• Title/Summary/Keyword: 탐지 효과도 분석

Search Result 490, Processing Time 0.026 seconds

Modeling and Simulation for Evaluating the Submarine Detection Capability of ASW Missions for an Anti Submarine Helicopter (잠수함 탐지 효과도 증대를 위한 대잠 헬기 임무 할당 방안 연구)

  • Yu, Chan-Woo;Kim, Jae-Ick;Kim, Cheol-Ho;Jung, Young-Ran;Park, Sung-Woon
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.2
    • /
    • pp.59-66
    • /
    • 2011
  • In this paper, a method to allocate a submarine search mission to an ASW(Anti-Submarine Warfare) helicopter is proposed. The aim of the proposed method is to increase the submarine detection capability. For this purpose, we modeled the behaviors that the ASW helicopter conduct during the search mission, and the relations between the behaviors are also modeled. To measure quantitatively the effectiveness of ASW search mission, the measure of effectiveness(MOP) is defined. Scenarios are designed to analyze the effectiveness utilizing the ASW mission model. We conducted simulations applying the designed scenarios and some parameters concerned with the friendly ship and the enemy submarine interacting each other in the ASW missions. We analyzed the result of simulation depending on the dipping interval and the pattern of dipping positions in the situation that the helicopter operates for a long time and should resupply several times on the friendly ship. From the analyzed data, we suggested the practical value of ratio between the detectable range of the sonar and the dipping interval to improve the effectiveness of ASW mission.

Analyses of Detection Techniques of Malicious Code in the Homepage (홈페이지에 삽입된 악성코드 및 피싱과 파밍 탐지를 위한 웹 로봇의 설계 및 구현)

  • Kim, Dae-Yu;Kang, Chang-Ku;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.251-254
    • /
    • 2008
  • 본 논문에서 제안하는 웹 서버 취약점 및 악성코드를 탐지하는 웹 로봇의 기술은 인터넷에서 개인정보보호사고의 원인분석을 통해 도출된 요구기능을 통합 구현하는 기술로 인터넷 이용자의 개인정보 피해 원인을 종합적으로 처리한다는 측면에서 효과가 크다. 인터넷에서 개인정보를 유출하는 홈페이지의 악성 코드 및 피싱과 파밍을 종합적으로 탐지기술을 구현함으로써 개인정보를 유출하기 위하여 사용되는 홈페이지의 악성 코드 및 피싱과 파밍 사이트로 유도되는 웹사이트를 탐지 할 수 있다.

  • PDF

A Study on the Document Copy Detection System for Protection of Digital Document Contents (디지털 문서 콘텐츠 보호를 위한 문서 복제 탐지 시스템에 관한 연구)

  • Kim, Heon
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.199-205
    • /
    • 2006
  • Due to easy access to information in our digital society, there are many cases of illegal counterfeiting and usage of personal information. Producing information with investment and effort is important indeed, but managing and protecting information is becoming a furthermore important issue. This is to promote a new detecting theory and solution for cases of intellectual property violations and plagiarizing digital contents.

  • PDF

Detection Models for Intrusion Types based on Data Mining (데이터 마이닝 기반의 침입유형별 탐지 모델)

  • Kim, Sang-Young;Woo, Chong-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2049-2052
    • /
    • 2003
  • 인터넷의 급속한 발전으로 인한 유용성 이면에는, 공공 시스템에 대한 악의적인 침입에 따른 피해가 날로 증가되고 있다. 이에 대비하기 위한 침입 탐지 시스템들이 소개되고 있으나, 공격의 형태가 다양하게 변화되고 있기 때문에 침입탐지 시스템도 이에 대비할 수 있도록 지속적인 연구 노력이 필요하다. 최근의 다양한 연구노력 중에는 데이터 마이닝 기법을 이용하여 침입자의 정보를 분석하는 연구가 활발히 진행되고 있다. 본 논문에서는 데이터 마이닝 기법을 사용하여 KDD CUP 99의 훈련 집합(Training Set)을 기반으로 효과적인 분류를 하기 위한 모델을 제시하였다. 제시된 모델에서는 휴리스틱을 적용하여 효과적으로 필요한 데이터를 생성할 수 있었으며, 또한 각 공격 유형마다 분류자를 두어 보다 정확하고 효율적인 탐지가 가능하도록 하였다.

