• Title/Summary/Keyword: layer detection

Search Result 946, Processing Time 0.025 seconds

Implementation of CAN-based Fire Detection System for Smart Home (스마트 홈을 위한 CAN 기반 화재 감지 시스템의 구현)

  • 이경창;김정희;이홍희
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.734-741
    • /
    • 2004
  • This paper presents a network based fire detection system using CAN, in order to evaluate feasibility of home automation protocol for smart home. In general, because a traditional fire detection system has an analog transmission method with 4-20mA current, it has several shortcomings such as weakness to noise. Hence, as an alternative to the traditional system, this paper presents the architecture of CAN based fire detection system and the design method of CAN communication network. Also, the performance of the suggested system is evaluated through an experimental testbed. Especially, CAN has several advantages such as low cost and easiness of implementation compared to Ethernet or ARCNET, which are low layer of BACNet. Therefore, if CAN is adopted as low layer of BACNet, the home automation system is implemented more effectively.

IoT botnet attack detection using deep autoencoder and artificial neural networks

  • Deris Stiawan;Susanto ;Abdi Bimantara;Mohd Yazid Idris;Rahmat Budiarto
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1310-1338
    • /
    • 2023
  • As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy. Botnet is one of the threats that dominate the attacks as it can easily compromise devices attached to an IoT networks/systems. The compromised devices will behave like the normal ones, thus it is difficult to recognize them. Several intelligent approaches have been introduced to improve the detection accuracy of this type of cyber-attack, including deep learning and machine learning techniques. Moreover, dimensionality reduction methods are implemented during the preprocessing stage. This research work proposes deep Autoencoder dimensionality reduction method combined with Artificial Neural Network (ANN) classifier as botnet detection system for IoT networks/systems. Experiments were carried out using 3- layer, 4-layer and 5-layer pre-processing data from the MedBIoT dataset. Experimental results show that using a 5-layer Autoencoder has better results, with details of accuracy value of 99.72%, Precision of 99.82%, Sensitivity of 99.82%, Specificity of 99.31%, and F1-score value of 99.82%. On the other hand, the 5-layer Autoencoder model succeeded in reducing the dataset size from 152 MB to 12.6 MB (equivalent to a reduction of 91.2%). Besides that, experiments on the N_BaIoT dataset also have a very high level of accuracy, up to 99.99%.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

Studies on Separation, Detection and Quantitation of Estriol, Estrone, Estradiol-17 β in Urine of Dairy Cows by Paper, Thin Layer and Column Chromatography (Paper, Thin Layer 및 Column Chromatography에 의한 요중의 Estriol, Estrone, Estadiol-17 β의 분리 정량에 관하여)

  • Yang, Yong Kwan;Han, Soo Nam;Cho, Jong Hoo
    • Korean Journal of Veterinary Research
    • /
    • v.13 no.1
    • /
    • pp.23-30
    • /
    • 1973
  • Thin layer, paper and column chromatography were compared for the separation, detection and quantitation of three kinds of estrogen in urine of dairy cows. While thin layer chromatography utilizing silica gel was better for the detection of estrogens, column chromatography using celite 545 was preferable. Spectrophotometry was compared with fluorometry for determination of estrone, estradiol-17 ${\beta}$ and estriol eluted by paper chromatography and column chromatography. Optical density of three standard estrogens showed almost same curve at maximum absorption wave length of 230 and $282m{\mu}$. However, the former showed a higher peak. In fluorometry, the fluorescence intensity of estrone and estradiol-17 ${\beta}$ were rather strong, when the estrogens were dissolved in sulfuric acid, and showed higher sensitivity than that of the spectrophotometry. However, in the case of estriol was exceptional.

