• Title/Summary/Keyword: 변화탐지

Search Result 1,260, Processing Time 0.063 seconds

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders (비지도학습 오토 엔코더를 활용한 네트워크 이상 검출 기술)

  • Kang, Koohong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.617-629
    • /
    • 2020
  • In order to overcome the limitations of the rule-based intrusion detection system due to changes in Internet computing environments, the emergence of new services, and creativity of attackers, network anomaly detection (NAD) using machine learning and deep learning technologies has received much attention. Most of these existing machine learning and deep learning technologies for NAD use supervised learning methods to learn a set of training data set labeled 'normal' and 'attack'. This paper presents the feasibility of the unsupervised learning AutoEncoder(AE) to NAD from data sets collecting of secured network traffic without labeled responses. To verify the performance of the proposed AE mode, we present the experimental results in terms of accuracy, precision, recall, f1-score, and ROC AUC value on the NSL-KDD training and test data sets. In particular, we model a reference AE through the deep analysis of diverse AEs varying hyper-parameters such as the number of layers as well as considering the regularization and denoising effects. The reference model shows the f1-scores 90.4% and 89% of binary classification on the KDDTest+ and KDDTest-21 test data sets based on the threshold of the 82-th percentile of the AE reconstruction error of the training data set.

High Resolution InSAR Phase Simulation using DSM in Urban Areas (도심지역 DSM을 이용한 고해상도 InSAR 위상 시뮬레이션)

  • Yoon, Geun-Won;Kim, Sang-Wan;Lee, Yong-Woong;Lee, Dong-Cheon;Won, Joong-Sun
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.2
    • /
    • pp.181-190
    • /
    • 2011
  • Since the radar satellite missions such as TerraSAR-X and COSMO-SkyMed were launched in 2007, the spatial resolution of spaceborne SAR(Synthetic Aperture Radar) images reaches about 1 meter at spotlight mode. In 2011, the first Korean SAR satellite, KOMPSAT-5, will be launched, operating at X-band with the highest spatial resolution of 1 m as well. The improved spatial resolution of state-of-the-art SAR sensor suggests expanding InSAR(Interferometric SAR) analysis in urban monitoring. By the way, the shadow and layover phenomena are more prominent in urban areas due to building structure because of inherent side-looking geometry of SAR system. Up to date the most conventional algorithms do not consider the return signals at the frontage of building during InSAR phase and SAR intensity simulation. In this study the new algorithm introducing multi-scattering in layover region is proposed for phase and intensity simulation, which is utilized a precise LIDAR DSM(Digital Surface Model) in urban areas. The InSAR phases simulated by the proposed method are compared with TerraSAR-X spotlight data. As a result, both InSAR phases are well matched, even in layover areas. This study will be applied to urban monitoring using high resolution SAR data, in terms of change detection and displacement monitoring at the scale of building unit.

Analysis of Performance Requirements of Mechanical System for Recovery of Deposited Hazardous and Noxious Substances from Seabed around Seaport (항만 해저침적 위험유해물질(HNS) 회수용 기계장치의 성능요건 분석)

  • Hwang, Ho-Jin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.6
    • /
    • pp.681-688
    • /
    • 2020
  • Approximately 6,000 chemicals are transported through the sea, including hazardous and noxious substances (HNS), which cause marine pollution and are harmful to marine life. The HNS discharged into the sea during the maritime transportation process undergoes physical and chemical changes on the sea surface and in seawater, and some types of HNS sink and are deposited on the seabed. The HNS deposited on the seabed adversely affects the benthic ecosystem, and hence, it is desirable to detect, treat, and recover the HNS on the seabed. Therefore, this study was conducted to analyze the performance requirements that should be considered as the top priority when developing a mechanical system for recovering the HNS deposited on the seabed. Various types of existing dredging devices used for collecting and recovering pollutants from river beds and seabeds were investigated, and 10 performance indices for the mechanical devices were selected. The new performance requirements for the development of the seabed-deposited HNS recovery system were proposed using performance indices. By considering the depth of water in domestic seaports, some of the performance requirements of the mechanical system for recovering deposited HNS from the seabed were obtained as follows: production rate (50-300 ㎥/hr), maximum operation depth (50 m), sediment type (most forms), percentage of solids (10 % or higher), horizontal operating accuracy (±10 cm), limiting currents (3-5 knots). These performance requirements are expected to be useful in the conceptual and basic design of mechanical systems for recovering seabed-deposited HNS.

