• Title/Summary/Keyword: Detection agent

Search Result 461, Processing Time 0.038 seconds

Chemiresistive Gas Sensors for Detection of Chemical Warfare Agent Simulants

  • Lee, Jun Ho;Lee, Hyun-Sook;Kim, Wonkyung;Lee, Wooyoung
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.3
    • /
    • pp.139-145
    • /
    • 2019
  • Precautionary detection of chemical warfare agents (CWAs) has been an important global issue mainly owing to their toxicity. To achieve proper detection, many studies have been conducted to develop sensitive gas sensors for CWAs. In particular, metal-oxide semi-conductors (MOS) have been investigated as promising sensing materials owing to their abundance in nature and excellent sensitivity. In this review, we mainly focus on various MOS-based gas sensors that have been fabricated for the detection of two specific CWA simulants, 2-chloroethyl ethyl sulfide (2-CEES) and dimethyl methyl phosphonate (DMMP), which are simulants of sulfur mustard and sarin, respectively. In the case of 2-CEES, we mainly discuss $CdSnO_3-$ and ZnO-based sensors and their reaction mechanisms. In addition, a method to improve the selectivity of ZnO-based sensors is mentioned. Various sensors and their sensing mechanisms have been introduced for the detection of DMMP. As the reaction with DMMP may directly affect the sensing properties of MOS, this paper includes previous studies on its poisoning effect. Finally, promising sensing materials for both gases are proposed.

Integration of Blackboard Architecture into Multi-Agent Architecture (블랙보드 구조와 다중 에이전트 구조의 통합)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.355-363
    • /
    • 2012
  • The Integration of multi-agent architecture and blackboard architecture may lead to a new architecture to cope with new application areas which need some good and strong points of both the architectures. This paper suggests an integrated architecture of blackboard architecture and multi-agent architecture by using event-based implicit invocation pattern and a blackboard event detection mechanism based on Rete network. From the viewpoints of weak couplings of system components and flexible control of knowledge source agents, it is desirable to use the event-based implicit invocation pattern in the integrated architecture. But the pattern itself does not concern the performance of the architecture, and it is very critical to the performance of the integrated architecture to detect efficiently the blackboard events which can activate knowledge source agents which can contribute to the problem-solving processes of the integrated architecture. The integrated architecture suggested in this paper uses a blackboard event detection mechanism based on Rete network to detect efficiently blackboard events which can activate knowledge source agents.

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.

Attributed Intrusion Detection System using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템)

  • Jeong, Jong-Geun;Lee, Hae-Gun;Her, Kyung;Shin, Suk-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.658-661
    • /
    • 2008
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security. We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other platforms.

  • PDF

Design and Performance Evaluation of Attributed Intrusion Detection System Model using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능 평가)

  • 정종근;편석범;이윤배
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.117-124
    • /
    • 2000
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS (Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other Platforms.

  • PDF

Design of agent intrusion detection system applying data mining (데이터 마이닝을 적용한 에이전트 침입 탐지 시스템 설계)

  • Jeong Jong Kun;Lee Sung Tae;Kim Yong Ho;Lee Yun Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.676-679
    • /
    • 2001
  • As network security is coning up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more reliable network and system security rather than firewall. In this paper, we propose the new IDS model which tan detect intrusion in different systems as well as which ran make real-time detection of intrusion in the expanded distributed environment in host level of drawback of existing IDS. We implement its prototype and verify its validity. We use pattern extraction agent so that we can extract automatically audit file needed in distributed intrusion detection even in other platforms.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Passive Remote Chemical Detection of SF6 Clouds in the Atmosphere by FTIR (수동형 FTIR 원격화학 탐지기를 이용한 SF6 오염운의 실시간 탐지)

  • Chong, Eugene;Park, Byeonghwang;Kim, Ju Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.8-14
    • /
    • 2014
  • Brightness temperature spectra acquired from FTIR(Fourier Transform Infrared)-SCADS (Standoff Chemical Agent Detection System) could be available for detection and identification of the chemical agents and pollutants from different background. IR spectrum range of 770 to 1350 $cm^{-1}$ is corresponding to "atmospheric window". A 2-dimensional(2D) brightness temperature spectrum was drawn from combining each data point through automatic continuous scanning of FTIR along with altitude and azimuth. At higher altitude, temperature of background was decreased but scattering effect of atmospheric gases was increased. Increase in temperature difference between background and blackbody in SCADS at higher temperature causes to increases in peak intensity of $SF_6$. This approach shows us a possibility that 2D visual information is acquired from scanning data with a single FTIR-SCADS.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

A Study on the Methyl Salicylate Dispersion in the Vicinity of Obstacles by Wind Tunnel Test (아음속 풍동을 이용한 구조물 형상 변화에 따른 살리실산메틸 확산 유동 연구)

  • Hong, Chang-Ki;Uhm, Han-Sup;Choi, Seung-Ki;Kim, Youn-Jea
    • The KSFM Journal of Fluid Machinery
    • /
    • v.17 no.6
    • /
    • pp.69-73
    • /
    • 2014
  • To predict flow fields and chemical agent dispersion in urban area, wind tunnel experiments was performed. The agent was adopted MS (methyl salicylate) because the real chemical agent is unsafe. The exact concentration of methyl salicylate was generated by the commercial gas generator (STI-2500) and three different obstacle shapes were applied (i.e., rectangular, cylinder and pyramid). The concentration was measured with the qualified ion mobility sensor and gas chromatography. The data necessary for virtual test method of the real chemical agent were obtained.