• Title/Summary/Keyword: Detection Rules

Search Result 317, Processing Time 0.028 seconds

Performance Evaluation, Optimal Design and Complex Obstacle Detection of an Overlapped Ultrasonic Sensor Ring (중첩 초음파 센서 링의 성능 평가, 최적 설계 및 복합 장애물 탐지)

  • Kim, Sung-Bok;Kim, Hyun-Bin
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.341-347
    • /
    • 2011
  • This paper presents the performance evaluation. optimal design. and complex obstacle detection of an overlapped ultrasonic sensor ring by introducing a new concept of effective beam width. It is assumed that a set of ultrasonic sensors of the same type are arranged along a circle of nonzero radius at regular spacings with their beams overlapped. First, the global positional uncertainty of an overlapped ultrasonic sensor ring is expressed by the average value of local positional uncertainty over the entire obstacle detection range. The effective beam width of an overlapped ultrasonic sensor ring is assessed as the beam width of a single ultrasonic sensor having the same amount of global positional uncertainty, from which a normalized obstacle detection performance index is defined. Second. using the defined index, the design parameters of an overlapped ultrasonic sensor ring are optimized for minimal positional uncertainty in obstacle detection. For a given number of ultrasonic sensors, the optimal radius of an overlapped ultrasonic sensor ring is determined, and for a given radius of an overlapped ultrasonic sensor ring, the optimal number of ultrasonic sensors is determined. Third, the decision rules of positional uncertainty zone for multiple obstacle detection are provided based on the inequality relationships among obstacle distances by three adjacent ultrasonic sensors. Using the provided rules, the obstacle outline detection is performed in a rather complex environment consisting of several obstacles of different shapes.

The Decision Method of A Threshold in Sequence-based Anomaly Detection Sensor (순서기반 비정상행위 탐지 센서의 임계치 결정 방법)

  • Kim, Yong-Min;Kim, Min-Su;Kim, Hong-Geun;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.507-516
    • /
    • 2001
  • In this paper, we implement sequence-based anomaly detection sensor using SOM and HMM, and analyze what is important information in system call and how a threshold is decided. The new filtering and reduction rules of SOM reduces the input size of HMM. This gives real-time processing to HMM-based anomaly detection sensor. Also, we introduced an anomaly count into the sensor. Due to lessened sensibility, a user easily understand easily the detection information and false-positive was decreased. And the active coordination of the threshold value makes the detection sensor adapt according to the system condition.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

GEP-based Framework for Immune-Inspired Intrusion Detection

  • Tang, Wan;Peng, Limei;Yang, Ximin;Xie, Xia;Cao, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1273-1293
    • /
    • 2010
  • Immune-inspired intrusion detection is a promising technology for network security, and well known for its diversity, adaptation, self-tolerance, etc. However, scalability and coverage are two major drawbacks of the immune-inspired intrusion detection systems (IIDSes). In this paper, we propose an IIDS framework, named GEP-IIDS, with improved basic system elements to address these two problems. First, an additional bio-inspired technique, gene expression programming (GEP), is introduced in detector (corresponding to detection rules) representation. In addition, inspired by the avidity model of immunology, new avidity/affinity functions taking the priority of attributes into account are given. Based on the above two improved elements, we also propose a novel immune algorithm that is capable of integrating two bio-inspired mechanisms (i.e., negative selection and positive selection) by using a balance factor. Finally, a pruning algorithm is given to reduce redundant detectors that consume footprint and detection time but do not contribute to improving performance. Our experimental results show the feasibility and effectiveness of our solution to handle the scalability and coverage problems of IIDS.

The Design and Implementation of Anomaly Traffic Analysis System using Data Mining

  • Lee, Se-Yul;Cho, Sang-Yeop;Kim, Yong-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.316-321
    • /
    • 2008
  • Advanced computer network technology enables computers to be connected in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, which makes it vulnerable to previously unidentified attack patterns and variations in attack and increases false negatives. Intrusion detection and analysis technologies are thus required. This paper investigates the asymmetric costs of false errors to enhance the performances the detection systems. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors, this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of anomaly traffic detection is enhanced by considering the costs of false errors.

A Design of false alarm analysis framework of intrusion detection system by using incremental mining method (점진적 마이닝 기법을 적용한 침입탐지 시스템의 오 경보 분석 프레임워크 설계)

  • Kim Eun-Hee;Ryu Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.295-302
    • /
    • 2006
  • An intrusion detection system writes a lot of alarms against attack behaviors in real time. These alarms contain not only actual attack alarms, but also false alarms that are mistakes made by the intrusion detection system. False alarms are the main reason that reduces the efficiency of the intrusion detection system, and we propose framework for false alarms analysis in the paper. Also, we apply an incremental data mining method for pattern analysis of false alarms increasing continuously. The framework consists of GUI, DB Manager, Alert Preprocessor, and False Alarm Analyzer. We analyze the false alarms increasingly through the experiment of the proposed framework and show that false alarms are reduced by applying the analyzed false alarm rules in the intrusion detection system.

Edge Detection Verification and Principle analysis about Cellular Automata (셀룰라 오토마타의 원리 분석과 에지 추출 검증)

  • Nam, Tae-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.1
    • /
    • pp.29-38
    • /
    • 2008
  • This treatise analyzed theoretical principle of Cellular Automata systematically. Specially, Cellular Automata is hinting that can handle function of various form using transition rule. Cellular Automata can embody various and complicated principle with simple identifying marks that is "State", "Neighborhood", "Program Rules". Specially, have eminent cognitive faculty in image processing field. Examined closely that the ability excels flying important Edge Detection in image processing using this Cellular Automata in treatise that see therefore.

  • PDF

An Evolutionary Computing Approach to Building Intelligent Frauds Detection System

  • Kim, Jung-Won;Peter Bentley;Chol, Jong-Uk;Kim, Hwa-Soo
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.97-108
    • /
    • 2001
  • Frauds detection is a difficult problem, requiring huge computer resources and complicated search activities Researchers have struggled with the problem. Even though a fee research approaches have claimed that their solution is much better than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds. a novel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new self of decision-makin rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

A Study on the Fire Detection Algorithm for Early Fire Detection of Electrical Fire (전기화재 조기감지를 위한 화재감지알고리즘 연구)

  • Lee, Bock-Young;Park, Sang-Tae;Hong, Sung-Ho;Baek, Dong-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.2164.1_2165.1
    • /
    • 2009
  • In this study we suggest fire detection algorithm using fuzzy inference with input variables of temperature and smoke density to detect electrical fire of early stage. The algorithm consists of membership function of temperature and smoke density and fire probability. The antecedent part of the algorithm consists of temperature and smoke density, and the consequent part consists of fire possibility. The inference rules of the algorithm is estimated to input temperature and smoke density obtained by real fire. With the help of algorithms using fuzzy inference we may be diagnose electrical fire precisely.

  • PDF

Table Detection from Document Image using Vertical Arrangement of Text Blocks

  • Tran, Dieu Ni;Tran, Tuan Anh;Oh, Aran;Kim, Soo Hyung;Na, In Seop
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.77-85
    • /
    • 2015
  • Table detection is a challenging problem and plays an important role in document layout analysis. In this paper, we propose an effective method to identify the table region from document images. First, the regions of interest (ROIs) are recognized as the table candidates. In each ROI, we locate text components and extract text blocks. After that, we check all text blocks to determine if they are arranged horizontally or vertically and compare the height of each text block with the average height. If the text blocks satisfy a series of rules, the ROI is regarded as a table. Experiments on the ICDAR 2013 dataset show that the results obtained are very encouraging. This proves the effectiveness and superiority of our proposed method.