Memory in visual search: Evidence from search efficiency (시각 탐색에서의 기억: 탐색 효율성에 근거한 증거)

  • Baek Jongsoo;Kim Min-Shik
    • Korean Journal of Cognitive Science
    • /
    • v.16 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • Since human visual system has limited capacity for visual information processing, it should select goal-relevant information for further processing. There have been several studies that emphasized the possible involvement of memory in spatial shift of selective attention (Chun & Jiang, 1998, 1999; Klein, 1988; Klein & MacInnes, 1999). However, other studies suggested the inferiority of human visual memory in change detection(Rensink, O'Regan, & Clark, 1997; Simons & Levin, 1997) and in visual search(Hotowitz & Wolfe, 1998). The present study examined the involvement of memory in visual search; whether memory for the previously searched items guides selective attentional shift or not. We investigated how search works by comparing visual search performances in three different conditions; full exposure condition, partial exposure condition, and partial-to-full exposure condition. Revisiting searched items was allowed only in full exposure condition and not in either partial or partial-to-full exposure condition. The results showed that the efficiencies of attentional shift were nearly identical for all conditions. This finding implies that even in full exposure condition the participants scarcely re-examined the previously searched items. The results suggest that instant memory can be formed and used in visual search process. These results disagree with the earlier studies claiming thar visual search has no memory. We discussed the problems of the previous research paradigms and suggested some alternative accounts.

  • PDF

A Comparative Study of Sea Trials and Production Processes for Propulsion Type Working Boats with a Tuna Purse Seiner (다랑어 선망어선 탑재용 보조 작업선의 추진기 형태 변화에 대한 제작과정 및 해상시운전 비교 연구)

  • Ha, Seoung-Mu;Jang, Ho-Yun;Seo, Hyoung-Seock;Seo, Kwan-Cheol
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.5
    • /
    • pp.595-602
    • /
    • 2017
  • In Korea, much research and development have occurred to enhance the technological competitiveness of tuna purse seining fisheries. Due to these efforts, fishing efficiency has been improved with the development of radar, sonar and global positioning systems for fish detection and revisions to the hull forms of tuna purse seiners. However, for skiff boats, net boats and speed boats, which are auxiliary working boats mounted on tuna purse seiners, technology has lagged behind relative to the modernization of the main vessel. In this study, the hull of an existing propeller-based net boat with steel wire net to protect tuna was changed to the hull of a water jet propulsion vehicle to reduce resistance and improve maneuverability. As a result, a prototype of a water jet propulsion option was produced according to the aluminum structure strength standards specified by the Ministry of Oceans and Fisheries, and safety was confirmed by performing a drop test. Moreover, through a sea trial test, an existing net boat was shown to have a speed of 12.0knots and a towing force of 2,545 kgf at 2,500 RPM. The prototype had a speed of 26.7 knots and a towing force of 2,011 kgf at 3,200 RPM, which satisfied the towing capacity standards of auxiliary working boats mounted on tuna purse seiners.

Affective Priming Effect on Cognitive Processes Reflected by Event-related Potentials (ERP로 확인되는 인지정보 처리에 대한 정서 점화효과)

  • Kim, Choong-Myung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.242-250
    • /
    • 2016
  • This study was conducted to investigate whether Stroop-related cognitive task will be affected according to the preceding affective valence factored by matchedness in response time(RT) and whether facial recognition will be indexed by specific event-related potentials(ERPs) signature in normal person as in patients suffering from affective disorder. ERPs primed by subliminal(30ms) facial stimuli were recorded when presented with four pairs of affect(positive or negative) and cognitive task(matched or mismatched) to get ERP effects(N2 and P300) in terms of its amplitude and peak latency variations. Behavioral response analysis based on RTs confirmed that subliminal affective stimuli primed the target processing in all affective condition except for the neutral stimulus. Additional results for the ERPs performed in the negative affect with mismatched condition reached significance of emotional-face specificity named N2 showing more amplitude and delayed peak latency compared to the positive counterpart. Furthermore the condition shows more positive amplitude and earlier peak latency of P300 effect denoting cognitive closure than the corresponding positive affect condition. These results are suggested to reflect that negative affect stimulus in subliminal level is automatically inhibited such that this effect had influence on accelerating detection of the affect and facilitating response allowing adequate reallocation of attentional resources. The functional and cognitive significance with these findings was implied in terms of subliminal effect and affect-related recognition modulating the cognitive tasks.

