• 제목/요약/키워드: intrusion complex

검색결과 65건 처리시간 0.025초

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • 제52권12호
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

보안 모델의 연동을 위한 블랙보드구조의 적용 (An Application of Blackboard Architecture for the Coordination among the Security Systems)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제11권4호
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • 제30권5_6호
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

네트워크에서 에이전트 학습을 이용한 침입탐지시스템 모델 (Intrusion Detection System Model using agent teaming in network)

  • 정종근;김용호;이윤배
    • 한국정보통신학회논문지
    • /
    • 제6권8호
    • /
    • pp.1346-1351
    • /
    • 2002
  • 분산된 네트워크 환경에서 침입탐지시스템을 구축하는 일은 단일 환경에서보다 매우 복잡하다. 특히, 각기 다른 운영체제시스템에서 발생하는 로그데이터의 수집과 분석 등에서 많은 문제가 발생한다. 따라서 본 논문에서는 이러한 문제를 해결하고자 에이전트 학습 시스템을 적용한 침입탐지시스템 모델을 제시한다. 에이전트 학습을 위한 알고리즘으로는 데이터 마이닝 알고리즘을 적용한다.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

고철질-초고철질 마천관입암의 층상구조 개관 (The Overview of Layered structures in Mafic - Ultramafic Macheon Intrusion)

  • 송용선;김동연;박계헌
    • 암석학회지
    • /
    • 제16권3호
    • /
    • pp.162-179
    • /
    • 2007
  • 영남(소백산)육괴의 남서부인 지리산지역의 북서부에 선캠브리아 편마암 복합체를 트라이아스기(약 223 Ma)에 관입한 마천층상관입암은 크게 층상계열과 엽상계열의 두 그룹으로 구분되는 고철질-초고철질 암석들로 구성되어 있으며, 마그마혼합의 특성을 잘 보이는 암맥상의 고철질 암이 수반된다. 층상계열은 누적조직의 특성과 주구성 유색광물의 종류에 의해 중앙부의 감람석 반려암대(하부대)와 주변부의 각섬석 반려암대(중 내지 상부대피 두 부분으로 다시 세분된다. 중앙부의 감람석 반려암은 비교적 얇은 우흑질과 우백질의 층들이 규칙적으로 교호된 중립질 반려암질 암과 균질하고 두꺼운 층상구조를 이룬 조립질 반려암질 암들이 서로 협재되어 있으며, 주구성 암종은 우흑질 반려암, 트록토라이트, 우백질 트록토라이트, 사장암질암 등으로 감람석과 사장석이 주구성 광물이다. 엽상계열은 함석영 흑운모휘석 반려암과 보다 분화된 특성의 각섬석 섬록암으로 분류되며 간극상로 산출되는 소량의 석영과 미사장석을 포함하고 있다 주변의 선캠브리아 편마암류와의 접촉대에 냉각대가 발달되어 있어 심부에서 보다 분화된 동원성 마그마가 어느 정도 시간적인 간격을 갖고 좀 더 냉각된 환경에서 관입한 것으로 보인다. 층상계열에 발달된 층상구조는 감람석은 주로 정누적구조 내지 부가누적구조, 사장석은 부가누적 내지 간극누적구조를 보이며, 단사휘석과 각섬석은 간극누적 내지 이형부가누적조직을 이루고 있다. 층상암들에서 마그마작용동안 생성된 습곡구조, 점이층리, 사층리 등이 드물지 않게 산출된다. 마천층상관입암체에 발달된 층상구조와 엽상구조가 주로 중력침전과 제자리 결정작용에 의해 생성되었으며 슬럼핑과 밀도류 흐름작용도 상당한 역할을 하였을 것으로 해석된다.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권5호
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

간접 골성고정원(indirect skeletal anchorage)을 이용한 상악구치 압하

  • 전윤식;장연주
    • 대한치과의사협회지
    • /
    • 제42권1호통권416호
    • /
    • pp.7-14
    • /
    • 2004
  • Molar extrusion is a quite common problem in prosthodontic patients. It is caused due to the loss or infraocclusion of opposing teeth. A more conservative approach than reduction of the coronal part of extruded tooth is to intrude the malaligned molar orthodontically. Several authors have presented the cases of molar intrusion, by cither removable or fixed appliances. However, the design of those appliances was complex so that many teeth were included as an anchorage unit. This increased the patient's discomfort inevitably. Moreover, the results could be unpredictable. Instead of these conventional methods, skeletal anchorage has been suggested for ideal force system to intrude a molar without any side effects. Many recent clinical reports presented the cases using microscrew or miniplate as a direct anchorage, which included some limitation. The purpose of this report is to introduce the indirect skeletal anchorage for intrusion of extruded maxillary molar.

  • PDF

Application of stoichiometric method in the assessment of groundwater chemistry in a coastal region having complex contaminant sources

  • Rajmohan Natarajan;Kim, Kang-Joo;Hwang, Gab-Soo;Kim, Hyun-Jung;Cho, Min-Joe
    • 한국지하수토양환경학회:학술대회논문집
    • /
    • 한국지하수토양환경학회 2004년도 총회 및 춘계학술발표회
    • /
    • pp.499-502
    • /
    • 2004
  • Groundwater chemistry in a coastal region having complex contaminant sources was investigated. Water analysis data for 197 groundwater samples collected from the uniformly distributed sixty-six wells were used. Chemical analysis rand results indicate that groundwaters show wide concentration ranges in major inorganic ions, reflecting complex hydrochemical processes of pollutants. Due to the complexity of groundwater chemistry, Results illustrate that thirty five percent of the wells do not fit for drinking based on nitrate and chloride concentration in the study area. the samples were classified into four groups based on Cl and NO$_3$ concentrations and the processes controlling water chemistry were evaluated based on the reaction stoichiometry. The results explained the importance of mineral weathering, anthropogenic activities (nitrification and oxidation of organic matters), and Cl-salt inputs (seawater, deicer, NaCl, etc.) on groundwater chemistry. It was revealed that mineral dissolution is the major process controlling the water chemistry of the low Cl and NO$_3$ group (Group 1). Groundwaters high in NO$_3$ (Groups 2 and 4) are acidic in nature, and their chemistry is largely influenced by nitrification, oxidation of organic matters and mineral dissolution. In the case of chloride rich waters (Group 3), groundwater chemistry is highly influenced by mineral weathering and seawater intrusion associated with cation-exchange reactions.

  • PDF