• Title/Summary/Keyword: False

Search Result 3,113, Processing Time 0.034 seconds

A Real Time Scan Detection System against Attacks based on Port Scanning Techniques (포트 스캐닝 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현)

  • 송중석;권용진
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.171-178
    • /
    • 2004
  • Port scanning detection systems should rather satisfy a certain level of the requirement for system performance like a low rate of “False Positive” and “False Negative”, and requirement for convenience for users to be easy to manage the system security with detection systems. However, public domain Real Time Scan Detection Systems have high rate of false detection and have difficulty in detecting various scanning techniques. In addition, as current real time scan detection systems are based on command interface, the systems are poor at user interface and thus it is difficult to apply them to the system security management. Hence, we propose TkRTSD(Tcl/Tk Real Time Scan Detection System) that is able to detect various scan attacks based on port scanning techniques by applying a set of new filter rules, and minimize the rate of False Positive by applying proposed ABP-Rules derived from attacker's behavioral patterns. Also a GUI environment for TkRTSD is implemented by using Tcl/Tk for user's convenience of managing network security.

False-Positive Mycobacterium tuberculosis Detection: Ways to Prevent Cross-Contamination

  • Asgharzadeh, Mohammad;Ozma, Mahdi Asghari;Rashedi, Jalil;Poor, Behroz Mahdavi;Agharzadeh, Vahid;Vegari, Ali;Shokouhi, Behrooz;Ganbarov, Khudaverdi;Ghalehlou, Nima Najafi;Leylabadlo, Hamed Ebrahmzadeh;Kafil, Hossein Samadi
    • Tuberculosis and Respiratory Diseases
    • /
    • v.83 no.3
    • /
    • pp.211-217
    • /
    • 2020
  • The gold standard method for diagnosis of tuberculosis is the isolation of Mycobacterium tuberculosis through culture, but there is a probability of cross-contamination in simultaneous cultures of samples causing false-positives. This can result in delayed treatment of the underlying disease and drug side effects. In this paper, we reviewed studies on false-positive cultures of M. tuberculosis. Rate of occurrence, effective factors, and extent of false-positives were analyzed. Ways to identify and reduce the false-positives and management of them are critical for all laboratories. In most cases, false-positive is occurring in cases with only one positive culture but negative direct smear. The three most crucial factors in this regard are inappropriate technician function, contamination of reagents, and aerosol production. Thus, to reduce false-positives, good laboratory practice, as well as use of whole-genome sequencing or genotyping of all positive culture samples with a robust, extra pure method and rapid response, are essential for minimizing the rate of false-positives. Indeed, molecular approaches and epidemiological surveillance can provide a valuable tool besides culture to identify possible false positives.

The Analysis of Types and Historical Review of False Sleeves (False Sleeves의 유형분석과 복식사적 고잘)

  • Kwon, Soo-Hyun;Kang, Soon-Che
    • Journal of the Korean Society of Costume
    • /
    • v.60 no.10
    • /
    • pp.163-179
    • /
    • 2010
  • False sleeves are 'the sleeves that are attached to clothes but exist just as a part without any function to put arms in them.' They are different from sleeves to put arms in them and are to follow the trend or a way of wearing clothes. They are mostly found in medieval Europe's decorative sleeves named 'Hanging sleeves', but they are also found in Eastern region, too. They are found in sleeves that attached women's headgear in East and Middle Asia, and also in high-class male caftan in Ottoman Turk in the 16th and 17th century. False sleeves can be divided into two kinds by shapes. The first ones are the decorative sleeves of which trunk-shaped sleeves hang around the whole or part of the arm hole but have no function to put arms in them; this is called as 'sleeve-shaped False sleeves'. These sleeves are found in women's headgear in medieval Europe, Ottoman Turk, and East and Middle Asia. False sleeves in Europe and Ottoman Turk played a role in showing wealth and power while those in East and Middle Asia had a great role in highlighting the costume's decorative effect. The second ones are the sleeves hanging down from the arms by attaching long cloth to the arm hole, in design; these are named as 'cape-shaped False sleeves.' This style is found only in medieval Europe, and presumably, these cape-shaped false sleeves may have played a role in boasting of one's wealth and power.