  • PDF

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

Graph-based Moving Object Detection and Tracking in an H.264/SVC bitstream domain for Video Surveillance (감시 비디오를 위한 H.264/SVC 비트스트림 영역에서의 그래프 기반 움직임 객체 검출 및 추적)

  • Sabirin, Houari;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.298-301
    • /
    • 2012
  • This paper presents a graph-based method of detecting and tracking moving objects in H.264/SVC bitstreams for video surveillance applications that makes use the information from spatial base and enhancement layers of the bitstreams. In the base layer, segmentation of real moving objects are first performed using a spatio-temporal graph by removing false detected objects via graph pruning and graph projection, followed by graph matching to precisely identify the real moving objects over time even under occlusion. For the accurate detection and reliable tracking of moving objects in the enhancement layer, as well as saving computational complexity, the identified block groups of the real moving objects in the base layer are then mapped to the enhancement layer to provide accurate and efficient object detection and tracking in the bitstreams of higher resolution. Experimental results show the proposed method can produce reliable results with low computational complexity in both spatial layers of H.264/SVC test bitstreams.

  • PDF

Surface Plasmon Resonance Immunosensor for Detection of Legionella pneumophila

  • Oh, Byung-Keun;Lee, Woochang;Bae, Young-Min;Lee, Won-Hong;Park, Jeong-Woo
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.8 no.2
    • /
    • pp.112-116
    • /
    • 2003
  • An immunosensor based on surface plasmon resonance (SPR) onto a protein G layer by Self-assembly technique was developed for detection of Legionella pneumophila. The protein G layer by self-assembly technique was fabricated on a gold (Au) surface by adsorbing the 11-mercaptoundecanoic acid (MUA) and an activation process for the chemical binding of the free amino (-NH$_2$) of protein G and 11-(MUA) using 1-ethyl-3-(3-dimethylaminopropyl)carbodiimide hydrochloride (EDAC) in series. The formation of the protein G layer by self-assembly technique on the Au Substrate and the binding of the antibody and antigen in series were confirmed by SPR spectroscopy. The Surface topographies of the fabricated thin films on an Au substrate were also analyzed by using an atomic force microscope (AFM). Consequently, an immunosensor for the detection of L. pneumophila using SPR was developed with a detection limit of up to 10$^2$CFU per mL.

Vibration-based delamination detection of composites using modal data and experience-based learning algorithm

  • Luo, Weili;Wang, Hui;Li, Yadong;Liang, Xing;Zheng, Tongyi
    • Steel and Composite Structures
    • /
    • v.42 no.5
    • /
    • pp.685-697
    • /
    • 2022
  • In this paper, a vibration-based method using the change ratios of modal data and the experience-based learning algorithm is presented for quantifying the position, size, and interface layer of delamination in laminated composites. Three types of objective functions are examined and compared, including the ones using frequency changes only, mode shape changes only, and their combination. A fine three-dimensional FE model with constraint equations is utilized to extract modal data. A series of numerical experiments is carried out on an eight-layer quasi-isotropic symmetric (0/-45/45/90)s composited beam for investigating the influence of the objective function, the number of modal data, the noise level, and the optimization algorithms. Numerical results confirm that the frequency-and-mode-shape-changes-based technique yields excellent results in all the three delamination variables of the composites and the addition of mode shape information greatly improves the accuracy of interface layer prediction. Moreover, the EBL outperforms the other three state-of-the-art optimization algorithms for vibration-based delamination detection of composites. A laboratory test on six CFRP beams validates the frequency-and-mode-shape-changes-based technique and confirms again its superiority for delamination detection of composites.

Etching-Bonding-Thin film deposition Process for MEMS-IR SENSOR Application (MEMS-IR SENSOR용 식각-접합-박막증착 기반공정)

  • Park, Yun-Kwon;Joo, Byeong-Kwon;Park, Heung-Woo;Park, Jung-Ho;Yom, S.S.;Suh, Sang-Hee;Oh, Myung-Hwan;Kim, Chul-Ju
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2501-2503
    • /
    • 1998
  • In this paper, the silicon-nitride membrane structure for IR sensor was fabricated through the etching and the direct bonding. The PTO layer as a IR detection layer was deposited on the membrane and its characteristics were measured. The attack of PTO layer during the etching of silicon wafer as well as the thermal isolation of the IR detection layer can be solved through the method of bonding/etching of silicon wafer. Because the PTO layer of c-axial orientation raised thermal polarization without polling, the more integration capability can be achieved. The surface roughness of the membrane was measured by AFM, the micro voids and the non-contacted area were inspected by IR detector, and the bonding interface was observed by SEM. The polarization characteristics and the dielectric characteristics of the PTO layer were measured, too.

  • PDF

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.