• Title/Summary/Keyword: Auto detection

Search Result 354, Processing Time 0.027 seconds

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.

Splog Detection Using Post Structure Similarity and Daily Posting Count (포스트의 구조 유사성과 일일 발행수를 이용한 스플로그 탐지)

  • Beak, Jee-Hyun;Cho, Jung-Sik;Kim, Sung-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.2
    • /
    • pp.137-147
    • /
    • 2010
  • A blog is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse chronological order. Blog search engines, like web search engines, seek information for searchers on blogs. Blog search engines sometimes output unsatisfactory results, mainly due to spam blogs or splogs. Splogs are blogs hosting spam posts, plagiarized or auto-generated contents for the sole purpose of hosting advertizements or raising the search rankings of target sites. This thesis focuses on splog detection. This thesis proposes a new splog detection method, which is based on blog post structure similarity and posting count per day. Experiments based on methods proposed a day show excellent result on splog detection tasks with over 90% accuracy.

Auto-Analysis of Traffic Flow through Semantic Modeling of Moving Objects (움직임 객체의 의미적 모델링을 통한 차량 흐름 자동 분석)

  • Choi, Chang;Cho, Mi-Young;Choi, Jun-Ho;Choi, Dong-Jin;Kim, Pan-Koo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.36-45
    • /
    • 2009
  • Recently, there are interested in the automatic traffic flowing and accident detection using various low level information from video in the road. In this paper, the automatic traffic flowing and algorithm, and application of traffic accident detection using traffic management systems are studied. To achieve these purposes, the spatio-temporal relation models using topological and directional relations have been made, then a matching of the proposed models with the directional motion verbs proposed by Levin's verbs of inherently directed motion is applied. Finally, the synonym and antonym are inserted by using WordNet. For the similarity measuring between proposed modeling and trajectory of moving object in the video, the objects are extracted, and then compared with the trajectories of moving objects by the proposed modeling. Because of the different features with each proposed modeling, the rules that have been generated will be applied to the similarity measurement by TSR (Tangent Space Representation). Through this research, we can extend our results to the automatic accident detection of vehicle using CCTV.

  • PDF

Anomaly Data Detection Using Machine Learning in Crowdsensing System (크라우드센싱 시스템에서 머신러닝을 이용한 이상데이터 탐지)

  • Kim, Mihui;Lee, Gihun
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.475-485
    • /
    • 2020
  • Recently, a crowdsensing system that provides a new sensing service with real-time sensing data provided from a user's device including a sensor without installing a separate sensor has attracted attention. In the crowdsensing system, meaningless data may be provided due to a user's operation error or communication problem, or false data may be provided to obtain compensation. Therefore, the detection and removal of the abnormal data determines the quality of the crowdsensing service. The proposed methods in the past to detect these anomalies are not efficient for the fast-changing environment of crowdsensing. This paper proposes an anomaly data detection method by extracting the characteristics of continuously and rapidly changing sensing data environment by using machine learning technology and modeling it with an appropriate algorithm. We show the performance and feasibility of the proposed system using deep learning binary classification model of supervised learning and autoencoder model of unsupervised learning.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

A Numerical Algorithm for Fault Location Estimation and Arc Faults Detection for Auto-Reclosure (자동 재폐로기의 동작책무를 위한 아크전압 판정 및 사고거리 표정 알고리즘)

  • Kim, Byeong-Man;Chae, Myeong-Suk;Zheng, Tai-Ying;Kang, Yong-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.7
    • /
    • pp.1294-1303
    • /
    • 2009
  • This paper presents a new numerical algorithm for fault discrimination and fault location estimation when occur to arcing ground and arcing line to line on transmission lines. The object of this paper is developed from new numerical algorithm to calculate the fault distance and simultaneously to make a distinction between transient and permanent faults. so the first of object for propose algorithm would be distinguish the permanent from the transient faults. This arcing fault discrimination algorithm is used if calculated value of arc voltage amplitude is greater than product of arc voltage gradient and the length of the arc path, which is equal or greater than the flashover length of a suspension insulator string[1-3]. Also, each algorithm is separated from short distance and long distance. This is difference to with/without capacitance between short to long distance. To test the validity of the proposed algorithms, the results of algorithm testing through various computer simulations are given. The test was simulated in EMTP/ATP simulator under a number of scenarios and calculate of algorithm was used to MATLAB.

