• Title/Summary/Keyword: 자동탐지

Search Result 619, Processing Time 0.034 seconds

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

Facilities Analysis of Laver Cultivation Grounds in Korean Coastal Waters Using SPOT-5 Images in 2005 (SPOT-5 위성영상에 의한 2005년 한국 연안 김 양식장의 시설현황 분석)

  • Yang Chan-Su;Park Sung-Woo
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.9 no.3
    • /
    • pp.168-175
    • /
    • 2006
  • The cultural grounds of lave r have been surveyed using SPOT-5 satellite images. The facilities of laver cultivation area in the coastal waters of Korea were calculated. 10 m resolution multispectral images of SPOT-5 are adopted for the southern are a of Jebu Island, Hwaseong city to develop an automatic detection approach of laver nets that consists of the following: band difference technique, canny edge detector and morphological analysis: The number of satellite-based facilities was relatively high as compared with the licensed number in 2005, 676,749 chaek and 572,745 chaek(柵, unit of measure for laver farm), respectively. The ratio of a law abiding facility was very low at 52.9%. These data could be applied to control its national production keeping a stable market price for the government body.

  • PDF

Application of the artificial intelligence for automatic detection of shipping noise in shallow-water (천해역 선박 소음 자동 탐지를 위한 인공지능 기법 적용)

  • Kim, Sunhyo;Jung, Seom-Kyu;Kang, Donhyug;Kim, Mira;Cho, Sungho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.279-285
    • /
    • 2020
  • The study on the temporal and spatial monitoring of passing vessels is important in terms of protection and management the marine ecosystem in the coastal area. In this paper, we propose the automatic detection technique of passing vessel by utilizing an artificial intelligence technology and broadband striation patterns which are characteristic of broadband noise radiated by passing vessel. Acoustic measurements to collect underwater noise spectrum images and ship navigation information were conducted in the southern region of Jeju Island in South Korea for 12 days (2016.07.15-07.26). And the convolution neural network model is optimized through learning and validation processes based on the collected images. The automatic detection performance of passing vessel is evaluated by precision (0.936), recall (0.830), average precision (0.824), and accuracy (0.949). In conclusion, the possibility of the automatic detection technique of passing vessel is confirmed by using an artificial intelligence technology, and a future study is proposed from the results of this study.

Performance analysis of automatic target tracking algorithms based on analysis of sea trial data in diver detection sonar (수영자 탐지 소나에서의 해상실험 데이터 분석 기반 자동 표적 추적 알고리즘 성능 분석)

  • Lee, Hae-Ho;Kwon, Sung-Chur;Oh, Won-Tcheon;Shin, Kee-Cheol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.415-426
    • /
    • 2019
  • In this paper, we discussed automatic target tracking algorithms for diver detection sonar that observes penetration forces of coastal military installations and major infrastructures. First of all, we analyzed sea trial data in diver detection sonar and composed automatic target tracking algorithms based on track existence probability as track quality measure in clutter environment. In particular, these are presented track management algorithms which include track initiation, confirmation, termination, merging and target tracking algorithms which include single target tracking IPDAF (Integrated Probabilistic Data Association Filter) and multitarget tracking LMIPDAF (Linear Multi-target Integrated Probabilistic Data Association Filter). And we analyzed performances of automatic target tracking algorithms using sea trial data and monte carlo simulation data.

Design and Implementation of AR Model based Automatic Identification and Restoration Scheme for Line Scratches in Old Films (AR 모델 기반의 고전영화의 긁힘 손상의 자동 탐지 및 복원 시스템 설계와 구현)

  • Han, Ngoc-Soc;Kim, Seong-Whan
    • The KIPS Transactions:PartB
    • /
    • v.17B no.1
    • /
    • pp.47-54
    • /
    • 2010
  • Old archived film shows two major defects: line scratch and blobs. In this paper, we present a design and implementation of an automatic video restoration system for line scratches observed in archived film. We use autoregressive (AR) image model because we can make stochastic and specifically autoregressive image generation process with our PAST-PRESENT model and Sampling Pattern. We designed locality maximizing scanning pattern, which can generate nearly stationary time-like series of pixels, which is a strong requirement for a stochastic series to be autoregressive. The sampled pixel series undergoes filtering and model fitting using Durbin-Levinson algorithm before interpolation process. We designed three-stage film restoration system, which includes (1) film acquisition from VHS tapes, (2) simple line scratch detection and restoration, and (3) manual blob identification and sophisticated inpainting scheme. We implemented film acquisition and simple inpainting scheme on Texas Instruments DSP board TMS320DM642 EVM, and implemented our AR inpainting scheme on PC for sophisticated restoration. We experimented our scheme with two old Korean films: "Viva Freedom" and "Robot Tae-Kwon-V", and the experimental results show that our scheme improves Bertalmio's scheme for subjective quality (MOS), objective quality (PSNR), and especially restoration ratio (RR), which reflects how much similar to the manual inpainting results.

Detection Model Generation System using Learning (학습을 통한 탐지 모델 생성 시스템)

  • 김선영;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.31-38
    • /
    • 2003
  • In this paper, We propose detection mood generation system using learning to generate automatically detection model. It is improved manpower, efficiency in time. Proposed detection model generator system is consisted of agent system and manager system. Model generation can do existing standardization by genetic algorithm because do model generation and apply by new detection model. according to experiment results, detection model generation using learning proposed sees more efficiently than existing intrusion detection system. When intrusion of new type occur by implemented system and decrease of the False-Positive rate, improve performance of existing intrusion detection system.

  • PDF

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.