  • PDF

A Study on False Positive Alert reduction using HVIDB of Target Host (HVIDB를 이용한 해당 호스트의 오탐율 경고 발생 감소에 관한 연구)

  • 김태훈;이금석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.481-483
    • /
    • 2004
  • NIDS(Network Intrusion Detection System)는 공격 탐지 과정에서 대량의 로그가 발생하게 되는데 일반적인 침입탐지 시스템에서 탐지되어 하루에 남는 로그만으로도 시스템에 막대한 양을 차지한다 이러한 문제점은 관리자에게 많은 부담을 줄뿐만 아니라 그렇게 남겨진 로그에는 오탐율(False Positive) 비율이 높기 때문에 관리자가 실제로 위협적인 침입을 식별하고, 침입 행위에 대한 빠른 대응을 어렵게 만든다. 그러므로 NIDS와 특정 호스트가 가지고 있는 보안상 취약한 부분을 비교하여 판단할 수 있는 침입탐지시스템을 선택, 운용하는 것은 관리측면이나 대응측면에서 매우 중요한 일이라고 할 수 있다. 본 논문에서는 NIDS와 해당 호스트 취약점 정보를 이용해 작성된 데이터베이스(HVIDB : Host Vulnerability Information Database)를 이용하여 호스트의 취약성에 관한 로그만을 최종 경고해줌으로써 오탐율의 양을 감소시키고 호스트 보안성의 향상과 관리자가 로그분석 등의 IDS 업무를 효과적으로 할 수 있는 모델을 제시한다.

  • PDF

Implementation of Web Searching Robot for Detecting of Phishing and Pharming in Homepage (홈페이지에 삽입된 악성코드 및 피싱과 파밍 탐지를 위한 웹 로봇의 설계 및 구현)

  • Kim, Dae-Yu;Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1993-1998
    • /
    • 2008
  • Web robot engine for searching web sever vulnerability and malicious code is proposed in this paper. The main web robot function is based on searching technology which is derived from analyses of private information threat. We implemented the detecting method for phishing, pharming and malicious code on homepage under vulnerable surroundings. We proposed a novel approachm which is independent of any specific phishing implementation. Our idea is to examine the anomalies in web pages.

Effect of Experimental Paradigms on Reaction Time-based Concealed Information Test (반응시간기반 숨긴정보검사에 대한 실험 패러다임의 효과)

  • Eom, Jin-Sup
    • Science of Emotion and Sensibility
    • /
    • v.24 no.2
    • /
    • pp.3-12
    • /
    • 2021
  • Most researchers have experimentally evaluated the detection efficiency of reaction time-based concealed information tests (RT CIT). In experimental studies, two experimental paradigms have been mainly used to create a lying situation, mock-crime paradigm and personal-item paradigm. This study is aimed at testing the detection efficiency of RT CIT for the one that could be estimated as the same as the other, regardless of the experimental paradigms. In study 1, it was tested whether the effect size of RT CIT was different in the two experimental paradigms through meta-analysis. As a result of the meta-analysis of 39 studies, the effect size (Hedges'g = 1.330) of the mock-crime paradigm was slightly larger than that (Hedges'g = 1.145) of the personal-item paradigm, but no statistically significant difference was found. Study 2 was an experimental study using both the mock-crime and personal-item paradigms, it was conducted to determine whether the detection efficiency of RT CIT differs in the two experimental paradigms. As a result of ANOVA, it was found that the RT differences between the probe and irrelevant stimuli were not significant in the two experimental paradigms. In the experimental study, the effect size (Cohen's d) of the mock-crime and personal-item paradigms were 1.638 and 1.535, respectively. In the discussion section, the reason of the detection efficiency of RT CIT not affected by the experimental paradigms was discussed.

