• Title/Summary/Keyword: threat classification

Search Result 99, Processing Time 0.025 seconds

Object classification and the number of pixels compared with children protection (화소 수 비교를 통한 성인과 유아 구분 방법)

  • Kang, ji-hun;Kim, chang-dae;Ryu, sung-pil;Kim, dong-woo;Ahn, jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.725-728
    • /
    • 2014
  • Continue to have an increasingly violent crimes against children every year, and as you know all seriousness is classified as a felony. However, efforts to reduce the underlying crime is low. Therefore, it is necessary to solve this problem, the security system. Is to protect the children and adults that exist that can pose a threat to children to identify and monitor tracking method in this paper. Was based on a Korean standard body size of a person, such as keys, arm length, leg length, head vertical length, head width proposed method. Also, separate the adults and children through the comparison of the reference value, the ratio and the ratio of the number of pixels of the detected object, the proposed method. Processing speed is fast because it detects only a specific object region in the entire image in the handling method in the proposed method the five nine minutes. The advantage is to enable comparison of the specific object, through which there is.

  • PDF

Evaluation of Predictability of Global/Regional Integrated Model System (GRIMs) for the Winter Precipitation Systems over Korea (한반도 겨울철 강수 유형에 따른 전지구 수치모델(GRIMs) 예측성능 검증)

  • Yeon, Sang-Hoon;Suh, Myoung-Suk;Lee, Juwon;Lee, Eun-Hee
    • Atmosphere
    • /
    • v.32 no.4
    • /
    • pp.353-365
    • /
    • 2022
  • This paper evaluates precipitation forecast skill of Global/Regional Integrated Model system (GRIMs) over South Korea in a boreal winter from December 2013 to February 2014. Three types of precipitation are classified based on development mechanism: 1) convection type (C type), 2) low pressure type (L type), and 3) orographic type (O type), in which their frequencies are 44.4%, 25.0%, and 30.6%, respectively. It appears that the model significantly overestimates precipitation occurrence (0.1 mm d-1) for all types of winter precipitation. Objective measured skill scores of GRIMs are comparably high for L type and O type. Except for precipitation occurrence, the model shows high predictability for L type precipitation with the most unbiased prediction. It is noted that Equitable Threat Score (ETS) is inappropriate for measuring rare events due to its high dependency on the sample size, as in the case of Critical Success Index as well. The Symmetric Extreme Dependency Score (SEDS) demonstrates less sensitivity on the number of samples. Thus, SEDS is used for the evaluation of prediction skill to supplement the limit of ETS. The evaluation via SEDS shows that the prediction skill score for L type is the highest in the range of 5.0, 10.0 mm d-1 and the score for O type is the highest in the range of 1.0, 20.0 mm d-1. C type has the lowest scores in overall range. The difference in precipitation forecast skill by precipitation type can be explained by the spatial distribution and intensity of precipitation in each representative case.

Prediction of Longline Fishing Activity from V-Pass Data Using Hidden Markov Model

  • Shin, Dae-Woon;Yang, Chan-Su;Harun-Al-Rashid, Ahmed
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.73-82
    • /
    • 2022
  • Marine fisheries resources face major anthropogenic threat from unregulated fishing activities; thus require precise detection for protection through marine surveillance. Korea developed an efficient land-based small fishing vessel monitoring system using real-time V-Pass data. However, those data directly do not provide information on fishing activities, thus further efforts are necessary to differentiate their activity status. In Korea, especially in Busan, longlining is practiced by many small fishing vessels to catch several types of fishes that need to be identified for proper monitoring. Therefore, in this study we have improved the existing fishing status classification method by applying Hidden Markov Model (HMM) on V-Pass data in order to further classify their fishing status into three groups, viz. non-fishing, longlining and other types of fishing. Data from 206 fishing vessels at Busan on 05 February, 2021 were used for this purpose. Two tiered HMM was applied that first differentiates non-fishing status from the fishing status, and finally classifies that fishing status into longlining and other types of fishing. Data from 193 and 13 ships were used as training and test datasets, respectively. Using this model 90.45% accuracy in classifying into fishing and non-fishing status and 88.23% overall accuracy in classifying all into three types of fishing statuses were achieved. Thus, this method is recommended for monitoring the activities of small fishing vessels equipped with V-Pass, especially for detecting longlining.

