2009
  • The area under the curve(AUC) is commonly used as a measure of the receiver operating characteristic(ROC) curve which displays the performance of a set of binary classifiers for all feasible ratios of the costs associated with true positive rate(TPR) and false positive rate(FPR). In the bipartite ranking problem where one has to compare two different observations and decide which one is "better", the AUC measures the quantity that ranking score of a randomly chosen sample in one class is larger than that of a randomly chosen sample in the other class and hence, the function which maximizes an AUC of bipartite ranking problem is different to the function which maximizes (minimizes) accuracy (misclassification error rate) of binary classification problem. In this paper, we develop a way to construct the unified framework for AUC maximizer including support vector machines based on maximizing large margin and logistic regression based on estimating posterior probability. Moreover, we develop an efficient algorithm for the proposed unified framework. Numerical results show that the propose unified framework can treat various methodologies successfully.