• Title/Summary/Keyword: 비정상행동탐지

Search Result 25, Processing Time 0.018 seconds

Abnormal Situation Detection on Surveillance Video Using Object Detection and Action Recognition (객체 탐지와 행동인식을 이용한 영상내의 비정상적인 상황 탐지 네트워크)

  • Kim, Jeong-Hun;Choi, Jong-Hyeok;Park, Young-Ho;Nasridinov, Aziz
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.186-198
    • /
    • 2021
  • Security control using surveillance cameras is established when people observe all surveillance videos directly. However, this task is labor-intensive and it is difficult to detect all abnormal situations. In this paper, we propose a deep neural network model, called AT-Net, that automatically detects abnormal situations in the surveillance video, and introduces an automatic video surveillance system developed based on this network model. In particular, AT-Net alleviates the ambiguity of existing abnormal situation detection methods by mapping features representing relationships between people and objects in surveillance video to the new tensor structure based on sparse coding. Through experiments on actual surveillance videos, AT-Net achieved an F1-score of about 89%, and improved abnormal situation detection performance by more than 25% compared to existing methods.

A Hybrid Model of Network Intrusion Detection System : Applying Packet based Machine Learning Algorithm to Misuse IDS for Better Performance (Misuse IDS의 성능 향상을 위한 패킷 단위 기계학습 알고리즘의 결합 모형)

  • Weon, Ill-Young;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.301-308
    • /
    • 2004
  • Misuse IDS is known to have an acceptable accuracy but suffers from high rates of false alarms. We show a behavior based alarm reduction with a memory-based machine learning technique. Our extended form of IBL, (XIBL) examines SNORT alarm signals if that signal is worthy sending signals to security manager. An experiment shows that there exists an apparent difference between true alarms and false alarms with respect to XIBL behavior This gives clear evidence that although an attack in the network consists of a sequence of packets, decisions over Individual packet can be used in conjunction with misuse IDS for better performance.

An Analysis of Game Strategy and User Behavior Pattern Using Big Data: Focused on Battlegrounds Game (빅데이터를 활용한 게임 전략 및 유저 행동 패턴 분석: 배틀그라운드 게임을 중심으로)

  • Kang, Ha-Na;Yong, Hye-Ryeon;Hwang, Hyun-Seok
    • Journal of Korea Game Society
    • /
    • v.19 no.4
    • /
    • pp.27-36
    • /
    • 2019
  • Approaches to find hidden values using various and enormous amount of data are on the rise. As big data processing becomes easier, companies directly collects data generated from users and analyzes as necessary to produce insights. User-based data are utilized to predict patterns of gameplay, in-game symptom, eventually enhancing gaming. Accordingly, in this study, we tried to analyze the gaming strategy and user activity patterns utilizing Battlegrounds in-game data to detect the in-game hack.

The Study of Bot Program Detection based on User Behavior in Online Game Environment (온라인 게임 환경에서 사용자 행위 정보에 기반한 봇 프로그램 탐지 기법 연구)

  • Yoon, Tae-Bok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4200-4206
    • /
    • 2012
  • Recently, online-game industry has been rapidly expanding in these days. But, the various game service victimized cases are generated by the bots program. Particularly, the abnormal collection of the game money and item loses the inherent fun of a game. It reaches ultimately the definite bad effect to the game life cycle. In this paper, we propose a Bots detection method by observing the playing patterns of game characters with game log data. It analyzed behaviors of human players as well as bots and identified features to build the model to differentiate bots from human players. In an experiment, by using the served online-game, the model of a user and bots were generated was distinguished. And the reasonable result was confirmed.

Classification Performance Improvement of UNSW-NB15 Dataset Based on Feature Selection (특징선택 기법에 기반한 UNSW-NB15 데이터셋의 분류 성능 개선)

  • Lee, Dae-Bum;Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.35-42
    • /
    • 2019
  • Recently, as the Internet and various wearable devices have appeared, Internet technology has contributed to obtaining more convenient information and doing business. However, as the internet is used in various parts, the attack surface points that are exposed to attacks are increasing, Attempts to invade networks aimed at taking unfair advantage, such as cyber terrorism, are also increasing. In this paper, we propose a feature selection method to improve the classification performance of the class to classify the abnormal behavior in the network traffic. The UNSW-NB15 dataset has a rare class imbalance problem with relatively few instances compared to other classes, and an undersampling method is used to eliminate it. We use the SVM, k-NN, and decision tree algorithms and extract a subset of combinations with superior detection accuracy and RMSE through training and verification. The subset has recall values of more than 98% through the wrapper based experiments and the DT_PSO showed the best performance.