• Title/Summary/Keyword: Detection Rules

Search Result 317, Processing Time 0.028 seconds

An Efficient Algorithm for Detecting Tables in HTML Documents (HTML 문서의 테이블 식별을 위한 효율적인 알고리즘)

  • Kim Yeon-Seok;Lee Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1339-1353
    • /
    • 2004
  • < TABLE > tags in HTML documents are widely used for formatting layout of Web documents as well as for describing genuine tables with relational information. As a prerequisite for information extraction from the Web, this paper presents an efficient method for sophisticated table detection. The proposed method consists of two phases: preprocessing and attribute-value relations extraction. For the preprocessing where genuine or ungenuine tables are filtered out, appropriate rules are devised based on a careful examination of general characteristics of < TABLE > tags. The remaining is detected at the attribute-value relations extraction phase. Specifically, a value area is extracted and checked out whether there is a syntactic coherency Futhermore, the method looks for a semantic coherency between an attribute area and a value area of a table that may be inappropriate for the syntactic coherency checkup. Experimental results with 11,477 < TABLE > tags from 1,393 HTML documents show at the method has performed better compared with previous works, resulting in a precision of 97.54% and a recall of 99.22% in average.

  • PDF

A Method based on Ontology for detecting errors in the Software Design (온톨로지 기반의 소프트웨어 설계에러검출방법)

  • Seo, Jin-Won;Kim, Young-Tae;Kong, Heon-Tag;Lim, Jae-Hyun;Kim, Chi-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2676-2683
    • /
    • 2009
  • The objective of this thesis is to improve the quality of a software product based on the enhancement of a software design quality using a better error detecting method. Also, this thesis is based on a software design method called as MOA(Methodology for Object to Agents) which uses an ontology based ODES(A Method based on Ontology for Detecting Errors in the Software Design) model as a common information model. At this thesis, a new format of error detecting method was defined. The method is implemented during a transformation process from UML model to ODES model using a ODES model, a Inter-View Inconsistency Detection technique and a combination of ontologic property of consistency framework and related rules. Transformation process to ODES model includes lexicon analysis and meaning analysis of a software design using of multiple mapping table at algorithm for the generation of ODES model instance.

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

A Design of Mobile Fitness Recommendation System Based on Data Sharing Mechanism (실시간 이상거래 탐지 기법에 관한 연구)

  • Jang, Ki-Man;Kim, Kyung-Hwan;Choi, Kwang-Nam;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.763-765
    • /
    • 2015
  • The study is being conducted to ensure the transparency of research and development have identified the problems of the current system and improve the way out. Such a study about the subject that do not follow either outside the institutional system has a disadvantage compared to an unfulfilled. R & D in order to prevent the misuse and fraud enforcement shall detect abnormal transactions that occur from transactions between research institutions and credit card issuers in real time. In this paper, we propose a detection method for real-time transaction over. It is able to detect and respond fraudulent transactions that may occur in a variety of environments by adding the data obtained by the business rules to derive stopped making detection system.

  • PDF

New Cooperative Spectrum Sensing Scheme using Three Adaptive Thresholds (Cognitive Radio를 위한 새로운 협력 스펙트럼 감지기법 연구)

  • Satrio, Cahyo Tri;Jang, Jaeshin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.808-811
    • /
    • 2015
  • Cognitive radio has been proposed as a promising dynamic spectrum allocation paradigm. In cognitive radio, spectrum sensing is a fundamental procedure that enables secondary users (unlicensed) employing unused portion of spectrum of primary users (licensed) without causing harmful interference. However, the performance of single-user spectrum-sensing scheme was limited by fading, noise uncertainty shadowing and hidden node problem. Cooperative spectrum sensing was proposed to mitigate these problem. In this paper, we observe cooperative sensing scheme with energy detection using three adaptive thresholds for local decision, which can mitigate sensing failure problem and improve sensing performance at local node. In cooperative scheme we employed OR rules as decision combining at fusion center. We evaluate our scheme through computer simulation, and the results show that with OR combination rule our scheme can achieve best performance than other schemes.

  • PDF

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

Analytical-numerical formula for estimating the characteristics of a cylindrical NaI(Tl) gamma-ray detector with a side-through hole

  • Thabet, Abouzeid A.;Badawi, Mohamed S.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3795-3802
    • /
    • 2022
  • NaI(Tl) scintillation materials are considered to be one of many materials that are used exclusively for γ-ray detection and spectroscopy. The gamma-ray spectrometer is not an easy-to-use device, and the accuracy of the numerical values must be carefully checked based on the rules of the calibration technique. Therefore, accurate information about the detection system and its effectiveness is of greater importance. The purpose of this study is to estimate, using an analytical-numerical formula (ANF), the purely geometric solid angle, geometric efficiency, and total efficiency of a cylindrical NaI(Tl) γ-ray detector with a side-through hole. This type of detector is ideal for scanning fuel rods and pipelines, as well as for performing radio-immunoassays. The study included the calculation of the complex solid angle, in combination with the use of various points like gamma sources, located axially and non-axially inside the through detector side hole, which can be applied in a hypothetical method for calibrating the facility. An extended γ-ray energy range, the detector, source dimensions, "source-to-detector" geometry inside the side-through hole, path lengths of γ-quanta photons crossing the facility, besides the photon average path length inside the detector medium itself, were studied and considered. This study is very important for an expanded future article where the radioactive point source can be replaced by a volume source located inside the side-trough hole of the detector, or by a radioactive pipeline passing through the well. The results provide a good and useful approach to a new generation of detectors that can be used for low-level radiation that needs to be measured efficiently.

Design of Action Game Using Three-Dimensional Map and Interactions between In-Game Objects

  • Kim, Jin-Woong;Hur, Jee-Sic;Lee, Hyeong-Geun;Kwak, Ho-Young;Kim, Soo Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.85-92
    • /
    • 2022
  • In this study, we aim to design an action game that increases the user experience. In order to increase the immersion of the game, the characteristics of the game used by the user were analyzed, and the systemic and visual characteristics of the game were designed with reference to each characteristic. The proposed method uses Unity 3D to implement an interaction system between objects in the game and is designed in a way that allows users to immerse themselves in the game. To induce immersion through the visual elements of the game, 2D objects and players are placed in a 3D space, and a 2D dynamic light shader is added. It is composed of inter-combat rules and monster behavior pattern collision detection and event detection. The proposed method contained the user experience with the implementation thesis, and showed the game's possibility of leading the user's affordance.

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL (이웃탐지와 ACL을 이용한 ZigBee 기반의 홈네트워크 보안 시스템 구현)

  • Park, Hyun-Moon;Park, Soo-Hyun;Seo, Hae-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.35-45
    • /
    • 2009
  • In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.