• Title/Summary/Keyword: 이상탐지 알고리즘

Search Result 288, Processing Time 0.026 seconds

Data Fusion Algorithm based on Inference for Anomaly Detection in the Next-Generation Intrusion Detection (차세대 침입탐지에서 이상탐지를 위한 추론 기반 데이터 융합 알고리즘)

  • Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.233-238
    • /
    • 2016
  • In this paper, we propose the algorithms of processing the uncertainty data using data fusion for the next generation intrusion detection. In the next generation intrusion detection, a lot of data are collected by many of network sensors to discover knowledge from generating information in cyber space. It is necessary the data fusion process to extract knowledge from collected sensors data. In this paper, we have proposed method to represent the uncertainty data, by classifying where is a confidence interval in interval of uncertainty data through feature analysis of different data using inference method with Dempster-Shafer Evidence Theory. In this paper, we have implemented a detection experiment that is classified by the confidence interval using IRIS plant Data Set for anomaly detection of uncertainty data. As a result, we found that it is possible to classify data by confidence interval.

A Study on the Fraud Detection for Electronic Prepayment using Machine Learning (머신러닝을 이용한 선불전자지급수단의 이상금융거래 탐지 연구)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.65-77
    • /
    • 2022
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly growing, leading to growing fraud attempts. This paper proposes a methodology that can effectively detect fraud transactions in electronic prepayment by machine learning algorithms, including support vector machines, decision trees, and artificial neural networks. Actual transaction data of electronic prepayment services were collected and preprocessed to extract the most relevant variables from raw data. Two different approaches were explored in the paper. One is a transaction-based approach, and the other is a user ID-based approach. For the transaction-based approach, the first model is primarily based on raw data features, while the second model uses extra features in addition to the first model. The user ID-based approach also used feature engineering to extract and transform the most relevant features. Overall, the user ID-based approach showed a better performance than the transaction-based approach, where the artificial neural networks showed the best performance. The proposed method could be used to reduce the damage caused by financial accidents by detecting and blocking fraud attempts.

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

Abnormal Behavior Pattern Identifications of One-person Households using Audio, Vision, and Dust Sensors (음성, 영상, 먼지 센서를 활용한 1인 가구 이상 행동 패턴 탐지)

  • Kim, Si-won;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.95-103
    • /
    • 2019
  • The number of one person households has grown steadily over the recent past and the population of lonely and unnoticed death are also observed. The phenomenon of one person households has been occurred. In the dark side of society, the remarkable number of lonely and unnoticed death are reported among different age-groups. We propose an unusual event detection method which may give a remarkable solution to reduce the number of the death rete for people dying alone and remaining undiscovered for a long period of time. The unusual event detection method we suggested to identify abnormal user behavior in their lives using vision pattern, audio pattern, and dust pattern algorithms. Individually proposed pattern algorithms have disadvantages of not being able to detect when they leave the coverage area. We utilized a fusion method to improve the accuracy performance of each pattern algorithm and evaluated the technique with multiple user behavior patterns in indoor areas.

A Study on the Intrusion Detection System's Nodes Scheduling Using Genetic Algorithm in Sensor Networks (센서네트워크에서 유전자 알고리즘을 이용한 침입탐지시스템 노드 스케줄링 연구)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2171-2180
    • /
    • 2011
  • Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection techniques are not suitable for sensor networks with limited resources. In this paper, propose a new method for selecting and managing the detect nodes in IDS(intrusion detection system) for anomaly detection in sensor networks and the node scheduling technique for maximizing the IDS's lifetime. Using the genetic algorithm, developed the solutions for suggested optimization equation and verify the effectiveness of proposed methods by simulations.

A Predictive Bearing Anomaly Detection Model Using the SWT-SVD Preprocessing Algorithm (SWT-SVD 전처리 알고리즘을 적용한 예측적 베어링 이상탐지 모델)

  • So-hyang Bak;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.109-121
    • /
    • 2024
  • In various manufacturing processes such as textiles and automobiles, when equipment breaks down or stops, the machines do not work, which leads to time and financial losses for the company. Therefore, it is important to detect equipment abnormalities in advance so that equipment failures can be predicted and repaired before they occur. Most equipment failures are caused by bearing failures, which are essential parts of equipment, and detection bearing anomaly is the essence of PHM(Prognostics and Health Management) research. In this paper, we propose a preprocessing algorithm called SWT-SVD, which analyzes vibration signals from bearings and apply it to an anomaly transformer, one of the time series anomaly detection model networks, to implement bearing anomaly detection model. Vibration signals from the bearing manufacturing process contain noise due to the real-time generation of sensor values. To reduce noise in vibration signals, we use the Stationary Wavelet Transform to extract frequency components and perform preprocessing to extract meaningful features through the Singular Value Decomposition algorithm. For experimental validation of the proposed SWT-SVD preprocessing method in the bearing anomaly detection model, we utilize the PHM-2012-Challenge dataset provided by the IEEE PHM Conference. The experimental results demonstrate significant performance with an accuracy of 0.98 and an F1-Score of 0.97. Additionally, to substantiate performance improvement, we conduct a comparative analysis with previous studies, confirming that the proposed preprocessing method outperforms previous preprocessing methods in terms of performance.

