• Title/Summary/Keyword: Detection Rules

Search Result 317, Processing Time 0.027 seconds

Design and Performance Analysis of Distributed Detection Systems with Two Passive Sonar Sensors (수동 소나 쌍을 이용한 분산탐지 체계의 설계 및 성능 분석)

  • Kim, Song-Geun;Do, Joo-Hwan;Song, Seung-Min;Hong, Sun-Mog;Kim, In-Ik;Oh, Won-Tchon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.159-169
    • /
    • 2009
  • In this paper, optimum design of distributed detection is considered for a parallel sensor network system consisting of a fusion center and two passive sonar nodes. AND rule and OR rule are employed as the fusion rules of the sensor network. For the fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under the constraint of a specified probability of false alarm. It is also investigated through numerical experiments how signal strength, false alarm probability, and the distance between two sensor nodes affect the system detection performances.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

Statistical Design of X Control Chart with Improved 2-of-3 Main and Supplementary Runs Rules (개선된 3 중 2 주 및 보조 런 규칙을 가진 X관리도의 통계적 설계)

  • Park, Jin-Young;Seo, Sun-Keun
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.4
    • /
    • pp.467-480
    • /
    • 2012
  • Purpose: This paper introduces new 2-of-3 main and supplementary runs rules to increase the performance of the classical $\bar{X}$ control chart for detecting small process shifts. Methods: The proposed runs rules are compared with other competitive runs rules by numerical experiments. Nonlinear optimization problem to minimize the out-of-control ARL at a specified shift of process mean for determining action and warning limits at a time is formulated and a procedure to find two limits is illustrated with a numerical example. Results: The proposed 2-of-3 main and supplementary runs rules demonstrate an improved performance over other runs rules in detecting a sudden shift of process mean by simultaneous changes of mean and standard deviation. Conclusion: To increase the performance in the detection of small to moderate shifts, the proposed runs rules will be used with $\bar{X}$ control charts.

Study of User Generated Rules on Online game - focused on League of Legends - (온라인 게임에 나타난 사용자 생성 규칙 연구 - <리그 오브 레전드>를 중심으로 -)

  • Lyou, Chul-Gyun;Park, Miri
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.35-44
    • /
    • 2015
  • The purpose of this study is to analyze user-generated rules in online games and to define the way of players' identities are developed. This study focuses on the online game League of Legends, which originated from use map system. Based on rule theory, this study analyzes the characteristics of user-generated rules. As the result, this study proves that the main rule of online game is not the rules made by developers, but the emergent rules made by players. Through rule-detection and rule-selection process, user-generated rules change the game system. Therefore, the result of this study expects to show meaningful roles of players in game system.

Worm Detection and Containment using Earlybird and Snort on Deterlab (Deterlab 환경에서 Earlybird를 이용한 웜 탐지와 Snort 연동을 통한 웜 확산 차단)

  • Lee, Hyeong-Yun;Hwang, Seong-Oun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.71-76
    • /
    • 2013
  • A computer worm is a standalone malware computer program that probes and exploits vulnerabilities of systems. It replicates and spreads itself to other computers via networks. In this paper, we study how to detect and prevent worms. First, we generated Codered II traffic on the emulated testbed called Deterlab. Then we identified dubious parts using Earlybird and wrote down Snort rules using Wireshark. Finally, by applying the Snort rules to the traffic, we could confirmed that worm detection was successfully done.

Fault Detection of Governor Systems Using Discrete Wavelet Transform Analysis

  • Kim, Sung-Shin;Bae, Hyeon;Lee, Jae-Hyun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.5
    • /
    • pp.662-673
    • /
    • 2012
  • This study introduces a condition diagnosis technique for a turbine governor system. The governor system is an important control system to handle turbine speed in a nuclear power plant. The turbine governor system includes turbine valves and stop valves which have their own functions in the system. Because a turbine governor system is operated by high oil pressure, it is very difficult to maintain under stable operating conditions. Turbine valves supply oil pressure to the governor system for proper operation. Using the pressure variation of turbine and governor valves, operating conditions of the turbine governor control system are detected and identified. To achieve automatic detection of valve status, time-based and frequency-based analysis is employed. In this study, a new approach, wavelet decomposition, was used to extract specific features from the pressure signals of the governor and stop valves. The extracted features, which represent the operating conditions of the turbine governor system, include important information to control and diagnose the valves. After extracting the specific features, decision rules were used to classify the valve conditions. The rules were generated by a decision tree algorithm (a typical simple method for data-based rule generation). The results given by the wavelet-based analysis were compared to detection results using time- and frequency-based approaches. Compared with the several related studies, the wavelet transform-based analysis, the proposed in this study has the advantage of easier application without auxiliary features.

