• Title/Summary/Keyword: DoS detection

Search Result 540, Processing Time 0.029 seconds

Omnidirectional Camera System Design for a Security Robot (경비용 로봇을 위한 전방향 카메라 장치 설계)

  • Kim, Kilsu;Do, Yongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

A Study on Guidance Methods of Mine Disposal Vehicle Considering the Sensor Errors (센서 오차를 고려한 기뢰제거용 무인잠수정의 유도방법)

  • Byun, Seung-Woo;Kim, Donghee;Im, Jong-Bin;Han, Jong-Hoon;Park, Do-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.5
    • /
    • pp.277-286
    • /
    • 2017
  • This paper introduces mathematical modelling and control algorithm of expendable mine disposal vehicle. This vehicle has two longitudinal thrusters, one vertical thruster and internal mass moving system which can control pitch rate. Also, the vehicle has an optical camera and forward looking sonar for underwater mine detection and classification. The vehicle is controlled via an optical cable connected with operating console on the mother ship. We describe the vehicle's 6DOF dynamic model and controller which can track the desired trajectory for the way-point tracking. These simulation results shows guidance and maneuvering performance which has other sensor data or not.

Direction of Arrival Estimation of GNSS Signal using Dual Antenna

  • Ong, Junho;So, Hyoungmin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • This paper deal with estimating the direction of arrival (DOA) of GNSS signal using two antennae for spoofing detection. A technique for estimating the azimuth angle of a received signal by applying the interferometer method to the GPS carrier signal is proposed. The experiment assumes two antennas placed on the earth's surface and estimates the azimuth angle when only GPS signal are received without spoofing signal. The proposed method confirmed the availability through GPS satellite placement simulation and experiments using a dual antenna GPS receiver. In this case of using dual antenna, an azimuth angle ambiguity of the received signal occurs with respect to the baseline between two antennas. For this reason, the accurate azimuth angle estimation is limits, but it can be used for deception by cross-validating the ambiguity.

A New Chemosensing Ensemble for Colorimetric Detection of Oxalate in Water

  • Tang, Li-Jun;Liu, Ming-Hui
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.11
    • /
    • pp.3159-3162
    • /
    • 2010
  • To realize highly selective recognition of oxalate in water, a new chemosensing ensemble that behaves highly selective colorimetric recognition of oxalate in water at pH 7.4 has been developed. The ensemble was constructed by a pyrrole containing mononuclear copper complex and chromeazurol S. The ensemble shows a highly selective recognition of oxalate through an obvious color change from blue to yellow upon the addition of oxalate, whereas, other dicarboxylates such as malonate, succinate, fumarate, maleate, glutarate, adipate, phthalate, isophthalate and terephthalate do not induce any noticeable color changes. The oxalate recognition process is not significantly affected by other coexisting dicarboxylate.

A Study on the 3D Characteristics of Lightning in KOREA (한반도내 낙뢰의 3차원 특성에 관한 연구)

  • Woo, J.W.;Kwak, J.S.;Kang, Y.W.;Kwon, D.J.;Moon, J.D.
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1556-1557
    • /
    • 2006
  • Since 1996, KEPCO has been operating a wide range lightning detection system, LPATS, and been accumulating relative application technics and statistical analysis skills. So, KEPRI already has its own basis to develope more accurate advanced detection technology and references to do comparative study. For Three-dimensional imaging of lightning channels, UHF/VHF antenna systems were installed at 2 sites. The distance between two sites is about 30 km. In this paper, we would like to introduce about our system and its results.

  • PDF

Detection of Hand Motions using Cross-correlation of Surface EMG (표면 EMG신호의 상관함수를 이용한 손의 움직임 검출)

  • Lee, Yong-H.;Choi, Chun-H.;Kim, Soon-S.;Kim, Dong-H.
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.3
    • /
    • pp.205-211
    • /
    • 2008
  • A method of detecting the specific patterns related to hand motions using the surface EMG(electromyogram) on an arm is proposed and tested. To do this, we obtain separately modeling parameters based on the LP, Prony estimator, and calculate the latency shift value between channels by cross-correlation function. Then, the coefficients and latency shift value are applied to the detection method to classify the EMG signals related to hand motions. Compared with the conventional methods, the present method are more useful to detect the motion intention of the user as an input device in the mobile and wearable computing environments. And, We expect that the results of this study are helpful in the development of rehabilitation devices for the handicapped.

