• 제목/요약/키워드: Detection Metrics

검색결과 159건 처리시간 0.033초

엔트로피를 이용한 이상 트래픽 측정: 실제 사례를 통한 접근 (Anomalous Traffic Measurement using Entropy: An Empirical Study)

  • 김정현;원유집
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2007년도 하계종합학술대회 논문집
    • /
    • pp.59-60
    • /
    • 2007
  • Entropy, one of leading metrics on anomalous traffic, attracts researcher's attention since a packet sampling and a traffic volume impact little on entropy value. In this paper, we apply the entropy metric to a domestic network traffic trace which has real anomalous traffics. We used source IP address/port and destination IP address/port that are important attributes of a packet as entropy variable We found that entropy value of multiple-port DoS attack shows something related to a staircase fashion. Also, we show a Possibility of detection of anomalous traffic on small time scale.

  • PDF

표절검사를 위한 프로그램 추적기법 (The Tracing Method of Program for Plagiarism Detection)

  • 지정훈;우균;조환규
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 추계학술발표대회
    • /
    • pp.709-712
    • /
    • 2006
  • 표절을 검사하는 방법으로는 문서 내의 특정 정보들을 추출하여 비교하는 지문법(fingerprint)과 파스트리(parse tree)와 같이 프로그램의 특정한 구조를 이용하여 문서의 구조적 유사성을 검사하는 구조적(structure metrics) 검사방법들이 있다. 본 논문에서는 표절검사를 위한 프로그램 추적 기법을 제안한다. 프로그램 추적 기법은 프로그램을 구문단계에서 정적으로 수행을 하여 그 수행되는 함수들의 순서에 따라 주요 키워드를 추출하여 새롭게 정렬하는 방법이다. 실험결과 사용하지 않는 코드 삽입, 함수 위치 변경 및 합성 등과 같은 표절 스펙트럼에서 정의한 표절 방법에 대하여 효과적으로 검출할 수 있었다.

  • PDF

VHDL 모델의 상위레벨고장 검출방법 (New Fault-detection Methodology of high-level event in VHDL models)

  • 김강철
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.651-654
    • /
    • 2004
  • 본 연구에서는 HDL에서 블록 사이, 프로세스문장, 또는 일을 할당하는 순서를 조절하는 상위레벨 사건을 하위레벨 사건과 비교하여 정의하며, 상위레벨 사건은 자원충돌과 프로토콜 또는 사양의존 충돌로 구성된다는 것을 보여준다. 그리고 상위레벨 사건을 검출하기 위하여 2가지 검출방법이 제안된다.

  • PDF

Highly Accurate Approximate Multiplier using Heterogeneous Inexact 4-2 Compressors for Error-resilient Applications

  • Lee, Jaewoo;Kim, HyunJin
    • 대한임베디드공학회논문지
    • /
    • 제16권5호
    • /
    • pp.233-240
    • /
    • 2021
  • We propose a novel, highly accurate approximate multiplier using different types of inexact 4-2 compressors. The importance of low hardware costs leads us to develop approximate multiplication for error-resilient applications. Several rules are developed when selecting a topology for designing the proposed multiplier. Our highly accurate multiplier design considers the different error characteristics of adopted compressors, which achieves a good error distribution, including a low relative error of 0.02% in the 8-bit multiplication. Our analysis shows that the proposed multiplier significantly reduces power consumption and area by 45% and 26%, compared with the exact multiplier. Notably, a trade-off relationship between error characteristics and hardware costs can be achieved when considering those of existing highly accurate approximate multipliers. In the image blending, edge detection and image sharpening applications, the proposed 8-bit approximate multiplier shows better performance in terms of image quality metrics compared with other highly accurate approximate multipliers.

입술영역 분할을 위한 CIELuv 칼라 특징 분석 (Analysis of CIELuv Color feature for the Segmentation of the Lip Region)

  • 김정엽
    • 한국멀티미디어학회논문지
    • /
    • 제22권1호
    • /
    • pp.27-34
    • /
    • 2019
  • In this paper, a new type of lip feature is proposed as distance metric in CIELUV color system. The performance of the proposed feature was tested on face image database, Helen dataset from University of Illinois. The test processes consists of three steps. The first step is feature extraction and second step is principal component analysis for the optimal projection of a feature vector. The final step is Otsu's threshold for a two-class problem. The performance of the proposed feature was better than conventional features. Performance metrics for the evaluation are OverLap and Segmentation Error. Best performance for the proposed feature was OverLap of 65% and 59 % of segmentation error. Conventional methods shows 80~95% for OverLap and 5~15% of segmentation error usually. In conventional cases, the face database is well calibrated and adjusted with the same background and illumination for the scene. The Helen dataset used in this paper is not calibrated or adjusted at all. These images are gathered from internet and therefore, there are no calibration and adjustment.

저조도 환경 감시 영상에서 시공간 패치 프레임을 이용한 이상행동 분류 (Spatiotemporal Patched Frames for Human Abnormal Behavior Classification in Low-Light Environment)

  • ;공성곤
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.634-636
    • /
    • 2023
  • Surveillance systems play a pivotal role in ensuring the safety and security of various environments, including public spaces, critical infrastructure, and private properties. However, detecting abnormal human behavior in lowlight conditions is a critical yet challenging task due to the inherent limitations of visual data acquisition in such scenarios. This paper introduces a spatiotemporal framework designed to address the unique challenges posed by low-light environments, enhancing the accuracy and efficiency of human abnormality detection in surveillance camera systems. We proposed the pre-processing using lightweight exposure correction, patched frames pose estimation, and optical flow to extract the human behavior flow through t-seconds of frames. After that, we train the estimated-action-flow into autoencoder for abnormal behavior classification to get normal loss as metrics decision for normal/abnormal behavior.