An Intrusion Detection System using Time Delay Neural Networks (시간지연 신경망을 이용한 침입탐지 시스템)

  • 강흥식;강병두;정성윤;김상균
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.778-787
    • /
    • 2003
  • Intrusion detection systems based on rules are not efficient for mutated attacks, because they need additional rules for the variations. In this paper, we propose an intrusion detection system using the time delay neural network. Packets on the network can be considered as gray images of which pixels represent bytes of them. Using this continuous packet images, we construct a neural network classifier that discriminates between normal and abnormal packet flows. The system deals well with various mutated attacks, as well as well known attacks.

  • PDF

Simple Fuzzy Rule Based Edge Detection

  • Verma, O.P.;Jain, Veni;Gumber, Rajni
    • Journal of Information Processing Systems
    • /
    • v.9 no.4
    • /
    • pp.575-591
    • /
    • 2013
  • Most of the edge detection methods available in literature are gradient based, which further apply thresholding, to find the final edge map in an image. In this paper, we propose a novel method that is based on fuzzy logic for edge detection in gray images without using the gradient and thresholding. Fuzzy logic is a mathematical logic that attempts to solve problems by assigning values to an imprecise spectrum of data in order to arrive at the most accurate conclusion possible. Here, the fuzzy logic is used to conclude whether a pixel is an edge pixel or not. The proposed technique begins by fuzzifying the gray values of a pixel into two fuzzy variables, namely the black and the white. Fuzzy rules are defined to find the edge pixels in the fuzzified image. The resultant edge map may contain some extraneous edges, which are further removed from the edge map by separately examining the intermediate intensity range pixels. Finally, the edge map is improved by finding some left out edge pixels by defining a new membership function for the pixels that have their entire 8-neighbourhood pixels classified as white. We have compared our proposed method with some of the existing standard edge detector operators that are available in the literature on image processing. The quantitative analysis of the proposed method is given in terms of entropy value.

Skew correction of face image using eye components extraction (눈 영역 추출에 의한 얼굴 기울기 교정)

  • Yoon, Ho-Sub;Wang, Min;Min, Byung-Woo
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.12
    • /
    • pp.71-83
    • /
    • 1996
  • This paper describes facial component detection and skew correction algorithm for face recognition. We use a priori knowledge and models about isolated regions to detect eye location from the face image captured in natural office environments. The relations between human face components are represented by several rules. We adopt an edge detection algorithm using sobel mask and 8-connected labelling algorith using array pointers. A labeled image has many isolated components. initially, the eye size rules are used. Eye size rules are not affected much by irregular input image conditions. Eye size rules size, and limited in the ratio between gorizontal and vertical sizes. By the eye size rule, 2 ~ 16 candidate eye components can be detected. Next, candidate eye parirs are verified by the information of location and shape, and one eye pair location is decided using face models about eye and eyebrow. Once we extract eye regions, we connect the center points of the two eyes and calculate the angle between them. Then we rotate the face to compensate for the angle so that the two eyes on a horizontal line. We tested 120 input images form 40 people, and achieved 91.7% success rate using eye size rules and face model. The main reasons of the 8.3% failure are due to components adjacent to eyes such as eyebrows. To detect facial components from the failed images, we are developing a mouth region processing module.

  • PDF

Selection of Optimal Face Detection Algorithms by Fuzzy Inference (퍼지추론을 이용한 최적의 얼굴검출 알고리즘 선택기법)

  • Jang, Dae-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.71-80
    • /
    • 2011
  • This paper provides a novel approach for developers to use face detection techniques for their applications easily without special knowledge by selecting optimal face detection algorithms based on fuzzy inference. The purpose of this paper is to come up with a high-level system for face detection based on fuzzy inference with which users can develop systems easily and even without specific knowledge on face detection theories and algorithms. Important conditions are firstly considered to categorize the large problem space of face detection. The conditions identified here are then represented as expressions so that developers can use them to express various problems. The expressed conditions and available face detection algorithms constitute the fuzzy inference rules and the Fuzzy Interpreter is constructed based on the rules. Once the conditions are expressed by developers, the Fuzzy Interpreter proposed take the role to inference the conditions and find and organize the optimal algorithms to solve the represented problem with corresponding conditions. A proof-of-concept is implemented and tested compared to conventional algorithms to show the performance of the proposed approach.