Intelligent Abnormal Event Detection Algorithm for Single Households at Home via Daily Audio and Vision Patterns (지능형 오디오 및 비전 패턴 기반 1인 가구 이상 징후 탐지 알고리즘)

  • Jung, Juho;Ahn, Junho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.77-86
    • /
    • 2019
  • As the number of single-person households increases, it is not easy to ask for help alone if a single-person household is severely injured in the home. This paper detects abnormal event when members of a single household in the home are seriously injured. It proposes an vision detection algorithm that analyzes and recognizes patterns through videos that are collected based on home CCTV. And proposes audio detection algorithms that analyze and recognize patterns of sound that occur in households based on Smartphones. If only each algorithm is used, shortcomings exist and it is difficult to detect situations such as serious injuries in a wide area. So I propose a fusion method that effectively combines the two algorithms. The performance of the detection algorithm and the precise detection performance of the proposed fusion method were evaluated, respectively.

Design and Evaluation of AMIDA Algorithm for MIC Sensor Signal Processing in USN (감시정찰용 소리 센서를 위한 AMIDA 알고리즘 설계 및 성능평가)

  • Park, Hong-Jae;Lee, Seung-Je;Ha, Gong-Yong;Kim, Li-Hyung;Kim, Young-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.796-799
    • /
    • 2008
  • 최근 유비쿼터스 컴퓨팅과 유비쿼터스 네트워크를 활용하여 새로운 서비스들을 개발하려는 노력이 진행 중이며, 이와 관련된 기술의 중요성도 급증하고 있다. 특히 감시정찰 센서네트워크의 핵심 구성요소인 저가의 경량 센서노드에서 측정한 미가공 데이터(raw data)를 사용하여 침입 물체의 실시간 탐지, 식별, 추적 및 예측하기 위한 디지털 신호처리 기술은 주요 기술 중 하나이다. 본 논문에서는 감시정찰 센서네트워크의 핵심 구성요소인 소리센서 노드에서 측정한 소리 미가공 데이터를 사용하여 차량을 탐지할 수 있는 소리센서 디지털 신호처리 알고리즘을 설계 및 구현 한다. 알고리즘의 주 목표는 감시정찰용 센서노드의 탐지 신뢰성을 높이기 위한 높은 침입물체 탐지 성공률(success rate)과 낮은 허위신고(false alarm) 횟수를 가지는 것이다. 성능평가 결과에 의하면 제안한 AMIDA 알고리즘은 90% 이상의 탐지 성공률과 2 회 이하의 허위신고 횟수를 가지는 것을 확인할 수 있었다.

Performance Comparision of Deadlock Detection Schemes in Distributed Database Systems (분산 데이터베이스 시스템에서의 교착상태 탐지기법의 성능평가)

  • 이원섭;이상희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.26-33
    • /
    • 2003
  • The edge-chasing deadlock detection algorithm of Choudhary fails to remove the existing deadlocks after committing the transaction whose priority is lowest on the transaction wait-for path. We proposed a modified algorithm that solves this problem. In this thesis, the performance of the modified algorithm is compared with that of the Tsai's deadlock detection algorithm that uses transaction-resource graph(TR graph) using simulation approach.

  • PDF

An Algorithm for Detecting Gemetric Symmetry in a Plannar Graph (평면 그래프의 기하학적 대칭성 탐지 알고리즘)

  • Hong, Seok-Hui;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.1
    • /
    • pp.107-116
    • /
    • 1999
  • 대칭성(symmetry)은 그래프의 구조와 특성을 시각적으로 표현할 때 중요한 미적 기준 중의 하나이다. 또한 대칭성을 보여주는 드로잉은 전체 그래프가 크기가 작은 부그래트들로부터 반복적으로 구성됨을 보여줌으로써 전체 그래프에 대한 이해를 쉽게 푸는 해주는 장점이 있다. 하지만 일반적인 그래프에서 기하하적 대칭성(geometric symmetry)을 탐지하는 문제는 이미 NP-complete 임이 증명되었으므로 이에 대한 연구는 평면 그래프(planar graph)의 극히 제한적인 부분집합인 트리, 외부 평면 그래프, 임베딩된 (embedded) 평면 그래프 등에 초점이 맞추어져 왔다. 본 논문에서는 평면 그래프에서의 기하학적 대칭성 문제를 연구하였다. 평면 그래프를 이중 연결 성분들로 분할한 다음 이를 각각 다시 삼중 연결 성분들로 분할하여 트리를 구성하고 축소(reduction)개념을 도입함으로써 기하학적 대칭성을 탐지하는 O(n2)시간 알고리즘을 제시하였다. 여기서 n은 그래프의 정점의 개수이다. 이 알고리즘은 평면 그래프를 최대한 대칭적으로 드로잉하는 알고리즘 개발에 이용될 수 있다.