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung;Lee, Seonghun;Kim, Young-Woo;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권1호
    • /
    • pp.19-28
    • /
    • 2017
  • False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.

자동차 BSR 소음특성과 음질 인덱스 개발 (Development of Sound Quality Index with Characterization of BSR Noise in a Vehicle)

  • 신수현;김덕환;정철웅
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2012년도 춘계학술대회 논문집
    • /
    • pp.447-452
    • /
    • 2012
  • Among the various elements affecting a customer's evaluation of automobile quality, buzz, squeak and rattle (BSR) are considered to be major factors. In most vehicle manufacturers, the BSR problems are solved by find-fix method with the vehicle road test, mainly due to various excitation sources, complex generation mechanism and subjective response. The aim of this paper is to develop the integrated experimental method to systematically tackle the BSR problems in early stage of the vehicle development cycle by resolving these difficulties. To achieve this aim, the developed experimental method ought to include the following requirements: to find and fix the BSR problem for modules instead of a full vehicle in order to tackle the problem in the early stage of the vehicle development cycle; to develop the exciter system including the zig and road-input-signal reproducing algorithm; to automatically localize the source region of BSR; to develop sound quality index that can be used to assess the subjective responses to BSR. Also, the BSR sound quality indexes based on the Zwicker's sound quality parameters using a multiple regression analysis. The four sound metrics from Zwicker's sound quality parameter are computed for the signals recorded for eight BSR noise source regions localized by using the acoustic-field visualized results. Then, the jury test of BSR noise are performed for participants. On a basis of the computed sound metrics and jury test result, sound quality index is developed to represent the harsh of BSR noise. It is expected that the developed BSR detection system and sound quality indexes can be used to reduce the automotive interior BSR noise in terms of subjective levels as well as objective levels.

  • PDF

스테가노그래피 소프트웨어 분석 연구 - 성능 비교 중심으로 (Steganography Software Analysis -Focusing on Performance Comparison)

  • 이효주;박용석
    • 한국정보통신학회논문지
    • /
    • 제25권10호
    • /
    • pp.1359-1368
    • /
    • 2021
  • 스테가노그래피는 데이터 안에 데이터를 은폐하는 기술로, 전달 매체의 존재가 발각되지 않도록 하는 것이 주요목적이다. 현재 스테가노그래피 관련 연구는 알고리즘을 기반으로 정립된 은닉 기법, 검출 기법들에 관련해서 다양하게 연구되고 있지만, 소프트웨어 성능을 분석하기 위한 실험 중심의 연구는 상대적으로 부족하다. 본 논문은 서로 다른 알고리즘으로 데이터를 은폐하는 다섯 개의 스테가노그래피 소프트웨어의 특징을 파악하고, 평가하는 데 목적을 두었다. 스테가노그래피 소프트웨어의 성능 조사를 위하여 시각 평가 척도로 사용되는 PSNR(Peak Signal to Noise Ratio), SSIM(Structural SIMilarity)을 이용하였다. 스테가노그래피 소프트웨어를 통하여 임베딩한 스테고 이 미지들의 PSNR, SSIM을 도출하여 정량적 성능 비교 분석한다. 평가 척도에 따라 우수한 스테가노그래피 소프트웨어를 소개하여 포렌식에 기여 하고자 한다.

Drug-Drug Interaction Prediction Using Krill Herd Algorithm Based on Deep Learning Method

  • Al-Marghilani, Abdulsamad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.319-328
    • /
    • 2021
  • Parallel administration of numerous drugs increases Drug-Drug Interaction (DDI) because one drug might affect the activity of other drugs. DDI causes negative or positive impacts on therapeutic output. So there is a need to discover DDI to enhance the safety of consuming drugs. Though there are several DDI system exist to predict an interaction but nowadays it becomes impossible to maintain with a large number of biomedical texts which is getting increased rapidly. Mostly the existing DDI system address classification issues, and especially rely on handcrafted features, and some features which are based on particular domain tools. The objective of this paper to predict DDI in a way to avoid adverse effects caused by the consumed drugs, to predict similarities among the drug, Drug pair similarity calculation is performed. The best optimal weight is obtained with the support of KHA. LSTM function with weight obtained from KHA and makes bets prediction of DDI. Our methodology depends on (LSTM-KHA) for the detection of DDI. Similarities among the drugs are measured with the help of drug pair similarity calculation. KHA is used to find the best optimal weight which is used by LSTM to predict DDI. The experimental result was conducted on three kinds of dataset DS1 (CYP), DS2 (NCYP), and DS3 taken from the DrugBank database. To evaluate the performance of proposed work in terms of performance metrics like accuracy, recall, precision, F-measures, AUPR, AUC, and AUROC. Experimental results express that the proposed method outperforms other existing methods for predicting DDI. LSTMKHA produces reasonable performance metrics when compared to the existing DDI prediction model.