A Method for Maintaining Mobile Transaction Serializability using Lock Operation and Serialization Graph in Mobile Computing Environments (이동 컴퓨팅 환경에서 록 연산과 직렬화 그래프를 이용한 이동 트랜잭션의 직렬성 유지 방법)

  • Kim, Dae-In;Hwang, Bu-Hyeon;Hwang, Bu-Hyeon
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.9
    • /
    • pp.1073-1084
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 이동 호스트는 제한된 대역폭을 효율적으로 사용하고 이동 트랜잭션의 응답 시간을 향상시키기 위하여 캐쉬를 이용한다. 그리고 이동 호스트에 캐슁된 데이타가 이동 지구국에서 갱신되면 이동 호스트의 캐쉬 일관성을 유지하기 위하여 이동 지구국은 무효화 메시지를 방송한다. 그러나 이동 지구국에서 주기적으로 무효화 메시지를 방송하는 방법은 이동 트랜잭션의 빠른 처리를 위하여 이동 지구국으로부터 데이타를 즉시 캐슁하는 경우에 이동 트랜잭션의 직렬가능한 수행을 보장할 수 없는 경우가 발생한다. 본 연구에서는 캐슁된 데이타를 이용하여 이동 트랜잭션을 수행하는 경우에 록을 이용하여 이동 트랜잭션의 직렬가능한 수행을 보장하는 UCL-MT 방법과 록 관리 방법을 제안한다. 제안하는 UCL-MT 방법은 이동 트랜잭션을 완료하기 이전에 이동 트랜잭션이 접근한 데이타 정보를 이용하여 지구국에서 사이클을 탐지함으로써 이동 트랜잭션의 직렬가능한 수행을 보장한다. 또한 제안하는 록 관리 방법은 이용할 수 있는 대역폭의 크기에 따른 무효화 메시지 내용의 변화에 유연하게 적용될 수 있다. Abstract In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time of a mobile transaction. If the cached data in mobile host is updated at a mobile support station, the mobile support station broadcasts an invalidation message for maintaining the cache consistency of a mobile host. But when a mobile transaction accesses the data which is not in cache, if a mobile host caches the data immediately from a mobile support station for processing a mobile transaction rapidly, the method that a mobile support station broadcasts an invalidation message periodically, happens to the case that can not guarantee the serializable execution of a mobile transaction. In this paper, we propose the UCL-MT method and lock management method, as a mobile transaction is executed using cached data. Since, using the data a mobile transaction accessed, the UCL-MT method detects a cycle in a mobile support station before the completion of the mobile transaction, it guarantees the serializable execution of the mobile transaction. Also, proposing lock management method can be adapted flexibly at the change of invalidation message content, according to the available bandwidth.

Urban Area Building Reconstruction Using High Resolution SAR Image (고해상도 SAR 영상을 이용한 도심지 건물 재구성)

  • Kang, Ah-Reum;Lee, Seung-Kuk;Kim, Sang-Wan
    • Korean Journal of Remote Sensing
    • /
    • v.29 no.4
    • /
    • pp.361-373
    • /
    • 2013
  • The monitoring of urban area, target detection and building reconstruction have been actively studied and investigated since high resolution X-band SAR images could be acquired by airborne and/or satellite SAR systems. This paper describes an efficient approach to reconstruct artificial structures (e.g. apartment, building and house) in urban area using high resolution X-band SAR images. Building footprint was first extracted from 1:25,000 digital topographic map and then a corner line of building was detected by an automatic detecting algorithm. With SAR amplitude images, an initial building height was calculated by the length of layover estimated using KS-test (Kolmogorov-Smirnov test) from the corner line. The interferometric SAR phases were simulated depending on SAR geometry and changable building heights ranging from -10 m to +10 m of the initial building height. With an interferogram from real SAR data set, the simulation results were compared using the method of the phase consistency. One of results can be finally defined as the reconstructed building height. The developed algorithm was applied to repeat-pass TerraSAR-X spotlight mode data set over an apartment complex in Daejeon city, Korea. The final building heights were validated against reference heights extracted from LiDAR DSM, with an RMSE (Root Mean Square Error) of about 1~2m.

