• Title/Summary/Keyword: Explosive Detection System

Search Result 35, Processing Time 0.032 seconds

The Design of Integrated Intrusion Detection System in Large Networks (대규모 네트워크를 위한 통합 침입탐지시스템 설계)

  • 정연서
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.953-956
    • /
    • 2002
  • The threat to the network is increasing due to explosive increasing use of the Internet. Current IDS(Intrusion Detection System) detects intrusion and does individual response in small area network. It is important that construction of infra to do response in all system environment through sharing information between different network domains. This paper provides a policy-based IDS management architecture enabling management of intrusion detection systems. The IIDS(Integrated Intrusion Detection System) is composed of IDAs(Intrusion Detection Agents). We describe requirements in design and the elements of function.

  • PDF

Aviation Security Equipments Certification System in Korea: Suggestions for Improvement (항공보안장비 성능인증제의 고도화 방안에 관한 연구)

  • Lee, Wonjoo;Yu, Sangwoo;Park, Soohong;Kim, Kyunghoon;Ha, Dasom;Seoll, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.3
    • /
    • pp.395-408
    • /
    • 2020
  • Purpose: This study was performed for advancement of aviation security equipments certification system. Methods: We investigated aviation security equipments certification-related registrations and the latest research trends of explosive detection technologies. Based on the literature studies, we draw the critical issues of the aviation security equipment certification system and suggested improvement direction. Results: We found some inaccuracies of the definition of explosive trace detection equipments, accreditation review committee, and performance evaluation test method. These problems should be modified to suit being practical. Conclusion: The present results would be useful for basic data for modifying aviation security equipments certification systems.

A Study on the Method of Optimizing the Test Order of Explosive Detection System Using Analytic Hierarchy Process and Objective Rating (계층분석방법 및 객관적평가법을 활용한 폭발물탐지장비 시험순서 최적화 방법에 관한 연구)

  • Sun-Ju, Won;Hyun Su, Sim;Yong Soo, Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.793-810
    • /
    • 2022
  • Purpose: As improving the search performance of aviation security equipment is considered essential, this study proposes the need for research on how to find an optimized test sequence that can reduce test time and operator power during the search function test of explosive detection systems. We derive the weights and work difficulty adjustment factor required to find the optimized test order. Methods: First, after setting the test factors, the time of each test and the difficulty scale determined by the worker who performed the test directly were used to derive weights. Second, the work difficulty adjustment coefficient was determined by combining the basic weight adjustment factor and corresponding to the body part used by the test using objective rating. Then the final standard time was derived by calculating the additional weights for the changeability of the test factors. Results: The order in which the final standard time is minimized when 50 tests are performed was defined as the optimized order. 50 tests should be conducted without duplication and the optimal order of tests was obtained when compared to previously numbered tests. As a result of minimizing the total standard time by using Excel's solver parameters, it was reduced by 379.14 seconds, about 6.32 minutes. Conclusion: We tried to express it in mathematical formulas to propose a method for setting an optimized test sequence even when testing is performed on other aviation security equipment. As a result, the optimal test order was derived from the operator's point of view, and it was demonstrated by minimizing the total standard time.

Intrusion Detection System using Pattern Classification with Hashing Technique (패턴분류와 해싱기법을 이용한 침입탐지 시스템)

  • 윤은준;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • Computer and network security has recently become a popular subject due to the explosive growth of the Internet Especially, attacks based on malformed packet are difficult to detect because these attacks use the skill of bypassing the intrusion detection system and Firewall. This paper designs and implements a network-based intrusion detection system (NIDS) which detects intrusions with malformed-packets in real-time. First, signatures, rules in NIDS like Snouts rule files, are classified using similar properties between signatures NIDS creates a rule tree applying hashing technique based on the classification. As a result the system can efficiently perform intrusion detection.

  • PDF

A Study on the Formation of Detection Electrode for the IED Removal Robot by Using A Photosensitive CNT Paste (감광성 CNT 페이스트를 이용한 IED 폭발물 제거로봇 탐지전극 형성에 관한 연구)

