• Title/Summary/Keyword: Detection Rate

Search Result 4,549, Processing Time 0.033 seconds

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

STEREO VISION-BASED FORWARD OBSTACLE DETECTION

  • Jung, H.G.;Lee, Y.H.;Kim, B.J.;Yoon, P.J.;Kim, J.H.
    • International Journal of Automotive Technology
    • /
    • v.8 no.4
    • /
    • pp.493-504
    • /
    • 2007
  • This paper proposes a stereo vision-based forward obstacle detection and distance measurement method. In general, stereo vision-based obstacle detection methods in automotive applications can be classified into two categories: IPM (Inverse Perspective Mapping)-based and disparity histogram-based. The existing disparity histogram-based method was developed for stop-and-go applications. The proposed method extends the scope of the disparity histogram-based method to highway applications by 1) replacing the fixed rectangular ROI (Region Of Interest) with the traveling lane-based ROI, and 2) replacing the peak detection with a constant threshold with peak detection using the threshold-line and peakness evaluation. In order to increase the true positive rate while decreasing the false positive rate, multiple candidate peaks were generated and then verified by the edge feature correlation method. By testing the proposed method with images captured on the highway, it was shown that the proposed method was able to overcome problems in previous implementations while being applied successfully to highway collision warning/avoidance conditions, In addition, comparisons with laser radar showed that vision sensors with a wider FOV (Field Of View) provided faster responses to cutting-in vehicles. Finally, we integrated the proposed method into a longitudinal collision avoidance system. Experimental results showed that activated braking by risk assessment using the state of the ego-vehicle and measuring the distance to upcoming obstacles could successfully prevent collisions.

Smoke Detection Method Using Local Binary Pattern Variance in RGB Contrast Imag (RGB Contrast 영상에서의 Local Binary Pattern Variance를 이용한 연기검출 방법)

  • Kim, Jung Han;Bae, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.10
    • /
    • pp.1197-1204
    • /
    • 2015
  • Smoke detection plays an important role for the early detection of fire. In this paper, we suggest a newly developed method that generated LBPV(Local Binary Pattern Variance)s as special feature vectors from RGB contrast images can be applied to detect smoke using SVM(Support Vector Machine). The proposed method rearranges mean value of the block from each R, G, B channel and its intensity of the mean value. Additionally, it generates RGB contrast image which indicates each RGB channel’s contrast via smoke’s achromatic color. Uniform LBPV, Rotation-Invariance LBPV, Rotation-Invariance Uniform LBPV are applied to RGB Contrast images so that it could generate feature vector from the form of LBP. It helps to distinguish between smoke and non smoke area through SVM. Experimental results show that true positive detection rate is similar but false positive detection rate has been improved, although the proposed method reduced numbers of feature vector in half comparing with the existing method with LBP and LBPV.

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

An Analysis on the Identification Rate of Detection System Using Non-Homogeneous Discrete Absorbing Markov Chains (비 동질성 이산시간 흡수마코프체인을 활용한 탐지체계의 식별률 분석에 관한 연구)

  • Kim, Seong-Woo;Yoon, Bong-Kyoo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.2
    • /
    • pp.31-42
    • /
    • 2015
  • The purpose of airborne radars is to detect and identify approaching targets as early as possible. If the targets are identified as enemies, detection systems must provide defense systems with information of the targets to counter. Though many previous studies based on the detection theory of the target have shown various ways to derive detection probability of each radar, optimal arrangement of radars for effective detection, and determination of the search pattern, they did not reflect the fact that most military radar sites run multiple radars in order to increase the accuracy of identifications by radars. In this paper, we propose a model to analyze the probability of identification generated by the multiple radars using non-homogeneous absorbing markov chains. Our results are expected to help the military commanders counter the enemy targets effectively by using radars in a way to maximize the identification rate of targets.

Comparison Speed of Pedestrian Detection with Parallel Processing Graphic Processor and General Purpose Processor (병렬처리 그래픽 프로세서와 범용 프로세서에서의 보행자 검출 처리 속도 비교)

  • Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.2
    • /
    • pp.239-246
    • /
    • 2015
  • Video based object detection is basic technology of implementing smart CCTV system. Various features and algorithms are developed to detect object, however computations of them increase with the performance. In this paper, performances of object detection algorithms with GPU and CPU are compared. Adaboost and SVM algorithm which are widely used to detect pedestrian detection are implemented with CPU and GPU, and speeds of detection processing are compared for the same video. As results of frame rate comparison of Adaboost and SVM algorithm, it is shown that the frame rate with GPU is faster than CPU.