A RTSD Mechanism for Detection of DoS Attack on TCP Network (TCP 네트워크에서 서비스거부공격의 탐지를 위한 RTSD 메커니즘)

  • 이세열;김용수
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.252-255
    • /
    • 2002
  • As more critical services are provided in the internet, the risk to these services from malicious users increases. Several networks have experienced problems like Denial of Service(DoS) attacks recently. We analyse a network-based denial of service attack, which is called SYM flooding, to TCP-based networks. It occurs by an attacker who sends TCP connection requests with spoofed source address to a target system. Each request causes the targeted system to send instantly data packets out of a limited pool of resources. Then the target system's resources are exhausted and incoming TCP port connections can not be established. The paper is concerned with a detailed analysis of TCP SYN flooding denial of service attack. In this paper, we propose a Real Time Scan Detector(RTSD) mechanism and evaluate it\`s Performance.

  • PDF

Detection of Traffic Flooding Attacks using SVDD and SNMP MIB (SVDD와 SNMP MIB을 이용한 트래픽 폭주 공격의 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.124-127
    • /
    • 2008
  • DoS/DDoS로 대표되는 트래픽 폭주 공격은 대상 시스템뿐만 아니라 네트워크 대역폭, 프로세서 처리능력, 시스템 자원 등에 악영향을 줌으로써 네트워크에 심각한 장애를 유발할 수 있다. 따라서 신속한 트래픽 폭주 공격의 탐지는 안정적인 서비스 제공 및 시스템 운영에 필수요건이다. 전통적인 패킷 수집을 통한 DoS/DDoS의 탐지방법은 공격에 대한 상세한 분석은 가능하나 설치의 확장성 부족, 고가의 고성능 분석시스템의 요구, 신속한 탐지를 보장하지 못한다는 문제점을 갖고 있다. 본 논문에서는 15초 단위의 SNMP MIB 객체 정보를 바탕으로 SVDD(support vector data description)를 이용하여 보다 빠르고 정확한 침입탐지와 쉬운 확장성, 저비용탐지 및 정확한 공격유형별 분류를 가능케 하는 새로운 시스템을 설계 및 구현하였다. 실험을 통하여 만족스러운 침입 탐지율과 안전한 false negative rate, 공격유형별 분류율 수치 등을 확인함으로써 제안된 시스템의 성능을 검증하였다.

  • PDF

A Study on Intrusion Detection Techniques using Risk Level Analysis of Smart Home's Intrusion Traffic (스마트 홈의 위험수준별 침입 트래픽 분석을 사용한 침입대응 기법에 대한 연구)

  • Kang, Yeon-I;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3191-3196
    • /
    • 2011
  • Smart home system are being installed in the most new construction of building for the convenience of living life. As smart home systems are becoming more common and their diffusion rates are faster, hacker's attack for the smart home system will be increased. In this paper, Risk level of smart home's to do respond to intrusion that occurred from the wired network and wireless network intrusion cases and attacks can occur in a virtual situation created scenarios to build a database. This is based on the smart home users vulnerable to security to know finding illegal intrusion traffic in real-time and attack prevent was designed the intrusion detection algorithm.

Detection Framework for Advanced and Persistent Information Leakage Attack (지능적이고 지속적인 정보유출 공격 탐지 프레임워크)

  • Kil, Ye-Seul;Jeon, Ga-Hye;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.203-205
    • /
    • 2022
  • As digital transformation and remote work environment advanced by Covid-19 become more common, the scale of leakage damage to industrial secrets and personal information caused by information leakage attacks is increasing. Recently, advanced and persistent information leakage attacks have become a serious security threat because they do not quickly leak large amounts of information, but continuously leak small amounts of information over a long period of time. In this study, we propose a framework for detecting advanced and persistent information leakage attacks based on traffic characteristics. The proposed method can effectively detect advanced and persistent information leakage attacks using traffic patterns, packet sizes, and metadata, even if the payload is encrypted.

  • PDF