  • Kwon, Hye Jin
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.4
    • /
    • pp.231-237
    • /
    • 2018
  • In this study, two important requirements for the home production of a robot to detect and remove improvised explosive devices (IEDs) are presented in terms of the total cost for robot system development and the performance improvement of the mine detection technology. Firstly, cost analyses were performed in order to provide a reasonable solution following an engineering estimate method. As a result, the total cost for a mass production system without the mine detection system was estimated to be approximately 396 million won. For the case including the mine detection system, the total cost was estimated to be approximately 411 million won, in which labor costs and overhead charges were slightly increased and the material costs for the mine detection system were negligible. Secondly, a method for fabricating the carbon nanotube (CNT) based gas detection sensor was studied. The detection electrodes were formed by a photolithography process using a photosensitive CNT paste. As a result, this method was shown to be a scalable and expandable technology for producing excellent mine detection sensors. In particular, it was found that surface treatments by using adhesive taping or ion beam bombardment methods are effective for exposing the CNTs to the ambient air environment. Fowler-Nordheim (F-N) plots were obtained from the electron-emission characteristics of the surface treated CNT paste. The F-N plot suggests that sufficient electrons are available for transport between CNT surfaces and chemical molecules, which will make an effective chemiresistive sensor for the advanced IED detection system.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Automatic Detection System for Dangerous Abandoned Objects Based on Vision Technology (비전 기술에 기반한 위험 유기물의 자동 검출 시스템)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.69-74
    • /
    • 2009
  • Abandoned objects should be treated as possibly dangerous things for public areas until they turn out to be safe because explosive material or chemical substance is intentionally contained in them for public terrors. For large public areas such as airports or train stations, there are limits in man-power for security staffs to check all the monitors for covering the entire area under surveillance. This is the basic motivation of developing the automatic detection system for dangerous abandoned objects based on vision technology. In this research, well-known DBE is applied to stably extract background images and the HOG algorithm is adapted to discriminate between human and stuff for object classification. To show the effectiveness of the proposed system, experiments are carried out in detecting intrusion for a forbidden area and alarming for abandoned objects in a room under surveillance.

  • PDF

Development of Fiber Optic Accelerometer for Third-Party Damage Detection (타공사 감시를 위한 광섬유 가속도계의 개발)

  • Park, Ho-Rim;Choe, Jae-Bung;Kim, Yeong-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.10
    • /
    • pp.1551-1558
    • /
    • 2001
  • Recently, a number of underground pipelines have been drastically increased. The integrity of these buried pipelines, especially gas transmitting pipelines, is of importance due to an explosive characteristic of natural gas. The third party damage is known as one of the most critical factor which causes fatal accidents. For this reason, a number of systems detecting third party damage are under development. The major concern in the development of third party damage detection system is to transmit vibration signals out of accelerometer to signal conditioner and data acquisition system without any interference caused by noise. The objective of this paper is to develope a fiber optic accelerometer applicable to third party damage detection system. A fiber optic accelerometer was developed by use of combining principles of one degree of freedom vibration model and an extrinsic Fabry-Perot interferometer. The developed fiber optic accelerometer was designed to perform with a sensitivity of 0.06mVg, a frequency range of less than 6kHz and an amplitude range of -200g to 200g. The developed, accelerometer was compared with a piezoelectric accelerometer and calibrated. In order to verify the developed accelerometer, the field experiment was performed. From the field experiment, vibration signals and the location of impact were successfully detected. The developed accelerometer is expected to be used for the third party damage detection system which requires long distance transmission of signals.

The Comparative Study on Performance Analysis of Windows 7 and Ubuntu Applying Open Source IDS/IPS Suricata (오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석)

  • Seok, Jinug;Kim, Jimyung;Choi, Moonseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.141-151
    • /
    • 2017
  • Nowadays, It is undeniable that the threat of network security is growing as time flows due to worldwide development of wire/wireless, various Internet platform and sophisticated hacking techniques. The amount of traffics that Network security solution has to handle is increasing and recently many occurrence of explosive traffic attacks from PulseWave are being observed which has many similar characteristics to New DDos. Medium and small sized firms abroad have developed and distributed Snort and Suricata that are based on open-source Intrusion Detection System(IDS) / Intrusion Prevention System (IPS). The goal of this study is to compare between Windows7 by applying suicata 4.0.0 32bit version and Ubuntu 16.04.3 LTS by applying suicata 4.0.0 version which is an open source Intrusion Detection System / Intrusion Protection System that uses multi threads method. This experiment's environment was set as followed C1100 server model of Dell, Intel Xeon CPU L5520 2.27GHz*2 with 8 cores and 16 threads, 72GB of RAM, Samsung SSD 250GB*4 of HDD which was set on RAID0. According to the result, Suricata in Ubuntu is superior to Suricata in Windows7 in performance and this result indicates that Ubuntu's performance is far advanced than Windows7. This meaningful result is derived because Ubuntu that applied Suricata used multi core CPU and RAM more effectively.