• Title/Summary/Keyword: 자동탐지

Search Result 619, Processing Time 0.027 seconds

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.

The Monitoring System for Informing the Change of Contents on the Web Sites (웹 사이트 컨텐츠 변경 모니터링 시스템)

  • 김원중;조이기;손철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.505-512
    • /
    • 2002
  • Fast spreading of web made we get easily the vast amount of information all over the world, but quantity of great information on the Internet space is giving much troubles to recognize change of information that users are interested soon justly. That is, users must connect and examine one by one to relevant site to detect change of web documents that changes from time to time. Therefore, the development of Robot which accomplish Information change monitoring function that sense automatically changed contents and inform to user is required. In this paper, we designed and implemented Web site contents change monitoring system, which notify-automatically the change of Web documents to users through alarm or E-mail if user defines target URL to do monitoring, monitoring condition, monitoring period etc. And we presented the method that structure and classify Web Documents to semantic units using HTML Tag. Also, we introduced the concept of virtual key to manage position of word to watch some change efficiently.

Development of Moving Objects Monitoring and Transforming Personal Robot System Based on Remote Controls (원격제어기반 이동체 감지 및 변형 퍼스널 로봇시스템 설계 및 구현)

  • Lee, Dong-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.159-165
    • /
    • 2010
  • The moving object monitoring and transforming personal robot system based on remote controls is designed and implemented, and the performance of the system is analyzed in this paper. The major considering factors in the system design are such as 1) the control scheme design (button based and the remote control schemes); 2) the operation modes design (wheel driving mode/pedestrian mode/auto driving mode/observation mode); 3) the remote control function design; 4) the design of the monitoring function of the changes in neighbor environments; 5) the design of the detection of obstruction. From the experiments, it is assured that the developed personal robot can walk to the grounds that covered with doorsill or electric wires in indoors by control the leg articulations, and can escape from the obstruction using three infrared sensors in the 30cm*30cm obstruction styled space under the auto driving mode.

Road Extraction from High Resolution Satellite Image Using Object-based Road Model (객체기반 도로모델을 이용한 고해상도 위성영상에서의 도로 추출)

  • Byun, Young-Gi;Han, You-Kyung;Chae, Tae-Byeong
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.4
    • /
    • pp.421-433
    • /
    • 2011
  • The importance of acquisition of road information has recently been increased with a rapid growth of spatial-related services such as urban information system and location based service. This paper proposes an automatic road extraction method using object-based approach which was issued alternative of pixel-based method recently. Firstly, the spatial objects were created by MSRS(Modified Seeded Region Growing) method, and then the key road objects were extracted by using properties of objects such as their shape feature information and adjacency. The omitted road objects were also traced considering spatial correlation between extracted road and their neighboring objects. In the end, the final road region was extracted by connecting discontinuous road sections and improving road surfaces through their geometric properties. To assess the proposed method, quantitative analysis was carried out. From the experiments, the proposed method generally showed high road detection accuracy and had a great potential for the road extraction from high resolution satellite images.

4D Inversion of the Resistivity Monitoring Data with Focusing Model Constraint (강조 모델제한을 적용한 전기비저항 모니터링 자료의 4차원 역산)

  • Cho, In-Ky;Jeong, Da-Bhin
    • Geophysics and Geophysical Exploration
    • /
    • v.21 no.3
    • /
    • pp.139-149
    • /
    • 2018
  • The resistivity monitoring is a practical method to resolve changes in resistivity of underground structures over time. With the advance of sophisticated automatic data acquisition system and rapid data communication technology, resistivity monitoring has been widely applied to understand spatio-temporal changes of subsurface. In this study, a new 4D inversion algorithm is developed, which can effectively emphasize significant changes of underground resistivity with time. To overcome the overly smoothing problem in 4D inversion, the Lagrangian multipliers in the space-domain and time-domain are determined automatically so that the proportion of the model constraints to the misfit roughness remains constant throughout entire inversion process. Furthermore, a focusing model constraint is added to emphasize significant spatio-temporal changes. The performance of the developed algorithm is demonstrated by the numerical experiments using the synthetic data set for a time-lapse model.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Linguistic Features Discrimination for Social Issue Risk Classification (사회적 이슈 리스크 유형 분류를 위한 어휘 자질 선별)

  • Oh, Hyo-Jung;Yun, Bo-Hyun;Kim, Chan-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.541-548
    • /
    • 2016
  • The use of social media is already essential as a source of information for listening user's various opinions and monitoring. We define social 'risks' that issues effect negative influences for public opinion in social media. This paper aims to discriminate various linguistic features and reveal their effects for building an automatic classification model of social risks. Expecially we adopt a word embedding technique for representation of linguistic clues in risk sentences. As a preliminary experiment to analyze characteristics of individual features, we revise errors in automatic linguistic analysis. At the result, the most important feature is NE (Named Entity) information and the best condition is when combine basic linguistic features. word embedding, and word clusters within core predicates. Experimental results under the real situation in social bigdata - including linguistic analysis errors - show 92.08% and 85.84% in precision respectively for frequent risk categories set and full test set.

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Designation for Change Detection of Building Objects in Urban Area in High-Resolution Satellite Image (고정밀 위성영상에서 도심지역 건물변화 탐지를 위한 중첩방법)

  • 이승희;박성모;이준환;김준철
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.4
    • /
    • pp.319-328
    • /
    • 2003
  • The automatic analysis of high-resolution satellite image is important in cartography, surveillance, exploiting resources etc. However, the automatic analysis of high resolution satellite image in the urban area has lots of difficulty including a shadow, the difference of illumination with time, the complexity of image so that the present techniques are seemed to be impossible to resolve. This paper proposes a new way of change detection of building objects in urban area, in which the objects in digital vector map are designated and superimposed on the the high-resolution satellite image. The proposed way makes the buildings on the vector map parameterize, and searches them in the preprocessed high-resolution satellite image by using generalized Hough transform. The designated building objects are overlaid on the satellite image and the result can help to search the changes in building objects rapidly.