Study on the Development of Road Icing Forecast and Snow Detection System Using State Evaluation Algorithm of Multi Sensoring Method (복합 센서의 상태 판정 알고리즘을 적용한 노면결빙 예측 및 강설 감지 시스템 개발에 관한 연구)

  • Kim, Jong-Woo;Jung, Young-Woo;Nam, Jin-Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.5
    • /
    • pp.113-121
    • /
    • 2013
  • The road icing forecast and snow detection system using state evaluation algorithm of multi sensor optimizes snow melting system to control spread time and amount of chemical spread application This system operates integrated of contact/non-contact sensor and infrared camera. The state evaluation algorithm of the system evaluates road freezing danger condition and snowfall condition (snowfall intensity also) using acquired data such as temperature/humidity, moisture detection and result of image signal processing from field video footage. In the field experiment, it proved excellent and reliable evaluated result of snowfall state detection rate of 89% and wet state detection rate of 94%.

The earth mover's distance and Bayesian linear discriminant analysis for epileptic seizure detection in scalp EEG

  • Yuan, Shasha;Liu, Jinxing;Shang, Junliang;Kong, Xiangzhen;Yuan, Qi;Ma, Zhen
    • Biomedical Engineering Letters
    • /
    • v.8 no.4
    • /
    • pp.373-382
    • /
    • 2018
  • Since epileptic seizure is unpredictable and paroxysmal, an automatic system for seizure detecting could be of great significance and assistance to patients and medical staff. In this paper, a novel method is proposed for multichannel patient-specific seizure detection applying the earth mover's distance (EMD) in scalp EEG. Firstly, the wavelet decomposition is executed to the original EEGs with five scales, the scale 3, 4 and 5 are selected and transformed into histograms and afterwards the distances between histograms in pairs are computed applying the earth mover's distance as effective features. Then, the EMD features are sent to the classifier based on the Bayesian linear discriminant analysis (BLDA) for classification, and an efficient postprocessing procedure is applied to improve the detection system precision, finally. To evaluate the performance of the proposed method, the CHB-MIT scalp EEG database with 958 h EEG recordings from 23 epileptic patients is used and a relatively satisfactory detection rate is achieved with the average sensitivity of 95.65% and false detection rate of 0.68/h. The good performance of this algorithm indicates the potential application for seizure monitoring in clinical practice.

Reviewing And Analysis of The Deadlock Handling Methods

  • El-Sharawy, Enas E.;Ahmed, Thowiba E;Alshammari, Reem H;Alsubaie, Wafaa;Almuhanna, Norah;Alqahtani, Asma
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.230-236
    • /
    • 2022
  • Objectives: The primary goal of this article is to compare the multiple algorithms used for deadlock handling methods and then outline the common method in deadlock handling methods. Methods: The article methodology begins with introducing a literature review studying different algorithms used in deadlock detection and many algorithms for deadlocks prevented, recovered, and avoided. Discussion and analysis of the literature review were done to classify and compare the studied algorithms. Findings: The results showed that the deadlock detection method solves the deadlock. As soon as the real-time deadlock detection algorithm is identified and indicated, it performs better than the non-real-time deadlock detection algorithm. Our novelty the statistics that we get from the percentages of reviewing outcomes that show the most effective rate of 47% is in deadlock prevention. Then deadlock detection and recovery with 28% finally, a rate of 25% for deadlock avoidance.

A Maximum A Posterior Probability based Multiuser Detection Method in Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.51-56
    • /
    • 2022
  • In space based constellation network, users are allowed to enter or leave the network arbitrarily. Hence, the number, identities and transmitted data of active users vary with time and have considerable impacts on the receiver's performance. The so-called problem of multiuser detection means identifying the identity of each active user and detecting the data transmitted by each active user. Traditional methods assume that the number of active users is equal to the maximum number of users that the network can hold. The model of traditional methods are simple and the performance are suboptimal. In this paper a Maximum A Posteriori Probability (MAP) based multiuser detection method is proposed. The proposed method models the activity state of users as Markov chain and transforms multiuser detection into searching optimal path in grid map with BCJR algorithm. Simulation results indicate that the proposed method obtains 2.6dB and 1dB Eb/N0 gains respectively when activity detection error rate and symbol error rate reach 10-3, comparing with reference methods.