A Study of Data Mining Methodology for Effective Analysis of False Alarm Event on Mechanical Security System (기계경비시스템 오경보 이벤트 분석을 위한 데이터마이닝 기법 연구)

  • Kim, Jong-Min;Choi, Kyong-Ho;Lee, Dong-Hwi
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.61-70
    • /
    • 2012
  • The objective of this study is to achieve the most optimal data mining for effective analysis of false alarm event on mechanical security system. To perform this, this study searches the cause of false alarm and suggests the data conversion and analysis methods to apply to several algorithm of WEKA, which is a data mining program, based on statistical data for the number of case on movement by false alarm, false alarm rate and cause of false alarm. Analysis methods are used to estimate false alarm and set more effective reaction for false alarm by applying several algorithm. To use the suitable data for effective analysis of false alarm event on mechanical security analysis this study uses Decision Tree, Naive Bayes, BayesNet Apriori and J48Tree algorithm, and applies the algorithm by deducting the highest value.

Automatic False-Alarm Labeling for Sensor Data

  • Adi, Taufik Nur;Bae, Hyerim;Wahid, Nur Ahmad
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as "alarm" when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.

The impact of modern airport security protocols on patients with total shoulder replacements

  • Michael D. Scheidt;Neal Sethi;Matthew Ballard;Michael Wesolowski;Dane Salazar;Nickolas Garbis
    • Clinics in Shoulder and Elbow
    • /
    • v.26 no.4
    • /
    • pp.416-422
    • /
    • 2023
  • Background: Advancements in airport screening measures in response to 9/11 have resulted in increased false alarm rates for patients with orthopedic and metal implants. With the implementation of millimeter-wave scanning technology, it is important to assess the changes in airport screening experiences of patients who underwent total shoulder arthroplasty (TSA). Methods: Here, 197 patients with prior anatomic and reverse TSA completed between 2013 and 2020 responded to a questionnaire regarding their experiences with airport travel screening after their operation. Of these patients, 86 (44%) stated that they had traveled by plane, while 111 (56%) had not. The questionnaire addressed several measures including the number of domestic and international flights following the operation, number of false alarm screenings by the millimeter-wave scanner, patient body habitus, and presence of additional metal implants. Results: A total of 53 patients (62%) responded "yes" to false screening alarms due to shoulder arthroplasty. The odds of a false screening alarm for patients with other metal implants was 5.87 times that of a false screening alarm for patients with no other metal implants (P<0.1). Of a reported 662 flights, 303 (45.8%) resulted in false screening alarms. Greater body mass index was not significantly lower in patients who experienced false screening alarms (P=0.30). Conclusions: Patients with anatomic and reverse TSA trigger false alarms with millimeter-wave scanners during airport screening at rates consistent with prior reports following 9/11. Patient education on the possibility of false alarms during airport screening is important until improvements in implant identification are made. Level of evidence: IV.

A Survey on the Actual Conditions of False-Tripping of MCCB ard ELB (배선용 및 누전차단기 오동작 실태조사)

  • Yoo, Jae-Geun;Lee, Sang-Ick;Jeon, Jeong-Chay;Jeong, Jong-Wook;Lim, Yong-Bae
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.223-227
    • /
    • 2004
  • False-tripping of MCCB(Molded Case Circuit Breaker) and ELB(Earth Leakage Circuit Breaker), using to protect overload and ground-fault accidents in power system raise direct and indirect losses like as information loss, facilities damage, slipup of goods production in industry place. Cause of false-tipping of MCCB and ELB is various and cause analysis of false-tripping is mostly made up by inference because trip is not reappeared. This paper investigated and analyzed causes and influences of false-tripping of MCCB and ELB by making up a question to safety managers of two hundred and eighteen electrical facilities for private use. Also, the necessity of experimental study on the effect of harmonics on false-tipping of MCCB and ELB was presented.

  • PDF

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System (동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법)

  • Lee, Sang-Jin;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.

Video Flame Detection with Periodicity Analysis Based False Alarm Rejection (주기 신호 검출을 통한 거짓 경보 제거 기능을 갖춘 비디오 화염 감지 기법)

  • Lee, Sang-Hak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.479-485
    • /
    • 2011
  • A video flame detection method analyze the temporal and spatial characteristics of the regions which have the flame-like color and moving objects in the input video. The video flame detector should be able to reduce a false alarm rate without the degradation of flame detection capability. The conventional methods can reject the false alarm caused by the car lights and some electric lights. However they make the false alarm caused by the warning lights, neon sign, and some periodic flickering lights which have the flame-like color and temporal features. This paper propose the video flame detection method with periodicity analysis based false alarm rejection. The proposed method can detect the periodicity of the flickering electric lights and can reject the false alarm caused by the periodic electric lights. The computer simulation showed that the proposed method did not make the false alarm in the test video with the periodic electric lights. But the conventional methods made a false alarm in the same test video.