• Title/Summary/Keyword: Detection Rule

Search Result 442, Processing Time 0.026 seconds

Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident (전기통신금융사기 사고에 대한 이상징후 지능화(AI) 탐지 모델 연구)

  • Jeong, Eui-seok;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.149-164
    • /
    • 2019
  • Digital Transformation and the Fourth Industrial Revolution, electronic financial services should be provided safely in accordance with rapidly changing technology changes in the times of change. However, telecommunication finance fraud (voice phishing) accidents are currently ongoing, and various efforts are being made to eradicate accidents such as legal amendment and improvement of policy system in order to cope with continuous increase, intelligence and advancement of accidents. In addition, financial institutions are trying to prevent fraudulent accidents by improving and upgrading the abnormal financial transaction detection system, but the results are not very clear. Despite these efforts, telecommunications and financial fraud incidents have evolved to evolve against countermeasures. In this paper, we propose an intelligent over - the - counter financial transaction system modeled through scenario - based Rule model and artificial intelligence algorithm to prevent financial transaction accidents by voice phishing. We propose an implementation model of artificial intelligence abnormal financial transaction detection system and an optimized countermeasure model that can block and respond to analysis and detection results.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

A Study on method development of parameter estimation for real-time QRS detection (실시간 QRS 검출을 위한 파라미터 estimation 기법에 관한 연구)

  • Kim, Eung-Suk;Lee, Jeong-Whan;Yoon, Ji-Young;Lee, Myoung-Ho
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1995 no.11
    • /
    • pp.193-196
    • /
    • 1995
  • An algorithm using topological mapping has been developed for a real-time detection of the QRS complexes of ECG signals. As a measurement of QRS complex energy, we used topological mapping from one dimensional sampled ECG signals to two dimensional vectors. These vectors are reconstructed with the sampled ECG signals and the delayed ones. In this method, the detection rates of CRS complex vary with the parameters such as R-R interval average and peak detection threshold coefficient. We use mean, median, and iterative method to determint R-R interval average and peak estimation. We experiment on various value of search back coefficient and peak detection threshold coefficient to find optimal rule.

  • PDF

A Criterion on Profiling for Anomaly Detection (이상행위 탐지를 위한 프로파일링 기준)

  • 조혁현;정희택;김민수;노봉남
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.544-551
    • /
    • 2003
  • Internet as being generalized, intrusion detection system is needed to protect computer system from intrusions synthetically. We propose a criterion on profiling for intrusion detection system using anomaly detection. We present the cause of false positive on profiling and propose anomaly method to control this. Finally, we propose similarity function to decide whether anomaly action or not for user pattern using pattern database.

Optimizing of Intrusion Detection Algorithm Performance and The development of Evaluation Methodology (침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발)

  • Shin, Dae Cheol;Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.125-137
    • /
    • 2012
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. For such reason, lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

A Study of Stable Intrusion Detection for MANET (MANET에서 안정된 침입탐지에 관한 연구)

  • Yang, Hwan-Seok;Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2012
  • MANET composed of only moving nodes is concerned to core technology to construct ubiquitous computing environment. Also, it is a lack of security because of no middle infrastructure. So, it is necessary to intrusion detection system which can track malicious attack. In this study, cluster was used to stable intrusion detection, and rule about various attacks was defined to detect accurately attack that seems like network problem. Proposed method through experience was confirmed that stable detection rate was showed although number of nodes increase.

Collision prediction and detection in a dynamic environment (동적 환경하에서의 충돌 예측 및 감지)

  • 한인환;양우석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.309-314
    • /
    • 1992
  • Many dynamic mechanical systems, such as parts-feeders, walking machines, and percussive power tools, are described by equations of motion which are discontinuous. The discontinuities result from kinematic constraint changes which are difficult to foresee, especially in presence of impact. A simulation algorithm for these types of systems must be able to algorithmically predict and detect the kinematic constraint changes without any prior knowledge of the system's motion. This paper presents a rule-based approach to the prediction and detection of kinematic constraint changes between bodies with arc and line boundaries. The developed algorithm's ability to accurately and automatically detect the unpredicted changes of kinematic constraints is demonstrated with a numerical example.

  • PDF

A Study on Integrated Fire Alarm System for Safe Urban Transit (안전한 도시철도를 위한 통합 화재 경보 시스템 구축의 연구)

  • Chang, Il-Sik;Ahn, Tae-Ki;Jeon, Ji-Hye;Cho, Byung-Mok;Park, Goo-Man
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.768-773
    • /
    • 2011
  • Today's urban transit system is regarded as the important public transportation service which saves passengers' time and provides the safety. Many researches focus on the rapid and protective responses that minimize the losses when dangerous situation occurs. In this paper we proposed the early fire detection and corresponding rapid response method in urban transit system by combining automatic fire detection for video input and the sensor system. The fire detection method consists of two parts, spark detection and smoke detection. At the spark detection, the RGB color of input video is converted into HSV color and the frame difference is obtained in temporal direction. The region with high R values is considered as fire region candidate and stepwise fire detection rule is applied to calculate its size. At the smoke detection stage, we used the smoke sensor network to secure the credibility of spark detection. The proposed system can be implemented at low prices. In the future work, we would improve the detection algorithm and the accuracy of sensor location in the network.

  • PDF

Violation Pattern Analysis for Good Manufacturing Practice for Medicine using t-SNE Based on Association Rule and Text Mining (우수 의약품 제조 기준 위반 패턴 인식을 위한 연관규칙과 텍스트 마이닝 기반 t-SNE분석)

  • Jun-O, Lee;So Young, Sohn
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.717-734
    • /
    • 2022
  • Purpose: The purpose of this study is to effectively detect violations that occur simultaneously against Good Manufacturing Practice, which were concealed by drug manufacturers. Methods: In this study, we present an analysis framework for analyzing regulatory violation patterns using Association Rule Mining (ARM), Text Mining, and t-distributed Stochastic Neighbor Embedding (t-SNE) to increase the effectiveness of on-site inspection. Results: A number of simultaneous violation patterns was discovered by applying Association Rule Mining to FDA's inspection data collected from October 2008 to February 2022. Among them there were 'concurrent violation patterns' derived from similar regulatory ranges of two or more regulations. These patterns do not help to predict violations that simultaneously appear but belong to different regulations. Those unnecessary patterns were excluded by applying t-SNE based on text-mining. Conclusion: Our proposed approach enables the recognition of simultaneous violation patterns during the on-site inspection. It is expected to decrease the detection time by increasing the likelihood of finding intentionally concealed violations.

The Effectiveness Analysis of Multistatic Sonar Network Via Detection Peformance (표적탐지성능을 이용한 다중상태 소나의 효과도 분석)

  • Jang, Jae-Hoon;Ku, Bon-Hwa;Hong, Woo-Young;Kim, In-Ik;Ko, Han-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.24-32
    • /
    • 2006
  • This paper is to analyze the effectiveness of multistatic sonar network based on detection performance. The multistatic sonar network is a distributed detection system that places a source and multi-receivers apart. So it needs a detection technique that relates to decision rule and optimization of sonar system to improve the detection performance. For this we propose a data fusion procedure using Bayesian decision and optimal sensor arrangement by optimizing a bistatic sonar. Also, to analyze the detection performance effectively, we propose the environmental model that simulates a propagation loss and target strength suitable for multistatic sonar networks in real surroundings. The effectiveness analysis on the multistatic sonar network confirms itself as a promising tool for effective allocation of detection resources in multistatic sonar system.