Analysis of Civil Defense Shelters and Measures (민방위 대피소의 실태분석 및 대책방안)

  • Kim, Tae-Hwan
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.31-31
    • /
    • 2011
  • 1990년 이후 공산체계인 구소련과 동구권이 몰락하고 세계적으로 탈냉전의 변화와 우리의 민주정부 수립 후 햇빛정책 등에도 불구하고 북한은 적화통일을 포기하지 않고 작년 11월에 연평도에 포격을 가하여 민간인과, 군이 2명이 사망하는 사건이 발생 하였다. 또한 북한의 공격은 과거의 포탄공격뿐만 아니라 미사일이나 화생방과 같은 생화학물질 탑재 가능한 공격이 예상된다. 이에 대비 정부에서는 고정시설의 화생방 방호는 일단유사시에 국민의 생명과 재산을 보호하는데 필수요소로서 집단보호개념에 도입하고 있으며, 현재 각 중요 대피시설 및 지자체의 기존 대피시설을 개인방호, 탐지, 제독, 운용절차를 포함한 실태파악 및 재래식 탄을 포함한 통합적인 조치를 마련하고 있다. 작년 2010년 11월 연평도에서의 북한 포격이후 우리는 서해5도나 접경지역 주민과 그리고 근접거리의 서울시민들이 안전하게 포격으로부터 피난 할 수 있는 민방위대피소에 대한 문제점이 대두되고 대책방안을 요구하고 있다. 소방방재청 기준에 따르면 직격(直擊) 핵폭탄을 제외한 화생방, 재래식 무기 공격에 견딜 수 있는 시설은 '1등급 대피시설'인데 서울에는 한 곳도 없다. 고층건물의 지하 2층 이하나 지하철, 터널 같은 2등급 대피시설도 폭격은 견딜 수 있지만 화생방 공격에는 취약하다. 지하상가 등 건축물의 지하층, 지하차도나 보도는 그보다 더 취약한 3등급이며 단독 주택의 지하층처럼 방호 효과가 떨어지는 곳이 4등급이다. 2등급으로 분류된 대피소의 경우 분류만 되어 있을 뿐 장기간 대피시 시민들이 사용 할 수 있는 거주공간이 아닌 임시 대피로서의 역할만 하고 있다. 본 연구에서는 민방위 기본법에 따라 지하에 $3.3m^2$ 당 4명 이상이 대피할 수 있는 규모의 공간을 갖추기만 하면 대피시설로 볼 수 있는 현 문제점과 1등급에서 4등급으로 나뉘어져있는 민방위 대피소와 대피소가 있지만 피난공간으로서의 역할과 구조적으로 안전한가에 대한 국내외 실태 분석을 통하여 분석한 결과 우리는 서해5도 대피시설의 반 이상이 무용지물이고 접경지 또한 피난시에 피난장으로서의 대피소가 난방이나, 구급품과 식구 시설 등이 구비가 되어 있지 않고 대피시설로 지정한곳이 간판이나 안내시설이 없다. 외국의 경우 스위스는 연방정부의 관리책임으로 전쟁이나 핵 확산에 따른 화생방 업무 전담팀을 두고 있으며, 방독면은 개인 방호물자로서 전국민 100% 보유하고, 각가정이나 건축, 시설물의 경우 화생방 표준 대피시설 설치관련 규정 마련 시행하고 있다. 대피시설은 화생방 방호가 가능한 지휘부용 대피시설과 일반 주민대피용 시설을 구분하여 설치운영하고 있으며, 전국에 650만개를 설치하고 있다. 결론은 대피시설이 북한 공경시 피난시설로의 활용방안을 모색 등급구분에 따른 현실적용 수정과 기존 대피소 보강과 재선별이 필요하고, 신축시 설계 표준설계안 그리고 기존의 대피소에 대한 보수, 보강방법 가이드라인과 장기간 거주에 대한 설비구축 등과 국민 대홍보등을 제안하였다.

  • PDF