• Title/Summary/Keyword: 이상 이벤트

Search Result 238, Processing Time 0.034 seconds

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

A Novel Weighting Method of Multi-sensor Event Data for the Advanced Context Awareness in the Internet of Things Environment (사물인터넷 환경에서 상황인식 개선을 위한 다중센서의 이벤트 데이터 가중치 부여 방안)

  • You, Jeong-Bong;Suh, Dong-Hyok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.515-520
    • /
    • 2022
  • In context awareness using multiple sensors, when using sensor data detected and sent by each sensor, it is necessary to give different weights for each sensor. Even if the same type of sensor is configured for the same situation, sometimes it is necessary to assign different weights due to other secondary factors. It is inevitable to assign weights to events in the real world, and it can be said that a weighting method that can be used in a context awareness system using multiple sensors is necessary. In this study, we propose a weighting method for each sensor that reports to the host while the sensors continue to detect over time. In most IoT environments, the sensor continues the detection activity, and when the detected value shows a change pattern beyond a predetermined range, it is basically reported to the host. This can be called a kind of data stream environment. A weighting method was proposed for sensing data from multiple sensors in a data stream environment, and the new weighting method was to select and assign weights to data that indicates a context change in the stream.

SIEM System Performance Enhancement Mechanism Using Active Model Improvement Feedback Technology (능동형 모델 개선 피드백 기술을 활용한 보안관제 시스템 성능 개선 방안)

  • Shin, Youn-Sup;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.896-905
    • /
    • 2021
  • In the field of SIEM(Security information and event management), many studies try to use a feedback system to solve lack of completeness of training data and false positives of new attack events that occur in the actual operation. However, the current feedback system requires too much human inputs to improve the running model and even so, those feedback from inexperienced analysts can affect the model performance negatively. Therefore, we propose "active model improving feedback technology" to solve the shortage of security analyst manpower, increasing false positive rates and degrading model performance. First, we cluster similar predicted events during the operation, calculate feedback priorities for those clusters and select and provide representative events from those highly prioritized clusters using XAI (eXplainable AI)-based event visualization. Once these events are feedbacked, we exclude less analogous events and then propagate the feedback throughout the clusters. Finally, these events are incrementally trained by an existing model. To verify the effectiveness of our proposal, we compared three distinct scenarios using PKDD2007 and CSIC2012. As a result, our proposal confirmed a 30% higher performance in all indicators compared to that of the model with no feedback and the current feedback system.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

A Study on the Serialized Event Sharing System for Multiple Telecomputing User Environments (원격.다원 사용자 환경에서의 순차적 이벤트 공유기에 관한 연구)

  • 유영진;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.344-350
    • /
    • 2003
  • In this paper, we propose a novel sharing method ordering the events occurring between users collaborated with the common telecomputing environment. We realize the sharing method with multimedia data to improve the coworking effect using teleprocessing network. This sharing method advances the efficiency of communicating projects such as remote education, tele-conference, and co-authoring of multimedia contents by offering conveniences of presentation, group authoring, common management, and transient event productions of the users. As for the conventional sharing white board system, all the multimedia contents segments should be authored by the exclusive program, and we cannot use any existing contents or program. Moreover we suffer from the problem that ordering error occurs in the teleprocessing operation because we do not have any line-up technology for the input ordering of commands. Therefore we develop a method of retrieving input and output events from the windows system and the message hooking technology which transmits between programs in the operating system In addition, we realize the allocation technology of the processing results for all sharing users of the distributed computing environment without any error. Our sharing technology should contribute to improve the face-to-face coworking efficiency for multimedia contents authoring, common blackboard system in the area of remote educations, and presentation display in visual conference.

  • PDF

한국형 e-Navigation의 통합 UI 및 항차 기반 위기대응 가이던스 연구

  • Ok, Gyeong-Seok;Lee, Seung-Hyeon;Park, Jin-Hyeong;Lee, Gwang-Yeol;Jeong, Gil-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.170-172
    • /
    • 2019
  • 최근 우리나라에서는 해양사고의 효과적인 예방을 위하여 구축 중인 한국형 e-Navigation SV20-선내시스템 원격모니터링 서비스에서는 복원성, 화재, 침수, 과도경사, 항해장비의 이상과 같이 선박의 안전 운항과 직접적으로 관련이 있는 선박의 센서들을 수집, 분석하여 이상 상태와 긴급상황을 자동으로 식별하여 안전운항을 지원하는 기능이 있다. IMO 선박안전관리 시스템의 경우 선원의 인적 과실에 의한 해상에서 안전 및 해양환경 보호를 위한 핵심 요소로서 우리나라는 SOLAS 협약 제9장(선박의 안전운항을 위한 관리)및 ISM CODE를 1999년 2월 해사안전법에 수용하여 2002. 7. 1.부터 단계적으로 시행하고 있다. 이 연구에서는 이 둘의 융합 개념의 기술적 결합을 통한 체계적이고 자동화적으로 선박에서의 안전관리 능력을 제고하여 안전 사고 발생을 최소화 할 수 있는 여러 가지 시스템과 더불어 사고 발생시 효율적으로 대응할 수 있는 표준 토폴로지 기반 UI 및 항차 기반 위기대응 가이던스를 개발 하고자 한다.

