• Title/Summary/Keyword: Intrusion Detection

Search Result 1,023, Processing Time 0.034 seconds

A Study on the Energy Efficient Data Aggregation Method for the Customized Application of Underwater Wireless Sensor Networks (특정 응용을 위한 수중센서네트워크에서 에너지 효율적인 데이터통합 방법 연구)

  • Kim, Sung-Un;Park, Seon-Yeong;Yu, Hyung-Cik
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1438-1449
    • /
    • 2011
  • UWSNs(Underwater Wireless Sensor Networks) need effective modeling fitted to the customized type of application and its covering area. In particular it requires an energy efficient data aggregation method for such customized application. In this paper, we envisage the application oriented model for monitoring the pollution or intrusion detection over a given underwater area. The suggested model is based on the honeycomb array of hexagonal prisms. In this model, the purpose of data aggregation is that the head node of each layer(cluster) receives just one event data arrived firstly and transfer this and its position data to the base station effectively in the manner of energy efficiency and simplicity without duplication. Here if we apply the existent data aggregation methods to this kind of application, the result is far from energy efficiency due to the complexity of the data aggregation process based on the shortest path or multicast tree. In this paper we propose three energy efficient and simple data aggregation methods in the domain of cluster and three in the domain of inter-cluster respectively. Based on the comparative performance analysis of the possible combination pairs in the two domains, we derive the best energy efficient data aggregation method for the suggested application.

A Study on Classification and Processing of Events to Improve Efficiency of Convergence Security Control System (융합보안관제 시스템의 효율성 향상을 위한 이벤트 분류 및 처리에 관한 연구)

  • Kim, Sung Il;Kim, Jong Sung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.41-49
    • /
    • 2017
  • According to a research by global IT market research institute IDC, CSIM(Converged Security Information Management) market of Korea was estimated to be 1.7 trillion KRW in 2010, and it has grown approximately 32% every year since. IDC forcasts this size to grow to 12.8 trillion KRW by 2018. Moreover, this case study exemplifies growing importance of CSIM market worldwide. Traditional CSIM solution consists of various security solutions(e.g. firewall, network intrusion detection system, etc.) and devices(e.g. CCTV, Access Control System, etc.). With this traditional solution, the the data collected from these is used to create events, which are then used by the on-site agents to determine and handle the situation. Recent development of IoT industry, however, has come with massive growth of IoT devices, and as these can be used for security command and control, it is expected that the overall amount of event created from these devices will increase as well. While massive amount of events could help determine and handle more situations, this also creates burden of having to process excessive amount of events. Therefore, in this paper, we discuss potential events that can happen in CSIM system and classify them into 3 groups, and present a model that can categorize and process these events effectively to increase overall efficieny of CSIM system.

Evaluation of Half Cell Potential Measurement in Cracked Concrete Exposed to Salt Spraying Test (염해에 노출된 균열부 콘크리트의 반전위 평가)

  • Kim, Ki-Bum;Park, Ki-Tae;Kwon, Seung-Jun
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.6
    • /
    • pp.621-630
    • /
    • 2013
  • Several techniques for steel corrosion detection are proposed and HCP (half cell potential) technique is widely adopted for field investigation. If concrete has cracks on surface, steel corrosion is rapidly accelerated due to additional intrusion of chloride and carbon dioxide ions. This study is for an evaluation of HCP in cracked concrete exposed chloride attack. For this work, RC (reinforced concrete) beams are prepared considering 3 w/c ratios (0.35, 0.55, and 0.70) and several cover depths (10~60 mm) and various crack widths of 0.0~1.0 mm are induced. For 35 days, SST (salt spraying test) is performed for corrosion acceleration, and HCP and corrosion length of rebar are evaluated. With increasing crack width, w/c ratios, and decreasing cover depth, HCP measurements increase. HCP evaluation technique is proposed considering the effects of w/c ratios, crack width, and cover depth. Furthermore anti-corrosive cover depths are obtained through Life365 program and the results are compared with those from this study. The results shows relatively big difference in cracked concrete, however provide similar anti-corrosive conditions in sound concrete.

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.

