• Title/Summary/Keyword: Abnormal Detection

Search Result 918, Processing Time 0.029 seconds

Adaptive Sensor/Heterogeneous Infrastructure Integrated Pedestrian Navigation Technology using Rényi Divergence-based Outlier Detection (Rényi Divergence 기반 이상치 검출을 통한 적응형 센서/이종 인프라 통합 보행자 항법 기술)

  • Jae Uk Kwon;Seong Yun Cho;JaeJun Yoo;SeongHun Seo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.289-299
    • /
    • 2024
  • In the Pedestrian Dead Reckoning (PDR)/Global Positioning System (GPS)/Wi-Fi-integrated navigation system for indoor/outdoor continuous positioning of pedestrians, the process of detecting outliers in measurements is very important. When accurate location information from measurements is used, reliable correction data can be generated during the fusion filtering process. However, abnormal measurements may occur in certain situations, such as indoor/outdoor transitions, which can degrade filter performance and lead to significant errors in the estimated position. To address this issue, this paper proposes a method for detecting outliers in measurements based on Rényi Divergence (RD). When the deviation of the RD value is large, the measurements are considered outliers, and positioning is performed using only pure PDR. Based on experiments conducted with real data, it was confirmed that outliers were effectively detected for abnormal measurements, leading to an improvement in the performance of pedestrian navigation.

Quality Evaluation Model for Intrusion Detection System based on Security and Performance (보안성과 성능에 따른 침입탐지시스템의 품질평가 모델)

  • Lee, Ha-Young;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.289-295
    • /
    • 2014
  • Intrusion detection system is a means of security that detects abnormal use and illegal intension in advance in real time and reenforce the security of enterprises. Performance of intrusion detection system is judged by information collection, intrusion analysis, intrusion response, review and protection of intrusion detection result, reaction, loss protection that belong to the area of intrusion detection. In this paper, we developed a evaluation model based on the requirements of intrusion detection system and ISO international standard about software product evaluation.

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

Rank Correlation Coefficient of Energy Data for Identification of Abnormal Sensors in Buildings (에너지 데이터의 순위상관계수 기반 건물 내 오작동 기기 탐지)

  • Kim, Naeon;Jeong, Sihyun;Jang, Boyeon;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.417-422
    • /
    • 2017
  • Anomaly detection is the identification of data that do not conform to a normal pattern or behavior model in a dataset. It can be utilized for detecting errors among data generated by devices or user behavior change in a social network data set. In this study, we proposed a new approach using rank correlation coefficient to efficiently detect abnormal data in devices of a building. With the increased push for energy conservation, many energy efficiency solutions have been proposed over the years. HVAC (Heating, Ventilating and Air Conditioning) system monitors and manages thousands of sensors such as thermostats, air conditioners, and lighting in large buildings. Currently, operators use the building's HVAC system for controlling efficient energy consumption. By using the proposed approach, it is possible to observe changes of ranking relationship between the devices in HVAC system and identify abnormal behavior in social network.

Frequency and Type-distribution of Human Papillomavirus from Paraffin-embedded Blocks of High Grade Cervical Intraepithelial Neoplasia Lesions in Thailand

  • Swangvaree, Sukumarn Sanersak;Kongkaew, Phon;Ngamkham, Jarunya
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.2
    • /
    • pp.1023-1026
    • /
    • 2013
  • Cervical cancer is the most important female gynecological cancer, the second leading cause of cancer mortality in women worldwide and the second most common cancer in Thai women. The major cause of cervical cancer is persistent infection of human papillomavirus (HPV), leading to abnormal epithelial lesions, with progression to precancerous and invasive cancer. This study was conducted to investigate the frequency and type distribution of HPV in Thai women who had abnormal cytology. HPV detection from FFPE confirmed abnormal of high grade cervical intraepithelial lesions were for SPF-10-Innogenic Line Probe Assay. HPV-positivity was detected in 320/355 cases (90.14%) and HPV-negativity in 35/355 (9.86%). HPV-positive was found 147/320 cases (41.4%) of single infection, whereas 173/320 cases (48.7%) showed the multiple HPV infection. The most common seven types were HPV-16, -52, -18, -11, -51, -31 and -33, in that order. HPV 16 and 18, the important oncogenic HPV type, were observed in 64.8% of HSIL cases. Interestingly, a high proportion of multiple infections was found in this study and more than ten types could be detected in one case. Therefore, HPV infection screening program in women is essential, particularly in Thailand. Effective primary and secondary prevention campaigns that reinforce HPV screening for HPV detection and typing may be decrease the incidence and mortality of cervical cancer in the future and may lead to significantly improve the quality of life in Thai women.

