• Title/Summary/Keyword: 자료 은닉

Search Result 124, Processing Time 0.028 seconds

Attack Type Discrimination for HMM-based IDS Using Viterbi Algorithm (Viterbi 알고리즘을 이용한 HMM기반 침입탐지 시스템의 침입 유형 판별)

  • Koo, Ja-Min;Cho, Sung-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2093-2096
    • /
    • 2003
  • 정보통신 구조의 확산 및 기술이 발전함에 따라 전산 시스템에 대한 침입과 피해가 증가되고 있는 실정이다. 이에 비정상행위 기반 침입탐지 시스템에 대한 연구가 활발히 진행되고 있는 가운데 특히, 시스템 호출 감사자료 척도에 은닉 마르코프 모델(HMM)로 모델링 하는 연구가 많이 이루어지고 있다. 하지만, 이는 일정한 임계값 이하의 비정상행위만을 감지할 뿐, 어떠한 유형의 침입인지를 판별하지 못한다. 본 논문에서는, 이러한 침입탐지 시스템의 맹점을 보완하기 위하여 Viterbi 알고리즘을 이용하여 상태 변화를 분석한 후, 어떤 유형의 침입이 발생하였는지를 판별하는 방법을 제안하고, 실험을 통해 제안한 시스템의 가능성을 보인다.

  • PDF

On-line Character Recognition from MPEG Stream Data (MPEG Stream Data에서의 온라인 문자인식)

  • 이진숙;장춘서
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.407-409
    • /
    • 2000
  • 본 논문에서는 Web 기반의 원격 교육 환경에서 강사와 학습자 모두에게 도움을 줄 수 있는 판서장면 MPEG Stream Data에서의 온라인 문자 인식 방법에 대하여 연구하였다. 강사가 별도의 프리젠테이션 자료를 만들 필요 없이 직접 판서한 MPEG Stream Data로부터 초당 3 Frame을 Sampling 한 후, 각 Frame에 Laplacian 마스크를 이용한 윤곽선 검출, Frame간 빼기 그리고 세선화 등의 영상처리 기법을 적용하여 문자인식에 필요한 좌표 값과 방향코드 등의 특징을 추출하였다. 좌표 값은 세선화 된 획의 중간 Pixel의 좌표 값이며, 구해진 좌표 값들을 이용하여 8방향 코드와 가상 획 코드를 구한 다음, 이 특징들을 사용해 은닉 마르코프 모델(Hidden Markov Model)을 학습시키고 한글 문자 인식을 행하였다.

  • PDF

Intrusion Types Identification for HMM-based Anomaly Detection System Using Edit Distance (Edit Distance를 이용한 오용탐지 시스템의 침입유형 판별)

  • 구자민;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.874-876
    • /
    • 2003
  • 전산 시스템에 대한 침입에 대응하기 위하여 시스템 호출 감사자료 척도를 사용하여 은닉 마르코프 모델(HMM)에 적용하는 비정상행위 기반 침입탐지 시스템에 대한 연구가 활발하다. 하지만, 이는 일정한 임계간 이하의 비정상행위만을 감지할 뿐, 어떠한 유형의 침입인지를 판별하지 못한다. 이에 Viterbi 알고리즘을 이용하여 상태 시퀀스를 분석하고, 공격 유형별 표준 상태시퀀스와의 유사성을 측정하여 유형을 판별할 수 있는데, 외부 혹은 내부 환경에 따라 상태 시퀀스가 항상 규칙적으로 추출될 수 없기 때문에, 단순 매칭으로 침입 유형을 판별하기가 어렵다. 본 논문에서는 이러한 문제를 해결하기 위하여 시퀀스의 변형을 효과적으로 고려하는 편집거리(Edit distance)를 이용하여 어떠한 유형의 침입이 발생하였는지를 판별하는 방법을 제안한다. 본 논문에서는 루트권한을 취득하기 위한 대표적인 침입유형으로 가장 널리 쓰이는 버퍼오버플로우 공격에 대해 실험하였는데, 그 결과 세부적인 침입 유형을 잘 판별할 수 있음을 확인하였다.

  • PDF

Named Entity Boundary Recognition Using Hidden Markov Model and Hierarchical Information (은닉 마르코프 모델과 계층 정보를 이용한 개체명 경계 인식)

  • Lim, Heui-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.182-187
    • /
    • 2006
  • This paper proposes a method for boundary recognition of named entity using hidden markov model and ontology information of biological named entity. We uses smoothing method using 31 feature information of word and hierarchical information to alleviate sparse data problem in HMM. The GENIA corpus version 2.1 was used to train and to experiment the proposed boundary recognition system. The experimental results show that the proposed system outperform the previous system which did not use ontology information of hierarchical information and smoothing technique. Also the system shows improvement of execution time of boundary recognition.