Generation of Efficient Fuzzy Classification Rules Using Evolutionary Algorithm with Data Partition Evaluation (데이터 분할 평가 진화알고리즘을 이용한 효율적인 퍼지 분류규칙의 생성)

  • Ryu, Joung-Woo;Kim, Sung-Eun;Kim, Myung-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.32-40
    • /
    • 2008
  • Fuzzy rules are very useful and efficient to describe classification rules especially when the attribute values are continuous and fuzzy in nature. However, it is generally difficult to determine membership functions for generating efficient fuzzy classification rules. In this paper, we propose a method of automatic generation of efficient fuzzy classification rules using evolutionary algorithm. In our method we generate a set of initial membership functions for evolutionary algorithm by supervised clustering the training data set and we evolve the set of initial membership functions in order to generate fuzzy classification rules taking into consideration both classification accuracy and rule comprehensibility. To reduce time to evaluate an individual we also propose an evolutionary algorithm with data partition evaluation in which the training data set is partitioned into a number of subsets and individuals are evaluated using a randomly selected subset of data at a time instead of the whole training data set. We experimented our algorithm with the UCI learning data sets, the experiment results showed that our method was more efficient at average compared with the existing algorithms. For the evolutionary algorithm with data partition evaluation, we experimented with our method over the intrusion detection data of KDD'99 Cup, and confirmed that evaluation time was reduced by about 70%. Compared with the KDD'99 Cup winner, the accuracy was increased by 1.54% while the cost was reduced by 20.8%.

A Design of Time-based Anomaly Intrusion Detection Model (시간 기반의 비정상 행위 침입탐지 모델 설계)

  • Shin, Mi-Yea;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1066-1072
    • /
    • 2011
  • In the method to analyze the relationship in the system call orders, the normal system call orders are divided into a certain size of system call orders to generates gene and use them as the detectors. In the method to consider the system call parameters, the mean and standard deviation of the parameter lengths are used as the detectors. The attack of which system call order is normal but the parameter values are changed, such as the format string attack, cannot be detected by the method that considers only the system call orders, whereas the model that considers only the system call parameters has the drawback of high positive defect rate because of the information obtained from the interval where the attack has not been initiated, since the parameters are considered individually. To solve these problems, it is necessary to develop a more efficient learning and detecting method that groups the continuous system call orders and parameters as the approach that considers various characteristics of system call related to attacking simultaneously. In this article, we detected the anomaly of the system call orders and parameters by applying the temporal concept to the system call orders and parameters in order to improve the rate of positive defect, that is, the misjudgment of anomaly as normality. The result of the experiment where the DARPA data set was employed showed that the proposed method improved the positive defect rate by 13% in the system call order model where time was considered in comparison with that of the model where time was not considered.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.

A Comparative Study of Sulfate and Chloride Intrusion in Mortar Sections: An Approach Using Laser Induced Breakdown Spectroscopy and Ion Exchange Membrane (LIBS와 이온교환막을 활용한 모르타르 단면 침투 황산염과 염화물 분석)

  • Park, Won-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.3
    • /
    • pp.221-229
    • /
    • 2023
  • This research aimed to conduct an empirical assessment of the penetration of chloride and sulfate ions into mortar sections using an anion exchange membrane(AEM) and laser-induced breakdown spectroscopy(LIBS). The study involved a simultaneous ion chromatography(IC) analysis and LIBS analysis performed on mortars immersed in varying concentrations of chloride and sulfate. The findings revealed that at the wavelengths specific to Chloride(837.59nm) and Sulfur(921.30nm), the LIBS intensity achieved using AEM surpassed that obtained with a paper substrate at equivalent penetration concentrations. A robust correlation was confirmed between LIBS intensity and chloride ion concentration. Furthermore, when juxtaposed with IC analysis concentration outcomes at identical depths, the AEM displayed a higher intensity. The research noted an enhancement in LIBS intensity and a diminution in errors within the low-concentration section when deploying AEM. However, for the Sulfur wavelength of 921.3nm, there remains a need to augment the sensitivity of the LIBS signal within the low-concentration section in future studies. The findings underscore the potential of employing AEM and LIBS for precise analysis of chloride and sulfate ion penetration into mortar sections. This strategy can aid in bolstering assessment precision and mitigating errors, particularly in regions with low concentrations. It is recommended to further research and develop methods to amplify the sensitivity of the LIBS signal for sulfur detection in low-concentration sections. In sum, the study accentuates the significance of employing advanced techniques like AEM and LIBS for efficacious and precise analysis in the domain of mortar section assessment.