Identification and classification of pathogenic Fusarium isolates from cultivated Korean cucurbit plants

  • Walftor Bin Dumin;You-Kyoung Han;Jong-Han Park;Yeoung-Seuk Bae;Chang-Gi Back
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.1
    • /
    • pp.121-128
    • /
    • 2022
  • Fusarium wilt disease caused by Fusarium species is a major problem affecting cultivated cucurbit plants worldwide. Fusarium species are well-known soil-borne pathogenic fungi that cause Fusarium wilt disease in several cucurbit plants. In this study, we aimed to identify and classify pathogenic Fusarium species from cultivated Korean cucurbit plants, specifically watermelon and cucumber. Thirty-six Fusarium isolates from different regions of Korea were obtained from the National Institute of Horticulture and Herbal Science Germplasm collection. Each isolate was morphologically and molecularly identified using an internal transcribed spacer of ribosomal DNA, elongation factor-1α, and the beta-tubulin gene marker sequence. Fusarium species that infect the cucurbit plant family could be divided into three groups: Fusarium oxysporum (F. oxysporum), Fusarium solani (F. solani), and Fusarium equiseti (F. equieti). Among the 36 isolates examined, six were non-pathogenic (F. equiseti: 15-127, F. oxysporum: 14-129, 17-557, 17-559, 18-369, F. solani: 12-155), whereas 30 isolates were pathogenic. Five of the F. solani isolates (11-117, 14-130, 17-554, 17-555, 17-556) were found to be highly pathogenic to both watermelon and cucumber plants, posing a great threat to cucurbit production in Korea. The identification of several isolates of F. equiseti and F. oxysporum, which are both highly pathogenic to bottle gourd, may indicate waning resistance to Fusarium species infection.

A Study on Effective Interpretation of AI Model based on Reference (Reference 기반 AI 모델의 효과적인 해석에 관한 연구)

  • Hyun-woo Lee;Tae-hyun Han;Yeong-ji Park;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.411-425
    • /
    • 2023
  • Today, AI (Artificial Intelligence) technology is widely used in various fields, performing classification and regression tasks according to the purpose of use, and research is also actively progressing. Especially in the field of security, unexpected threats need to be detected, and unsupervised learning-based anomaly detection techniques that can detect threats without adding known threat information to the model training process are promising methods. However, most of the preceding studies that provide interpretability for AI judgments are designed for supervised learning, so it is difficult to apply them to unsupervised learning models with fundamentally different learning methods. In addition, previously researched vision-centered AI mechanism interpretation studies are not suitable for application to the security field that is not expressed in images. Therefore, In this paper, we use a technique that provides interpretability for detected anomalies by searching for and comparing optimization references, which are the source of intrusion attacks. In this paper, based on reference, we propose additional logic to search for data closest to real data. Based on real data, it aims to provide a more intuitive interpretation of anomalies and to promote effective use of an anomaly detection model in the security field.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

A Study on the Threat Analysis and Risk Assessment of Ship Ballast Water System (선박 평형수 시스템의 위협 분석 및 위험 평가에 관한 연구)

  • Hyoseok Lim;Yonghyun Jo;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.961-972
    • /
    • 2024
  • As IT and OT systems become integrated into ship operations, the security of propulsion, control, communication, and navigation systems has become increasingly critical. In response, the International Association of Classification Societies (IACS) will enforce cybersecurity requirements starting from July 2024. IACS No. 171 (Recommendations on Incorporating Cyber Risk Management into Safety Management Systems) presents quantitative assessment methods; however, there is room for improvement. This study aims to address these issues by applying the TARA framework, outlined in ISO/SAE 21434 for connected vehicles, to identify attack surfaces and conduct risk assessments of the Ballast Water Treatment System(BWTS), which is crucial for navigational safety. Moreover, the study conducts a comparative analysis of the quantitative risk assessments of IACS No. 171 and the TARA framework, proposing the need for and considerations of a new risk assessment framework, VeTARA, specifically tailored for ships. This research is expected to contribute to the enhancement of cyber risk management in maritime operations.

