• Title/Summary/Keyword: 자동탐지

Search Result 624, Processing Time 0.024 seconds

Obstacle Detection and Safe Landing Site Selection for Delivery Drones at Delivery Destinations without Prior Information (사전 정보가 없는 배송지에서 장애물 탐지 및 배송 드론의 안전 착륙 지점 선정 기법)

  • Min Chol Seo;Sang Ik Han
    • Journal of Auto-vehicle Safety Association
    • /
    • v.16 no.2
    • /
    • pp.20-26
    • /
    • 2024
  • The delivery using drones has been attracting attention because it can innovatively reduce the delivery time from the time of order to completion of delivery compared to the current delivery system, and there have been pilot projects conducted for safe drone delivery. However, the current drone delivery system has the disadvantage of limiting the operational efficiency offered by fully autonomous delivery drones in that drones mainly deliver goods to pre-set landing sites or delivery bases, and the final delivery is still made by humans. In this paper, to overcome these limitations, we propose obstacle detection and landing site selection algorithm based on a vision sensor that enables safe drone landing at the delivery location of the product orderer, and experimentally prove the possibility of station-to-door delivery. The proposed algorithm forms a 3D map of point cloud based on simultaneous localization and mapping (SLAM) technology and presents a grid segmentation technique, allowing drones to stably find a landing site even in places without prior information. We aims to verify the performance of the proposed algorithm through streaming data received from the drone.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

Comparison of monitoring the output variable and the input variable in the integrated process control (통합공정관리에서 출력변수와 입력변수를 탐지하는 절차의 비교)

  • Lee, Jae-Heon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.4
    • /
    • pp.679-690
    • /
    • 2011
  • Two widely used approaches for improving the quality of the output of a process are statistical process control (SPC) and automatic process control (APC). In recent hybrid processes that combine aspects of the process and parts industries, process variations due to both the inherent wandering and special causes occur commonly, and thus simultaneous application of APC and SPC schemes is needed to effectively keep such processes close to target. The simultaneous implementation of APC and SPC schemes is called integrated process control (IPC). In the IPC procedure, the output variables are monitored during the process where adjustments are repeatedly done by its controller. For monitoring the APC-controlled process, control charts can be generally applied to the output variable. However, as an alternative, some authors suggested that monitoring the input variable may improve the chance of detection. In this paper, we evaluate the performance of several monitoring statistics, such as the output variable, the input variable, and the difference variable, for efficiently monitoring the APC-controlled process when we assume IMA(1,1) noise model with a minimum mean squared error adjustment policy.

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

Cavitation signal detection based on time-series signal statistics (시계열 신호 통계량 기반 캐비테이션 신호 탐지)

  • Haesang Yang;Ha-Min Choi;Sock-Kyu Lee;Woojae Seong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.4
    • /
    • pp.400-405
    • /
    • 2024
  • When cavitation noise occurs in ship propellers, the level of underwater radiated noise abruptly increases, which can be a critical threat factor as it increases the probability of detection, particularly in the case of naval vessels. Therefore, accurately and promptly assessing cavitation signals is crucial for improving the survivability of submarines. Traditionally, techniques for determining cavitation occurrence have mainly relied on assessing acoustic/vibration levels measured by sensors above a certain threshold, or using the Detection of Envelop Modulation On Noise (DEMON) method. However, technologies related to this rely on a physical understanding of cavitation phenomena and subjective criteria based on user experience, involving multiple procedures, thus necessitating the development of techniques for early automatic recognition of cavitation signals. In this paper, we propose an algorithm that automatically detects cavitation occurrence based on simple statistical features reflecting cavitation characteristics extracted from acoustic signals measured by sensors attached to the hull. The performance of the proposed technique is evaluated depending on the number of sensors and model test conditions. It was confirmed that by sufficiently training the characteristics of cavitation reflected in signals measured by a single sensor, the occurrence of cavitation signals can be determined.

Automated Image Alignment and Monitoring Method for Efficient Stereoscopic 3D Contents Production (스테레오스코픽 3D 콘텐츠 제작의 효율성 향상을 위한 자동 영상정렬 및 모니터링 기법)

  • Kim, Jae-In;Kim, Taejung
    • Journal of Broadcast Engineering
    • /
    • v.19 no.2
    • /
    • pp.205-214
    • /
    • 2014
  • Minimization of visual fatigue is important for production of high quality stereoscopic 3D contents. Vertical disparity of stereo images occurred during contents production is considered as the main factor of visual fatigue. To ensure correct stereoscopy vertical disparity needs to be eliminated. In this paper, a method for automated image alignment was proposed for Stereoscopic 3D contents generation and post-processing steps. The proposed method consists of two parts: rectification for image alignment and camera motion detection. The proposed method showed that its rectification performance was the most superior among the existing methods tested and that camera motion detection had a success rate of 98.35%. Through these evaluations, we confirmed that the proposed method can be effectively applied to 3D contents production.

Dangerous Abandoned Object Extraction Model Using Area Variation Characteristics (면적의 변화 특성을 이용한 위험 유기물 형상 추출 모델)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.39-45
    • /
    • 2020
  • Recently the terrors have been attempted in the public places of the nations such as United states, England and Japan by explosive things, toxic materials and so on. It is understood that the method in which dangerous objects are put in public places is one of the difficult types in detection. While there are the cameras recording videos for many spots in public places, it is very hard for the security personnel to monitor every videos. Nowadays the smart softwares which can analyzing videos automatically are utilized to detect abandoned objects. The method by Lin et al. shows comparatively high detection rates for abandoned objects but it is not easy to obtain the shape information because there is a tendency that the number of the pixels decreases abruptly along the time goes due to the characteristics of short-term background images. In this research a novel method is proposed to successfully extract the shape of the abandoned object by analysing the characteristics of area variation. The experiment results show that the proposed method has better performance in extracting shape information in comparison with the precedent approach.

A Study on Game Bot Detection Using Self-Similarity in MMORPGs (자기 유사도를 이용한 MMORPG 게임봇 탐지 시스템)

  • Lee, Eun-Jo;Jo, Won-Jun;Kim, Hyunchul;Um, Hyemin;Lee, Jina;Kwon, Hyuk-min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.93-107
    • /
    • 2016
  • Game bot playing is one of the main risks in Massively Multi-Online Role Playing Games(MMORPG) because it damages overall game playing environment, especially the balance of the in-game economy. There have been many studies to detect game bot. However, the previous detection models require continuous maintenance efforts to train and learn the game bots' patterns whenever the game contents change. In this work, we have proposed a machine learning technique using the self-similarity property that is an intrinsic attribute in game bots and automated maintenance system. We have tested our method and implemented a system to major three commercial games in South Korea. As a result, our proposed system can detect and classify game bots with high accuracy.