• 제목/요약/키워드: Anomaly detection system

Search Result 290, Processing Time 0.026 seconds

Design of Monitoring System for Network RTK (네트워크 RTK 환경에 적합한 감시 시스템 설계)

  • Shin, Mi-Young;Han, Young-Hoon;Ko, Jae-Young;Cho, Deuk-Jae
    • Journal of Navigation and Port Research
    • /
    • v.39 no.6
    • /
    • pp.479-484
    • /
    • 2015
  • Network RTK is a precise positioning technique using carrier phase correction data from reference stations within the network, and is constantly being researched for improved performance. However, the study for the system accuracy has been performed but system integrity research has not been done as much as system accuracy, because network RTK has been mainly used on surveying for static or kinematic positioning. In this paper, adequate monitoring system for network RTK is designed as basis research for integrity monitoring on network RTK. To this, fault tree on network RTK is analyzed, and a countermeasure is prepared to detect and identify the each fault items. Based these algorithms, monitoring system to use on central processing facility is designed for network RTK service.

A Design of Time-based Anomaly Intrusion Detection Model (시간 기반의 비정상 행위 침입탐지 모델 설계)

  • Shin, Mi-Yea;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1066-1072
    • /
    • 2011
  • In the method to analyze the relationship in the system call orders, the normal system call orders are divided into a certain size of system call orders to generates gene and use them as the detectors. In the method to consider the system call parameters, the mean and standard deviation of the parameter lengths are used as the detectors. The attack of which system call order is normal but the parameter values are changed, such as the format string attack, cannot be detected by the method that considers only the system call orders, whereas the model that considers only the system call parameters has the drawback of high positive defect rate because of the information obtained from the interval where the attack has not been initiated, since the parameters are considered individually. To solve these problems, it is necessary to develop a more efficient learning and detecting method that groups the continuous system call orders and parameters as the approach that considers various characteristics of system call related to attacking simultaneously. In this article, we detected the anomaly of the system call orders and parameters by applying the temporal concept to the system call orders and parameters in order to improve the rate of positive defect, that is, the misjudgment of anomaly as normality. The result of the experiment where the DARPA data set was employed showed that the proposed method improved the positive defect rate by 13% in the system call order model where time was considered in comparison with that of the model where time was not considered.

Frequency Domain Pattern Recognition Method for Damage Detection of a Steel Bridge (강교량의 손상감지를 위한 주파수 영역 패턴인식 기법)

  • Lee, Jung Whee;Kim, Sung Kon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.1 s.74
    • /
    • pp.1-11
    • /
    • 2005
  • A bi-level damage detection algorithm that utilizes the dynamic responses of the structure as input and neural network (NN) as pattern classifier is presented. Signal anomaly index (SAI) is proposed to express the amount of changes in the shape of frequency response functions (FRF) or strain frequency response function (SFRF). SAI is calculated using the acceleration and dynamic strain responses acquired from intact and damaged states of the structure. In a bi-level damage identification algorithm, the presence of damage is first identified from the magnitude of the SAI value, then the location of the damage is identified using the pattern recognition capability of NN. The proposed algorithm is applied to an experimental model bridge to demonstrate the feasibility of the algorithm. Numerically simulated signals are used for training the NN, and experimentally-acquired signals are used to test the NN. The results of this example application suggest that the SAI-based pattern recognition approach may be applied to the structural health monitoring system for a real bridge.

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

Anomaly Diagnosis of Rotational Machinery Using Time-Series Vibration Data Based on Time-Distributed CNN-LSTM (시분할 CNN-LSTM 기반의 시계열 진동 데이터를 이용한 회전체 기계 설비의 이상 진단)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.11
    • /
    • pp.1547-1556
    • /
    • 2022
  • As mechanical facilities are interacting with each other, the failure of some equipment can affect the entire system, so it is necessary to quickly detect and diagnose the abnormality of mechanical equipment. This study proposes a deep learning model that can effectively diagnose abnormalities in rotating machinery and equipment. CNN is widely used for feature extraction and LSTMs are known to be effective in learning sequential information. In LSTM, the number of parameters and learning time increase as the length of input data increases. In this study, we propose a method of segmenting an input segment signal into shorter-length sub-segment signals, sequentially inputting them to CNN through a time-distributed method for extracting features, and inputting them into LSTM. A failure diagnosis test was performed using the vibration data collected from the motor for ventilation equipment installed at the urban railway station. The experiment showed an accuracy of 99.784% in fault diagnosis. It shows that the proposed method is effective in the fault diagnosis of rotating machinery and equipment.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

A Study on multi-channel temperature monitoring for the detection of leakage or seepage in dam body (댐 침투수 탐지를 위한 멀티 채널 온도 모니터링 연구)

  • Oh, Seok-Hoon;Kim, Jung-Yul;Park, Han-Gyu;Kim, Hyoung-Soo;Kim, Yoo-Sung
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.1211-1218
    • /
    • 2005
  • Temperature variation according to space and time on the inner parts of engineering constructions(e.g.: dam, slope) can be a basic information for diagnosing their safety problem. In general, as constructions become superannuated, structural deformation(e.g.: cracks, defects) could be occurred by various factors. Seepage or leakage of water through these cracks or defects in old dams will directly cause temperature anomaly. Groundwater level also can be easily observed by abrupt change of temperature on the level. This study shows that the position of seepage or leakage in dam body can be detected by multi-channel temperature monitoring using thermal line sensor. For this, diverse temperature monitoring experiments for a leakage physical model were performed in the laboratory. In field application of an old dam, temperature variations for water depth and for inner parts of boreholes located at downstream slope were measured. Temperature monitoring results for a long time at the bottom of downstream slope of the dam showed the possibility that temperature monitoring can provide the synthetic information about flowing path and quantity of seepage of leakage in dam body.

  • PDF

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

User Behavior Based Web Attack Detection in the Face of Camouflage (정상 사용자로 위장한 웹 공격 탐지 목적의 사용자 행위 분석 기법)

  • Shin, MinSik;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.365-371
    • /
    • 2021
  • With the rapid growth in Internet users, web applications are becoming the main target of hackers. Most previous WAFs (Web Application Firewalls) target every single HTTP request packet rather than the overall behavior of the attacker, and are known to be difficult to detect new types of attacks. In this paper, we propose a web attack detection system based on user behavior using machine learning to detect attacks of unknown patterns. In order to define user behavior, we focus on features excluding areas where an attacker can camouflage as a normal user. The experimental results shows that by using the path and query information to define users' behaviors, best results for an accuracy of 99% with Decision forest.

Designing an GRU-based on-farm power management and anomaly detection automation system (GRU 기반의 농장 내 전력량 관리 및 이상탐지 자동화 시스템 설계)

  • Hyeon seo Kim;Meong Hun Lee
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.18-23
    • /
    • 2024
  • Power efficiency management in smart farms is important due to its link to climate change. As climate change negatively impacts agriculture, future agriculture is expected to utilize smart farms to minimize climate impacts, but smart farms' power consumption may exacerbate the climate crisis due to the current electricity production system. Therefore, it is essential to efficiently manage and optimize the power usage of smart farms. In this study, we propose a system that monitors the power usage of smart farm equipment in real time and predicts the power usage one hour later using GRU. CT sensors are installed to collect power usage data, which are analyzed to detect and prevent abnormal patterns, and combined with IoT technology to efficiently manage and monitor the overall power usage. This helps to optimize power usage, improve energy efficiency, and reduce carbon emissions. The system is expected to improve not only the energy management of smart farms, but also the overall efficiency of energy use.