The application of Fourier transform near infrared (FT-NIR) spectroscopy in the wine industry of South Africa

  • Van Zyl, Anina;Manley, Marena;Wolf, Erhard E.H.
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1257-1257
    • /
    • 2001
  • Fourier transform near infrared (FT-NIR) spectroscopy was used as a rapid method to measure the $^{o}Brix$ content and to discriminate between different must samples in terms of their fee amino nitrogen (FAN) values. FT-NIR spectroscopy was also used as a rapid method to discriminate between Chardonnay wine samples in terms of the status of the male-lactic fermentation (MLF). This was done by monitoring the conversion of malic to lactic acid and thereby determining whether MLF has started, is underway or has been completed followed by classification of the samples. Furthermore, FT-NIR spectroscopy was applied as a rapid method to discriminate between table wine samples in terms of the ethyl carbamate (EC) content. EC in wine can pose a health threat and need to be monitored by determining the EC content in relation to the regulatory limits set by the authorities. For each of the above mentioned parameters, $QUANT+^{TM}$ methods were built and calibrations derived and it was found that a very strong correlation existed in the sample set for the FT-NIR spectroscopic predictions of $^{o}Brix$ (r = 0.99, SECV = 0.306), but the correlations for the FAN (r = 0.61, SECV = 272.1), malic acid (r = 0.58, SECV = 1.06), lactic acid (r = 0.51, SECV = 1.14) and EC predictions (r = 0.47, SECV = 3.67) were not as good. Soft Independent Modeling by Class Analogy (SIMCA) diagnostics and validation was applied as a sophisticated discrimination method. The must samples could be classified in terms of their FAN values when SIMCA was applied, obtaining results with recognition rates exceeding 80%. When SIMCA diagnostics and validation were applied to determine the progress of conversion of malic to lactic acid and the EC content, again results with recognition rates exceeding 80% were obtained. The evaluation of the applicability of FT-NIR spectroscopy measurement of FAN, $^{o}Brix$ values, malic acid, lactic acid and EC content in must and wine shows considerable promise. FT-NIR spectroscopy has the potential to reduce the analytical times considerably in a range of measurements commonly used during the wine making process. Where conventional FT-NIR calibrations are not effective, SIMCA methods can be used as a discriminative method for rapid classification of samples. SIMCA can replace expensive, time-consuming, quantitative analytical methods, if not completely, at least to some extent, because in many processes it is only needed to know whether a specific cut off point has been reach or not or whether a sample belongs to a certain class or not.

  • PDF

Visualization of Malwares for Classification Through Deep Learning (딥러닝 기술을 활용한 멀웨어 분류를 위한 이미지화 기법)

  • Kim, Hyeonggyeom;Han, Seokmin;Lee, Suchul;Lee, Jun-Rak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.67-75
    • /
    • 2018
  • According to Symantec's Internet Security Threat Report(2018), Internet security threats such as Cryptojackings, Ransomwares, and Mobile malwares are rapidly increasing and diversifying. It means that detection of malwares requires not only the detection accuracy but also versatility. In the past, malware detection technology focused on qualitative performance due to the problems such as encryption and obfuscation. However, nowadays, considering the diversity of malware, versatility is required in detecting various malwares. Additionally the optimization is required in terms of computing power for detecting malware. In this paper, we present Stream Order(SO)-CNN and Incremental Coordinate(IC)-CNN, which are malware detection schemes using CNN(Convolutional Neural Network) that effectively detect intelligent and diversified malwares. The proposed methods visualize each malware binary file onto a fixed sized image. The visualized malware binaries are learned through GoogLeNet to form a deep learning model. Our model detects and classifies malwares. The proposed method reveals better performance than the conventional method.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.