  • PDF

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity (비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법)

  • Kim, Pyung Han;Ryu, Kwan-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.9
    • /
    • pp.1291-1306
    • /
    • 2022
  • The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

Data collection strategy for building rainfall-runoff LSTM model predicting daily runoff (강수-일유출량 추정 LSTM 모형의 구축을 위한 자료 수집 방안)

  • Kim, Dongkyun;Kang, Seokkoo
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.10
    • /
    • pp.795-805
    • /
    • 2021
  • In this study, after developing an LSTM-based deep learning model for estimating daily runoff in the Soyang River Dam basin, the accuracy of the model for various combinations of model structure and input data was investigated. A model was built based on the database consisting of average daily precipitation, average daily temperature, average daily wind speed (input up to here), and daily average flow rate (output) during the first 12 years (1997.1.1-2008.12.31). The Nash-Sutcliffe Model Efficiency Coefficient (NSE) and RMSE were examined for validation using the flow discharge data of the later 12 years (2009.1.1-2020.12.31). The combination that showed the highest accuracy was the case in which all possible input data (12 years of daily precipitation, weather temperature, wind speed) were used on the LSTM model structure with 64 hidden units. The NSE and RMSE of the verification period were 0.862 and 76.8 m3/s, respectively. When the number of hidden units of LSTM exceeds 500, the performance degradation of the model due to overfitting begins to appear, and when the number of hidden units exceeds 1000, the overfitting problem becomes prominent. A model with very high performance (NSE=0.8~0.84) could be obtained when only 12 years of daily precipitation was used for model training. A model with reasonably high performance (NSE=0.63-0.85) when only one year of input data was used for model training. In particular, an accurate model (NSE=0.85) could be obtained if the one year of training data contains a wide magnitude of flow events such as extreme flow and droughts as well as normal events. If the training data includes both the normal and extreme flow rates, input data that is longer than 5 years did not significantly improve the model performance.

The Analysis of Liquefaction Evaluation in Ground Using Artificial Neural Network (인공신경망을 이용한 지반의 액상화 가능성 판별)

  • Lee, Song;Park, Hyung-Kyu
    • Journal of the Korean Geotechnical Society
    • /
    • v.18 no.5
    • /
    • pp.37-42
    • /
    • 2002
  • Artificial neural networks are efficient computing techniques that are widely used to solve complex problems in many fields. In this paper a liquefaction potential was estimated by using a back propagation neural network model applicated to cyclic triaxial test data, soil parameters and site investigation data. Training and testing of the network were based on a database of 43 cyclic triaxial test data from 00 sites. The neural networks are trained by modifying the weights of the neurons in response to the errors between the actual output values and the target output value. Training was done iteratively until the average sum squared errors over all the training patterns were minimized. This generally occurred after about 15,000 cycles of training. The accuracy from 72% to 98% was shown for the model equipped with two hidden layers and ten input variables. Important effective input variables have been identified as the NOC,$D_10$ and (N$_1$)$_60$. The study showed that the neural network model predicted a CSR(Cyclic shear stress Ratio) of silty-sand reasonably well. Analyzed results indicate that the neural-network model is more reliable than simplified method using N value of SPT.

Study on Cochlodinium polykrikoides Red tide Prediction using Deep Neural Network under Imbalanced Data (심층신경망을 활용한 Cochlodinium polykrikoides 적조 발생 예측 연구)

  • Bak, Su-Ho;Jeong, Min-Ji;Hwang, Do-Hyun;Enkhjargal, Unuzaya;Kim, Na-Kyeong;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1161-1170
    • /
    • 2019
  • In this study, we propose a model for predicting Cochlodinium polykrikoides red tide occurrence using deep neural networks. A deep neural network with eight hidden layers was constructed to predict red tide occurrence. The 59 marine and meteorological factors were extracted and used for neural network model training using satellite reanalysis data and meteorological model data. The red tide occurred in the entire dataset is very small compared to the case of no red tide, resulting in an unbalanced data problem. In this study, we applied over sampling with adding noise based data augmentation to solve this problem. As a result of evaluating the accuracy of the model using test data, the accuracy was about 97%.

Determination of Pattern Models using a Convergence of Time-Series Data Conversion Technique for the Prediction of Financial Markets (금융시장 예측을 위한 시계열자료의 변환기법 융합을 이용한 패턴 모델 결정)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.237-244
    • /
    • 2015
  • Export-led policies, FTA signed and economics of scale through a variety of market-oriented policies, such as regulations to improve market grew constantly. Accordingly, the correct decision making accurately analyze the economics market for decision, a problem has been an important issue in predicting. For accurate analysis and decision-making of the most common indicators of the stock market by proposing a number of indicators of economic transformation techniques were applied to the convergence model combining estimation and forecasts problem confirmed its effectiveness. Experimental result, gave the model estimation method to apply a transform to show the valid combinations proposed model state estimation result was confirmed in a very similar exercise aspect of the physical problem and the KOSPI index prediction.

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF