• Title/Summary/Keyword: Intrusion Classification

Search Result 116, Processing Time 0.024 seconds

Design of Effective Intrusion Detection System for Wireless Local Area Network (무선랜을 위한 효율적인 침입탐지시스템 설계)

  • Woo, Sung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.185-191
    • /
    • 2008
  • Most threats of WLAN are easily caused by attackers who access to the radio link between STA and AP, which involves some Problems to intercept network communications or inject additional messages into them. In comparison with wired LAN, severity of wireless LAN against threats is bigger than the other networks. To make up for the vulnerability of wireless LAN, it needs to use the Intrusion Detection System using a powerful intrusion detection method as SVM. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. In this paper, therefore, we design the IDS system for WLAN by tuning with SVM and data-mining mechanism to defend the vulnerability on certain WLAN and then we demonstrate the superiority of our method.

  • PDF

An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data (커널 기반 데이터를 이용한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Chung, Man-Hyun;Cho, Jae-Ik;Chae, Soo-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.71-79
    • /
    • 2009
  • Currently much research is being done on host based intrusion detection using system calls which is a portion of kernel based data. Sequence based and frequency based preprocessing methods are mostly used in research for intrusion detection using system calls. Due to the large amount of data and system call types, it requires a significant amount of preprocessing time. Therefore, it is difficult to implement real-time intrusion detection systems. Despite this disadvantage, the frequency based method which requires a relatively small amount of preprocessing time is usually used. This paper proposes an effective method for detecting denial of service attacks using the frequency based method. Principal Component Analysis(PCA) will be used to select the principle system calls and a bayesian network will be composed and the bayesian classifier will be used for the classification.

Scale Effects and Field Applications for Continuous Intrusion Miniature Cone Penetrometer (연속관입형 소형콘관입시험기에 대한 크기효과 및 현장적용)

  • Yoon, Sungsoo;Kim, Kyu-Sun;Lee, Jin Hyung;Shin, Dong-Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2359-2368
    • /
    • 2013
  • Cone penetration tests (CPTs) have been increasingly used for site characterizations. However, the site investigations using CPTs are often limited due to soil conditions depending on the cone size and capacity of the CPT system. The small sectional area of a miniature cone improves the applicability of the CPT system due to the increased capacity of the CPT system. A continuous intrusion system using a coiled rod allows fast and cost effective site investigation. In this study, the performance of the continuous intrusion miniature cone penetration test (CIMCPT) system has been evaluated by comparison tests with the standard CPT system at several construction sites in Korea. The results show that the CIMCPT system has a same performance with the CPT system and has advantages on the mobility and applicability. According to field verification tests for scale effect evaluation, the cone tip resistance evaluated by CIMCPT overestimates by 10% comparing to standard CPTs. A crawler mounted with the CIMCPT system has been implemented to improve accessibility to soft ground, and has shown improvement over the truck type CIMCPT system. Therefore, the improved CIMCPT system can be utilized as a cost effective and highly reliable soil investigation methodology to detect the depth of soft ground and to evaluate soil classification.

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.

Current Status and Application of Agricultural Subsurface Dams in Korea (국내 농업용 지하댐의 현황 및 활용 사례)

  • Yong, Hwan-Ho;Song, Sung-Ho;Myoung, Woo-Ho;An, Jung-Gi;Hong, Soon-Wook
    • Journal of Soil and Groundwater Environment
    • /
    • v.22 no.3
    • /
    • pp.18-26
    • /
    • 2017
  • The increasing frequency of droughts has been increasing the necessity of utilizing subsurface dams as reliable groundwater resources in areas where it is difficult to supply adequate agricultural water using only surface water. In this study, we analyzed the current status and actual conditions of five agricultural subsurface dams as well as the effect of obtaining additional groundwater from subsurface dams operated as one aspect of the sustainable integrated water management system. Based on the construction methods and functions of each subsurface dam, the five subsurface dams are classified into three types such as those that derive water from rivers, those that prevent seawater intrusion, and those that link to a main irrigation canal. The classification is based on various conditions including topography, reservoir location, irrigation facilities, and river and alluvial deposit distributions. Agricultural groundwater upstream of subsurface dams is obtained from four to five radial collector wells. From the study, the total amount of groundwater recovered from the subsurface dam is turned out to be about 29~44% of the total irrigation water demand, which is higher than that of general agricultural groundwater of about 4.6%.

Petrology of Granitic Complex Distributed in the Woosanbong area, northwestern part of Yuseong (유성(儒城) 서북부(西北部) 우산봉(雨傘峰) 일대(一帶)에 분포(分布)하는 화강암(花崗巖) 복합체(複合體)의 암석학적(岩石學的) 연구(硏究))

  • Kim, Seungho;Lee, Dai Sung
    • Economic and Environmental Geology
    • /
    • v.14 no.3
    • /
    • pp.123-142
    • /
    • 1981
  • Granitic complex in the Woosanbong area is composed of schistose granite, two-mica granite, biotite granite, porphyritic granite and pink feldspar granite in order of intrusion. In their boundary aspects, the gradational change between porphyritic granite and pink feldspar granite is observed in field relations. All the granites of the complex are classified to quartz monzonite by the modal compositions following Bateman's classification (1961) with the exception of pink feldspar granite which belongs to granite according to the petrographical classification. The first three granites are characterized by highly development of vein and/or lens-like pegmatites in their bodies, and two others contain green hornblende uniquely. These leucocratic two-mica granite shows an unusual character in ratio of muscovite to biotite 1: 0.7 to 1:13, and contains dominantly microcline. The content of muscovite varies in places in the field. Under the polarizing microscope it is revealed that the muscovite flakes occur as the products altered from biotite partly or completely, and it usually associates with chlorite flakes nearby. These features, therefore, suggests that biotite probably has been altered to muscovite and chlorite by hydration during deuteric processes. At the same stage, sericitization of plagioclase by the hydrolytic decomposition, and transformation of orthoclase to microcline may be taken place. Accordingly, it is obviously permissible to consider the two-mica granite as a kind of 'apo-granite' by deuteric alterations during the consolidation of magma.

  • PDF

Automatic Detection System for Dangerous Abandoned Objects Based on Vision Technology (비전 기술에 기반한 위험 유기물의 자동 검출 시스템)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.69-74
    • /
    • 2009
  • Abandoned objects should be treated as possibly dangerous things for public areas until they turn out to be safe because explosive material or chemical substance is intentionally contained in them for public terrors. For large public areas such as airports or train stations, there are limits in man-power for security staffs to check all the monitors for covering the entire area under surveillance. This is the basic motivation of developing the automatic detection system for dangerous abandoned objects based on vision technology. In this research, well-known DBE is applied to stably extract background images and the HOG algorithm is adapted to discriminate between human and stuff for object classification. To show the effectiveness of the proposed system, experiments are carried out in detecting intrusion for a forbidden area and alarming for abandoned objects in a room under surveillance.

  • PDF

TIME-VARIANT OUTLIER DETECTION METHOD ON GEOSENSOR NETWORKS

  • Kim, Dong-Phil;I, Gyeong-Min;Lee, Dong-Gyu;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.410-413
    • /
    • 2008
  • Existing Outlier detections have been widely studied in geosensor networks. Recently, machine learning and data mining have been applied the outlier detection method to build a model that distinguishes outliers based on anchored criterion. However, it is difficult for the existing methods to detect outliers against incoming time-variant data, because outlier detection needs to monitor incoming data and classify irregular attacks. Therefore, in order to solve the problem, we propose a time-variant outlier detection using 2-dimensional grid method based on unanchored criterion. In the paper, outliers using geosensor data was performed to classify efficiently. The proposed method can be utilized applications such as network intrusion detection, stock market analysis, and error data detection in bank account.

  • PDF

Petrographic Study on Mylonitic Granite in the Unbong-Ayoung Area (운봉(雲峰)-아영(阿英) 지역(地域)에서 나타나는 압쇄상화강암(壓碎狀花崗岩)에 대(對)한 암석기재학적(岩石記載學的) 연구(硏究))

  • Kim, Yong Jun;Kim, Jeong Bin;Dallmeyer, R.D.
    • Economic and Environmental Geology
    • /
    • v.20 no.2
    • /
    • pp.125-136
    • /
    • 1987
  • The characteristic features of mylonitic granite in the Unbong-Ayoung area is as follow; (1) Mylonitic granite is a shearing product from porphyritic granite of Namweon Granites. (2) This rock megascopically shows foliated texture, and their modal compositions according to classification of dynamically metamorphosed rock are correspond to blastomylonite. (3) This rock generated by dextral strike slip movement at deep level. (4) The geochronological data of hornblendes from this rock undertaken by $^{40}Ar/^{89}Ar$ method are 191Ma to 195Ma. (5) The geochronological data of this rock suggests that Namweon Granites might be a product of intrusion and crystallization at the late Triassic or the Jurassic.

  • PDF

A Study on an Effective Intrusion Classification Mechanism based on SOM (SOM 기반의 효율적인 침입 분류 체계에 관한 연구)

  • Choi, Jin-woo;Woo, Chong-woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1177-1180
    • /
    • 2004
  • 최근 침입의 형태는 기존 공격자의 직접적인 시스템 침입 및 악의적 행위들의 행사와는 달리 침입 자동화 도구들을 사용하는 형태로 변모해 가고 있다. 알려지지 않은 공격의 유형 또한 변형된 이들 도구들의 사용이 대부분이다. 이들 공격도구들 대부분은 기존 형태에서 크게 벗어나지 않으며, 침입 도구의 산출물 또한 공통적인 형태로 존재한다. 본 논문에서는 알려지지 않은 다양한 공격 유형 또한 기존 유사한 공격군으로 분류하기 위한 침입 분석 알고리즘으로 SOM(self-Organizing Maps)을 적용하고, 침입 구체화 분석 단계에서 공격도구들의 패턴을 정형화한 지식베이스를 기반으로 분석하는 시스템을 제안한다.

  • PDF