The Effectiveness Analysis of Multistatic Sonar Network Via Detection Peformance (표적탐지성능을 이용한 다중상태 소나의 효과도 분석)

  • Jang, Jae-Hoon;Ku, Bon-Hwa;Hong, Woo-Young;Kim, In-Ik;Ko, Han-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.24-32
    • /
    • 2006
  • This paper is to analyze the effectiveness of multistatic sonar network based on detection performance. The multistatic sonar network is a distributed detection system that places a source and multi-receivers apart. So it needs a detection technique that relates to decision rule and optimization of sonar system to improve the detection performance. For this we propose a data fusion procedure using Bayesian decision and optimal sensor arrangement by optimizing a bistatic sonar. Also, to analyze the detection performance effectively, we propose the environmental model that simulates a propagation loss and target strength suitable for multistatic sonar networks in real surroundings. The effectiveness analysis on the multistatic sonar network confirms itself as a promising tool for effective allocation of detection resources in multistatic sonar system.

A Discussion of the Two Alternative Methods for Quantifying Changes : by Pixel Values Versus by Thematic Categories (변화의 정량화 방법에 관한 고찰 : 픽셀값 대 분류항목별)

  • Choung, Song-Hak
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.1 s.1
    • /
    • pp.193-201
    • /
    • 1993
  • In a number of areas, there are important benefits to be gained when we bring both the detection and monitoring abilities of remote sensing as well as the philosophical approach and analytic capabilities of a geographic information system to bear on a problem. A key area in the joint applications of remote sensing technology and GIS is to identify change. Whether this change is of interest for its own sake, or because the change causes us to act (for example, to update a map), remote sensing provides an excellent suite of tools for detecting change. At the same time, a GIS is perhaps the best analytic toot for quantifying the process of change. There are two alternative methods for quantifying changes. The conceptually simple approach is to un the pixel values in each of the images. This method is practical but may be too simple to identify the variety of changes in a complex scene. The common alternative is called symbolic change detection. The analyst first decides on a set of thematic categories that are important to distinguish for the application. This approach is useful only if accurate landuse/cover classifications can be obtained. Persons conducting digital change detection must be intimately familiar with the environment under study, the quality of the data set and the characteristics of change detection algorithms. Also, much work remains to identify optimum change detection algorithms for specific geographic areas and problems.

  • PDF

Comparative Analysis among Radar Image Filters for Flood Mapping (홍수매핑을 위한 레이더 영상 필터의 비교분석)

  • Kim, Daeseong;Jung, Hyung-Sup;Baek, Wonkyung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.1
    • /
    • pp.43-52
    • /
    • 2016
  • Due to the characteristics of microwave signals, Radar satellite image has been used for flood detection without weather and time influence. The more methods of flood detection were developed, the more detection rate of flood area has been increased. Since flood causes a lot of damages, flooded area should be distinguished from non flooded area. Also, the detection of flood area should be accurate. Therefore, not only image resolution but also the filtering process is critical to minimize resolution degradation. Although a resolution of radar images become better as technology develops, there were a limited focused on a highly suitable filtering methods for flood detection. Thus, the purpose of this study is to find out the most appropriate filtering method for flood detection by comparing three filtering methods: Lee filter, Frost filter and NL-means filter. Therefore, to compare the filters to detect floods, each filters are applied to the radar image. Comparison was drawn among filtered images. Then, the flood map, results of filtered images are compared in that order. As a result, Frost and NL-means filter are more effective in removing the speckle noise compared to Lee filter. In case of Frost filter, resolution degradation occurred severly during removal of the noise. In case of NL-means filter, shadow effect which could be one of the main reasons that causes false detection were not eliminated comparing to other filters. Nevertheless, result of NL-means filter shows the best detection rate because the number of shadow pixels is relatively low in entire image. Kappa coefficient is scored 0.81 for NL-means filtered image and 0.55, 0.64 and 0.74 follows for non filtered image, Lee filtered image and Frost filtered image respectively. Also, in the process of NL-means filter, speckle noise could be removed without resolution degradation. Accordingly, flooded area could be distinguished effectively from other area in NL-means filtered image.