• Title/Summary/Keyword: intrusion complex

Search Result 63, Processing Time 0.023 seconds

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.5_6
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Intrusion Detection System Model using agent teaming in network (네트워크에서 에이전트 학습을 이용한 침입탐지시스템 모델)

  • 정종근;김용호;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1346-1351
    • /
    • 2002
  • It is very complex to construct Intrusion Detection System in distributed network environment than simple ones. Especially, In the collecting and analysis of logdata from out different operating system break out much problem. So In this paper, We present a Intrusion Detection System model applying agent teaming system to solve these problem. We apply the data Mining algorithm for agent learning.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

The Overview of Layered structures in Mafic - Ultramafic Macheon Intrusion (고철질-초고철질 마천관입암의 층상구조 개관)

  • Song, Yong-Sun;Kim, Dong-Yeon;Park, Kye-Hun
    • The Journal of the Petrological Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.162-179
    • /
    • 2007
  • Macheon Layered Intrusion (MLI) which intruded into Precambrian gneiss complex of the northern Jirisan area, southeastern part of Youngnam (or Sobaeksan) Massif, is a layered mafic-ultramafic complex of Triassic age (ca. 223 Ma). The MLI is divided into Layered Series and Laminated Series. Layered Series is subdivided into Central Zone (Lower Zone) consisting of olivine gabbros and Peripheral Zone (Middle or Upper Zone) consisting of hornblende gabbros based on the type of cumulus texture and the main mafic phase. The Central Zone of Layered Series comprises thinly laminated olivine gabbros and uniform or thickly laminated coarse olivine gabbros which consist of mela-gabbro, troctolite, leuco-troctolite, and anorthositic rocks. Laminated Series is also subdivided into quartz-bearing biotite-pyroxene gabbros and homblende diorite and both have variable amount of interstitial quartz and microcline. Laminated series display moderately to slightly developed igneous lamination which is defined by the planar alignment of lath-shape plagioclases. Chilled margin of quartz-bearing biotite-pyroxene gabbro with surrounding Precambrian gneisses insists shallower intrusion of more felsic cognate magma evolved in the deep a little later. Rocks of Layered Series have orthocumulus to adcumulus olivine, adcumulus to intercumulus plagioclase, and intercumulus to heteradcumulus pyroxene and hornblende. Magmatic modally grading, folding, and cross-lamination are not rarely occurred in thinly layered rocks. These textural characteristics define main mechanisms of the formation of layered and laminated structure in mafic-ultramafic rocks of Macheon Layered Intrusion are gravity settling and in-situ crystallization associated with slumping and density current.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

간접 골성고정원(indirect skeletal anchorage)을 이용한 상악구치 압하

  • Chun, Youn-Sic;Chang, Yeon-Joo
    • The Journal of the Korean dental association
    • /
    • v.42 no.1 s.416
    • /
    • pp.7-14
    • /
    • 2004
  • Molar extrusion is a quite common problem in prosthodontic patients. It is caused due to the loss or infraocclusion of opposing teeth. A more conservative approach than reduction of the coronal part of extruded tooth is to intrude the malaligned molar orthodontically. Several authors have presented the cases of molar intrusion, by cither removable or fixed appliances. However, the design of those appliances was complex so that many teeth were included as an anchorage unit. This increased the patient's discomfort inevitably. Moreover, the results could be unpredictable. Instead of these conventional methods, skeletal anchorage has been suggested for ideal force system to intrude a molar without any side effects. Many recent clinical reports presented the cases using microscrew or miniplate as a direct anchorage, which included some limitation. The purpose of this report is to introduce the indirect skeletal anchorage for intrusion of extruded maxillary molar.

  • PDF

Application of stoichiometric method in the assessment of groundwater chemistry in a coastal region having complex contaminant sources

  • Rajmohan Natarajan;Kim, Kang-Joo;Hwang, Gab-Soo;Kim, Hyun-Jung;Cho, Min-Joe
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.04a
    • /
    • pp.499-502
    • /
    • 2004
  • Groundwater chemistry in a coastal region having complex contaminant sources was investigated. Water analysis data for 197 groundwater samples collected from the uniformly distributed sixty-six wells were used. Chemical analysis rand results indicate that groundwaters show wide concentration ranges in major inorganic ions, reflecting complex hydrochemical processes of pollutants. Due to the complexity of groundwater chemistry, Results illustrate that thirty five percent of the wells do not fit for drinking based on nitrate and chloride concentration in the study area. the samples were classified into four groups based on Cl and NO$_3$ concentrations and the processes controlling water chemistry were evaluated based on the reaction stoichiometry. The results explained the importance of mineral weathering, anthropogenic activities (nitrification and oxidation of organic matters), and Cl-salt inputs (seawater, deicer, NaCl, etc.) on groundwater chemistry. It was revealed that mineral dissolution is the major process controlling the water chemistry of the low Cl and NO$_3$ group (Group 1). Groundwaters high in NO$_3$ (Groups 2 and 4) are acidic in nature, and their chemistry is largely influenced by nitrification, oxidation of organic matters and mineral dissolution. In the case of chloride rich waters (Group 3), groundwater chemistry is highly influenced by mineral weathering and seawater intrusion associated with cation-exchange reactions.

  • PDF