Novel Gain Control Scheme of Efficient Signal Detection Technique for Multiple Access VLC Systems (다중 접속 가시광 통신을 위한 신호 검출 기법의 게인 조절)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.1
    • /
    • pp.32-36
    • /
    • 2016
  • In this paper, a transceiver of VLC (Visible Light Communication) using LED white lighting has been implemented. We analyzed differences between conventional wireless communication and VLC with high-speed data transmission in a variety of environments, and confirmed symbols which passed through a channel using QAM. In order to get a high data rate, we found some variables that should be considered essentially though experiments. In addition, we set a bandwidth and found an optimal gain according to the distance between transmitter and receiver. We analyzed proposed system model through Labview and finally showed a system performance and to efficient data transmission and detection for VLC, we apply the orthogonal sequences to VLC system.

Performance Improvement of STDR Scheme Employing Sign Correlator (부호 상관기를 활용한 STDR 기법의 탐지 성능 개선)

  • Han, Jeong Jae;Noh, Sanguk;Park, So Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.990-996
    • /
    • 2015
  • This paper proposes an enhanced scheme adding a sign detector at the front of the correlator in STDR (sequence time domain reflectometry) system. We have executed simulations to show the improvement of detection performance in two fault types and various fault locations. Consequently, it can be shown that the proposed scheme improves the detection performance of the location of far-fault without increasing the computational complexity.

Single-pixel Autofocus with Plasmonic Nanostructures

  • Seok, Godeun;Choi, Seunghwan;Kim, Yunkyung
    • Current Optics and Photonics
    • /
    • v.4 no.5
    • /
    • pp.428-433
    • /
    • 2020
  • Recently, the on-chip autofocus (AF) function has become essential to the CMOS image sensor. An auto-focus usually operates using phase detection of the photocurrent difference from a pair of AF pixels that have focused or defocused. However, the phase-detection method requires a pair of AF pixels for comparison of readout. Therefore, the pixel variation may reduce AF performance. In this paper, we propose a color-selective AF pixel with a plasmonic nanostructure in a 0.9 μ㎡ pixel. The suggested AF pixel requires one pixel for AF function. The plasmonic nanostructure uses metal-insulator-metal (MIM) stack arrays instead of a color filter (CF). The color filters are formed at the subwavelength, and they transmit the specific wavelength of light according to the stack period and incident angles. For the optical analysis of the pixel, a finite-difference time-domain (FDTD) simulation was conducted. The analysis showed that the MIM stack arrays in the pixels perform as an AF pixel. As the primary metric of AF performance, the resulting AF contrasts are 1.8 for the red pixels, 1.6 for green, and 1.5 blue. Based on the simulation results, we confirmed the autofocusing performance of the MIM stack arrays.

Algorithm of an automated auditory brainstem response neonatal hearing screening method (신생아를 대상으로한 청성뇌간유발반응의 자동 판독 알고리즘)

  • Jung, Won-Hyuk;Hong, Hyun-Ki;Kim, Sung-Woo;Kim, Jin-Tae;Park, Joong-Hoon;Kim, Deok-Won
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.825-826
    • /
    • 2006
  • In this paper, we propose an algorithm that applies Rolle's theorem to automatically detect and label peak III and V of the normal, suprathreshold auditory brainstem response (ABR). ABR waveform were recorded from 55 normal-hearing ears at screening levels varying from 30 to 60 dBnHL. For each ABR waveform, the peak-finding algorithm proceeded in fourth steps: (1) Select maximum and minimum values of the target ABR waveform, (2) divide this range into n equal parts, (3) effective candidate peaks in the ABR waveform are identified using Rolle's theorem (4) peak III and V are identified from these candidate peaks based on their latency and morphology. As a result, proposed auto dectection method showed high correlation and accuracy with manual detection method performed by clinician. By using proposed algorithm, clinician can detect and label peak III and V faster and more efficient than manual detection method.

  • PDF