The Method of Feature Selection for Anomaly Detection in Bitcoin Network Transaction (비트코인 네트워크 트랜잭션 이상 탐지를 위한 특징 선택 방법)

  • Baek, Ui-Jun;Shin, Mu-Gon;Jee, Se-Hyun;Park, Jee-Tae;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.18-25
    • /
    • 2018
  • Since the development of block-chain technology by Satoshi Nakamoto and Bitcoin pioneered a new cryptocurrency market, a number of scale of cryptocurrency have emerged. There are crimes taking place using the anonymity and vulnerabilities of block-chain technology, and many studies are underway to improve vulnerability and prevent crime. However, they are not enough to detect users who commit crimes. Therefore, it is very important to detect abnormal behavior such as money laundering and stealing cryptocurrency from the network. In this paper, the characteristics of the transactions and user graphs in the Bitcoin network are collected and statistical information is extracted from them and presented as plots on the log scale. Finally, we analyze visualized plots according to the Densification Power Law and Power Law Degree, as a result, present features appropriate for detection of anomalies involving abnormal transactions and abnormal users in the Bitcoin network.

Comparative Learning based Deep Learning Algorithm for Abnormal Beat Detection using Imaged Electrocardiogram Signal (비정상심박 검출을 위해 영상화된 심전도 신호를 이용한 비교학습 기반 딥러닝 알고리즘)

  • Bae, Jinkyung;Kwak, Minsoo;Noh, Kyeungkap;Lee, Dongkyu;Park, Daejin;Lee, Seungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.30-40
    • /
    • 2022
  • Electrocardiogram (ECG) signal's shape and characteristic varies through each individual, so it is difficult to classify with one neural network. It is difficult to classify the given data directly, but if corresponding normal beat is given, it is relatively easy and accurate to classify the beat by comparing two beats. In this study, we classify the ECG signal by generating the reference normal beat through the template cluster, and combining with the input ECG signal. It is possible to detect abnormal beats of various individual's records with one neural network by learning and classifying with the imaged ECG beats which are combined with corresponding reference normal beat. Especially, various neural networks, such as GoogLeNet, ResNet, and DarkNet, showed excellent performance when using the comparative learning. Also, we can confirmed that GoogLeNet has 99.72% sensitivity, which is the highest performance of the three neural networks.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

A study on imaging device sensor data QC (영상장치 센서 데이터 QC에 관한 연구)

  • Dong-Min Yun;Jae-Yeong Lee;Sung-Sik Park;Yong-Han Jeon
    • Design & Manufacturing
    • /
    • v.16 no.4
    • /
    • pp.52-59
    • /
    • 2022
  • Currently, Korea is an aging society and is expected to become a super-aged society in about four years. X-ray devices are widely used for early diagnosis in hospitals, and many X-ray technologies are being developed. The development of X-ray device technology is important, but it is also important to increase the reliability of the device through accurate data management. Sensor nodes such as temperature, voltage, and current of the diagnosis device may malfunction or transmit inaccurate data due to various causes such as failure or power outage. Therefore, in this study, the temperature, tube voltage, and tube current data related to each sensor and detection circuit of the diagnostic X-ray imaging device were measured and analyzed. Based on QC data, device failure prediction and diagnosis algorithms were designed and performed. The fault diagnosis algorithm can configure a simulator capable of setting user parameter values, displaying sensor output graphs, and displaying signs of sensor abnormalities, and can check the detection results when each sensor is operating normally and when the sensor is abnormal. It is judged that efficient device management and diagnosis is possible because it monitors abnormal data values (temperature, voltage, current) in real time and automatically diagnoses failures by feeding back the abnormal values detected at each stage. Although this algorithm cannot predict all failures related to temperature, voltage, and current of diagnostic X-ray imaging devices, it can detect temperature rise, bouncing values, device physical limits, input/output values, and radiation-related anomalies. exposure. If a value exceeding the maximum variation value of each data occurs, it is judged that it will be possible to check and respond in preparation for device failure. If a device's sensor fails, unexpected accidents may occur, increasing costs and risks, and regular maintenance cannot cope with all errors or failures. Therefore, since real-time maintenance through continuous data monitoring is possible, reliability improvement, maintenance cost reduction, and efficient management of equipment are expected to be possible.