  • PDF

인공 신경망과 서포트 벡터 머신을 사용한 태양 양성자 플럭스 예보

  • Nam, Ji-Seon;Mun, Yong-Jae;Lee, Jin-Lee;Ji, Eun-Yeong;Park, Jin-Hye;Park, Jong-Yeop
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.129.1-129.1
    • /
    • 2012
  • 서포트 벡터 머신(Support Vector Machine, SVM)과 인공신경망 모형(Neural Network, NN)을 사용하여 태양 양성자 현상(Solar proton event, SPE)의 플럭스 세기를 예측해 보았다. 이번 연구에서는 1976년부터 2011년까지 10MeV이상의 에너지를 가진 입자가 10개 cm-1 sec-1 ster -1 이상 입사할 경우를 태양 양성자 현상으로 정의한 NOAA의 태양 고에너지 입자 리스트와 GOE위성의 X-ray 플레어 데이터를 사용하였다. 여기에서 C, M, X 등급의 플레어와 관련있는 178개 이벤트를 모델의 훈련을 위한 데이터(training data) 89개와 예측을 위한 데이터(prediction data) 89개로 구분하였다. 플러스 세기의 예측을 위하여, 우리는 로그 플레어 세기, 플레어 발생위치, Rise time(플레어 시작시간부터 최대값까지의 시간)을 모델 입력인자로 사용하였다. 그 결과 예측된 로그 플럭스 세기와 관측된 로그 플럭스 세기 사이의 상관계수는 SVM과 NN에서 각각 0.32와 0.39의 값을 얻었다. 또한 두 값 사이의 평균 제곱근 오차(Root mean square error)는 SVM에서 1.17, NN에서는 0.82로 나왔다. 예측된 플럭스 세기와 관측된 플럭스 세기의 차이를 계산해 본 결과, 오차 범위가 1이하인 경우가 SVM에서는 약 68%이고 NN에서는 약 80%의 분포를 보였다. 이러한 결과로부터 우리는 NN모델이 SVM모델보다 플럭스 세기를 잘 예측하는 것을 알 수 있었다.

  • PDF

Efficient Energy Consumption Method in Wireless Sensor Network (무선 센서 네트워크에서의 효율적 에너지 소모 방안)

  • Min Hyoung-Seok;Lee Sang-Bin;An Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.181-183
    • /
    • 2006
  • 본 논문은 물리 공간의 이벤트를 입력받는 센서 노드들로 이루어진 무선 네트워크 환경에서 네트워크의 전체 에너지를 최소화하기 위한 방법으로, 라우팅, MAC, 어플리케이션 레이어 joint 설계 방식의 크로스 레이어에 기반을 둔 데이터 어그리게이션 알고리즘에 관한 것이다. 시뮬레이션 결과 우리는 제안한 방법을 통해 데이터 어그리게이션을 고려하지 않은 이전의 방법보다 확실한 에너지 감소 효과를 얻을 수 있고, 전체 무선 센서 네트워크의 에너지 사용을 개선 시킬 수 있다.

  • PDF

A Study on Optimization Techniques for Railway Conflict Resolution Program (열차 경합 해소 문제를 위한 최적화 기법 연구)

  • Lee, Sang-In;Kim, Taek-Ryoung;Park, Jin-Bae;Joo, Young-Hoon;Hong, Hyo-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.720-722
    • /
    • 2004
  • 본 논문은 철도청 사령실 통합 신호설비 구축사업에 적용할 열차 경합의 해소기법 중 열차지연시간의 수치화 기법에 대한 방안을 제시하고자 한다. 열차경합의 검지 및 해소는 열차운행의 정시성을 유지하기 위하여 매우 중요한 기능이지만 현재까지 자동화되지 못하고 지역본부별로 하나의 이벤트에 대하여 해당열차만을 고려하는 수작업의 형태로 경합해소를 수행해오고 있다. 따라서 이러한 문제를 해결하고 철도 시스템을 전역적으로 고려할 수 있는 기법이 요구된다. 이러한 시스템에서 열차의 지연에 따른 우선순위를 수치적으로 표현할 수 있는 방안이 요구된다. 본 논문에서는 열차 지연을 수치화하여 경합에 대한 최적의 대안을 제시하는 기법을 제안한다.

  • PDF