• Title/Summary/Keyword: Intelligent security

Search Result 716, Processing Time 0.018 seconds

Intrusion Detection System of Network Based on Biological Immune System (생체 면역계를 이용한 네트워크 침입탐지 시스템)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.411-416
    • /
    • 2002
  • Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;An, Sung-Je;Hong, Sung-Jun;Lee, Hee-Sung;Kim, Eun-Tai;Park, Mig-Non
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion in considered at decision level. The proposed algorithm is tested on the NLPR database.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Secure route determination method to prevent sinkhole attacks in INSENS based wireless sensor networks (INSENS 기반의 무선 센서 네트워크에서 싱크홀 공격을 방어하기 위한 강화된 경로 설정 기법)

  • Song, Kyu-Hyun;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.267-272
    • /
    • 2016
  • Wireless sensor networks (WSNs) are vulnerable to external intrusions due to the wireless communication characteristics and limited hardware resources. Thus, the attacker can cause sinkhole attack while intruding the network. INSENS is proposed for preventing the sinkhole attack. INSENS uses the three symmetric keys in order to prevent such sinkhole attacks. However, the sinkhole attack occurs again, even in the presence of INSENS, through the compromised node because INSENS does not consider the node being compromised. In this paper, we propose a method to counter the sinkhole attack by considering the compromised node, based on the neighboring nodes' information. The goals of the proposed method are i) network reliability improvement and ii) energy conservation through effective prevention of the sinkhole attack by detecting compromised nodes. The experimental results demonstrate that the proposed method can save up to, on average, 19.90% of energy while increasing up to, on average, 71.50%, the report reliability against internal sinkhole attacks in comparison to INSENS.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.

Fingerprint Matching Algorithm using MHC Detector Set of String Structure (스트링 구조의 MHC 인식부를 이용한 지문 매칭알고리즘)

  • Sim, Kwee-Bo;Jeong, Jae-Won;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.279-284
    • /
    • 2004
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Recently, the speed of identification becomes a very important point in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. In this paper, we propose the fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system. The proposed algorithm is organized by two-matching stage. The 1st matching stage does the matching process by the use of the 'self-space' and MHC detector string set that are generated from the minutiae and the values of the directional field. Then the 2nd matching stage is made based on the local-structure of the minutiae. The proposed two matching stage reduces matching time while the reliability of the matching algorithm is maintained.

An Analysis of Civil Complaints about Traffic Policing Using the LDA Model (토픽모델링을 활용한 교통경찰 민원 분석)

  • Lee, Sangyub
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.57-70
    • /
    • 2021
  • This study aims to investigate the security demand about the traffic policing by analyzing civil complaints. Latent Dirichlet Allocation(LDA) was applied to extract key topics for 2,062 civil complaints data related to traffic policing from e-People. And additional analysis was made of reports of violations, which accounted for a high proportion. In this process, the consistency and convergence of keywords and representative documents were considered together. As a result of the analysis, complaints related to traffic police could be classified into 41 topics, including traffic safety facilities, passing through intersections(signals), provisional impoundment of vehicle plate, and personal mobility. It is necessary to strengthen crackdowns on violations at intersections and violations of motorcycles and take preemptive measures for the installation and operation of unmanned traffic control equipments, crosswalks, and traffic lights. In addition, it is necessary to publicize the recently amended laws a implemented policies, e-fine, procedure after crackdown.

A Smart Ticketing System Based-on Hybrid Web (하이브리드 웹 기반의 스마트 발권 시스템)

  • Park, Byung-Eon;Park, Jin-Sub;Jung, Il-Hong
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.567-574
    • /
    • 2011
  • In this paper, we have designed and implemented a commercial web system for the future which resolves the necessary security and compatibility to the existing issues in various fields such as theater or the ball park that tickets are issued. The system presents the OTP (One Time Password) system using the mobile in order for defense in the bypass hacking technique such as screen hacking and for greater security. Also, we presents a smart ticketing system that improve the existing responsive hybrid web. It uses Non-ActiveX System which solve compatible problems with present systems that don't use ActiveX. Also, it is available in a variety of environments and equipment. In addition, the system provides an intelligent screen switching systems using the characteristics of mobile devices, an automatic discount system, and a venue information system which shows the shortest distance to the venue considering the commercial portion.

A Study on Conspired Insurance Fraud Detection Modeling Using Social Network Analysis

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.117-127
    • /
    • 2020
  • Recently, proving insurance fraud has become increasingly difficult because it occurs intentionally and secretly via organized and intelligent conspiracy by specialists such as medical personnel, maintenance companies, insurance planners, and insurance subscribers. In the case of car accidents, it is difficult to prove intentions; in particular, an insurance company with no investigation rights has practical limitations in proving the suspicions. This paper aims reveal that the detection of organized and conspired insurance fraud, which had previously been difficult, could be dramatically improved through conspiring insurance fraud detection modeling using social network analysis and visualization of the relation between suspected group entities and by seeking developmental research possibilities of data analysis techniques.