• Title/Summary/Keyword: Intruder

Search Result 157, Processing Time 0.029 seconds

An Application of Negative Selection Process to Building An Intruder Detection System

  • Kim, Jung W.;Park, Jong-Uk
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.147-152
    • /
    • 2001
  • This research aims to unravel the significant features of the human immune system, which would be successfully employed for a novel network intrusion detection model. Several salient features of the human immune system, which detects intruding pathogens, are carefully studied and the possibility and the advantages of adopting these features for network intrusion detection are reviewed and assessed.

  • PDF

Internet based Intruder detecting system Using Micropnone array (마이크 어레이를 이용한 네트워크 기반의 침입탐지 시스템)

  • Kim, Jong-Hwa;Ryu, Hyun-Ho;Kwon, Min-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.363-364
    • /
    • 2006
  • The direction of arrival of the sound signal can be derived from the time differences at the microphone array and the motor controls the camera to point at the direction of the sound signal. You can get through to the homepage and confirm the camera image on a client computer which connects to the server computer through Internet.

  • PDF

Internet based Intruder detecting system Using Micropnone array (마이크 어레이를 이용한 네트워크 기반의 침입탐지 시스템)

  • Kim, Jong-Hwa;Ryu, Hyun-Ho;Kwon, Min-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.341-342
    • /
    • 2006
  • The direction of arrival of the sound signal can be derived from the time differences at the microphone array and the motor controls the camera to point at the direction of the sound signal. You can get through to the homepage and confirm the camera image on a client computer which connects to the server computer through Internet.

  • PDF

Analyses of Intrusion Detection Model in Wireless Sensor Networks (무선 센서 네트워크에서의 침입탐지 모델의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.857-860
    • /
    • 2009
  • Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to characterize the WSN parameters such as node density and sensing range in terms of a desirable detection probability. In this paper, we consider this issue according to two WSN models: homogeneous and heterogeneous WSN.

  • PDF

IoT-based Greenhouse Intruder Prevention (IoT 기반 비닐하우스 침입자 방지 시스템)

  • Jeong-Woo Son;Eun-ser Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.130-131
    • /
    • 2023
  • 비닐하우스는 농업 분야에서 매우 일반적으로 사용되는 구조물로, 식물을 보호하고 작물 수확량을 늘리는 데 사용된다. 그러나 비닐하우스는 보안, 위협에 취약하다. 본 논문은 비닐하우스의 보안에 대한 연구를 다룬다. 본 연구로 비닐하우스의 기존 보안 방식에서 IoT를 활용한 보안 방식으로 바꾸어 침입자의 피해에 더욱 발 빠르게 대처가 가능하게 하였다.

Design and Implementation of Optimal Smart Home Security Monitoring System (최적의 스마트 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.197-202
    • /
    • 2016
  • In this paper, we propose optimal smart home security monitoring system. Proposeed optimal smart home security system using the three types of ultrasonic sensors were tested to obtain reliable data. and Using Raspberry Pi3, the smart home security system was implemented. In addition, It was verified through experiments optimal efficiency with a small amount compared to the conventional sensor of the home security system by the two ultrasonic sensors located in the optimal position. It was able to use two ultrasonic sensors to determine whether the intruder's highly efficient and reliable intrusion, and connect the servo motor at the bottom of the camera so you can shoot adjusted to the attacker's location to shoot the intruder's image. In addition, by using a Web server and stored the recorded image and two ultrasonic sensor data and provide a Web page for a user to monitor at all remote locations.

An Intelligent Surveillance System using Fuzzy Contrast and HOG Method (퍼지 콘트라스트와 HOG 기법을 이용한 지능형 감시 시스템)

  • Kim, Kwang-Baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1148-1152
    • /
    • 2012
  • In this paper, we propose an intelligent surveillance system using fuzzy contrast and HOG method. This surveillance system is mainly for the intruder detection. In order to enhance the brightness difference, we apply fuzzy contrast and also apply subtraction method to before/after the surveillance. Then the system identifies the intrusion when the difference of histogram between before/after surveillance is sufficiently large. If the incident happens, the camera stops automatically and the analysis of the screen is performed with fuzzy binarization and Blob method. The intruder is detected and tracked in real time by HOG method and linear SVM. The proposed system is implemented and tested in real world environment and showed acceptable performance in both detection rate and tracking success rate.

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

Safety Assessment on the Human Intrusion Scenarios of Near Surface Disposal Facility for Low and Very Low Level Radioactive Waste (저준위 및 극저준위 방사성폐기물 표층처분시설의 인간침입 시나리오 안전평가에 대한 고찰)

  • Hong, Sung-Wook;Park, Sangho;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.1
    • /
    • pp.79-90
    • /
    • 2016
  • The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.