• Title/Summary/Keyword: Intrusion Sensor

Search Result 93, Processing Time 0.024 seconds

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

Analysis of Improved Convergence and Energy Efficiency on Detecting Node Selection Problem by Using Parallel Genetic Algorithm (병렬유전자알고리즘을 이용한 탐지노드 선정문제의 에너지 효율성과 수렴성 향상에 관한 해석)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.953-959
    • /
    • 2012
  • There are a number of idle nodes in sensor networks, these can act as detector nodes for anomaly detection in the network. For detecting node selection problem modeled as optimization equation, the conventional method using centralized genetic algorithm was evaluated. In this paper, a method to improve the convergence of the optimal value, while improving energy efficiency as a method of considering the characteristics of the network topology using parallel genetic algorithm is proposed. Through simulation, the proposed method compared with the conventional approaches to the convergence of the optimal value was improved and was found to be energy efficient.

Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network (스마트 제조 산업용 네트워크에 적합한 Snort IDS에서의 전처리기 구현)

  • Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1313-1322
    • /
    • 2016
  • Recently, many virus and hacking attacks on public organizations and financial institutions by internet are becoming increasingly intelligent and sophisticated. The Advanced Persistent Threat has been considered as an important cyber risk. This attack is basically accomplished by spreading malicious codes through complex networks. To detect and extract PE files in smart manufacturing industry networks, an efficient processing method which is performed before analysis procedure on malicious codes is proposed. We implement a preprocessor of open intrusion detection system Snort for fast extraction of PE files and install on a hardware sensor equipment. As a result of practical experiment, we verify that the network sensor can extract the PE files which are often suspected as a malware.

Development of Smart Kiosk for Controlling and Monitoring (제어 및 모니터링을 위한 스마트 키오스크 개발)

  • Kim, Jin-Sa
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.2
    • /
    • pp.160-164
    • /
    • 2022
  • In this paper, through the development of a smart panel (LCD kiosk) controller, contents to develop a system that can be operate in a desired environment by operating the window control and ventilation facilities according to the automatic controller operation based on the set values such as temperature, humidity, sunlight, and rainfall. In particular, the MQTT protocol-based sensor module can be directly manufactured and applied at any time based on various communication and power sources such as wireless, wired, and PLC (power line communication) to obtain the desired data, as well as fire, power failure, and intrusion in the house. It is also a system that enables operation and monitoring from a remote location based on the cloud environment by connecting sensors. Kiosks are currently being used in many places, and the demand for them is on the rise, and an active influx of young people can be expected through environmental improvement. It is expected to increase interest and understanding for improvement.

Development of an Integrated Monitoring System for the Low and Intermediate Level Radioactive Waste Near-surface Disposal Facility (방사성폐기물 표층처분시설 통합 모니터링 시스템 개발)

  • Se-Ho Choi;HyunGoo Kang;MiJin Kwon;Jae-Chul Ha
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.359-367
    • /
    • 2023
  • In this study, the function and purpose of the disposal cover, which is an engineering barrier installed to isolate the disposal vault of the near-surface disposal facility for radioactive waste from natural/man-made intrusion, and the design details of the demonstration facility for performance verification were described. The Demonstration facility was designed in a partially divided form to secure the efficiency of measurement while being the same as the actual size of the surface disposal facility to be built in the Intermediate & low-level radioactive waste disposal site of the Korea Radioactive Waste Agency (KORAD). The instruments used for measurement consist of a multi-point thermometer, FDR (Frequency Domain Reflectometry) sensor, inclinometer, acoustic sensor, flow meter, and meteorological observer. It is used as input data for the monitoring system. The 3D monitoring system was composed of 5 layers using the e-government standard framework, and was developed based on 4 components: screen, control module, service module, and DBIO(DataBase Input Output) module, and connected them to system operation. The monitoring system can provide real-time information on physical changes in the demonstration facility through the collection, analysis, storage, and visualization processes.

TIME-VARIANT OUTLIER DETECTION METHOD ON GEOSENSOR NETWORKS

  • Kim, Dong-Phil;I, Gyeong-Min;Lee, Dong-Gyu;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.410-413
    • /
    • 2008
  • Existing Outlier detections have been widely studied in geosensor networks. Recently, machine learning and data mining have been applied the outlier detection method to build a model that distinguishes outliers based on anchored criterion. However, it is difficult for the existing methods to detect outliers against incoming time-variant data, because outlier detection needs to monitor incoming data and classify irregular attacks. Therefore, in order to solve the problem, we propose a time-variant outlier detection using 2-dimensional grid method based on unanchored criterion. In the paper, outliers using geosensor data was performed to classify efficiently. The proposed method can be utilized applications such as network intrusion detection, stock market analysis, and error data detection in bank account.

  • PDF

Design of an Intrusion Detection System using IoT Sensor Module in Mobile Device Environment (모바일 디바이스 환경에서 IoT센서 모듈을 활용한 침입감지 시스템 설계)

  • Kwon, Young-Woo;Jung, Hee-Chan;Yu, Yun-Sik;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.294-297
    • /
    • 2017
  • 최근 청년 실업률과 이혼, 인구 고령화 등의 이유로 1인가구는 2015년 520만 3천 가구로 전체(1911만 1천 가구) 대비 27.5%를 차지하고 있다. 하지만, 제대로 된 방범 시스템을 갖추지 못해 주거침입 범죄는 1인 가구를 대상으로 이루어지고 있다. 방범업계에서는 1인 가구를 위한 방범용 시스템을 출시하고 있지만, 대부분의 1인 가구들은 여전히 불안감을 느끼며 생활하고 있다. 본 논문에서는 모바일 디바이스와 마이크로프로세서를 활용한 침입감지 시스템을 설계하였다. 제시하고 있는 시스템은 IoT 센서 모듈을 활용하여 특정 구역 내 움직이는 물체를 감지하고, 블루투스 통신 모듈을 이용하여 사용자에게 알려준다.

  • PDF

Dynamic Defense Strategy for Intrusion Detection in Wireless Sensor Networks (무선 센서 네트워크에서 침입 탐지를 위한 동적인 방어 기법)

  • Yulia, Ponomarchuk;Nam, Young-Jin;Seo, Dae-Wha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1147-1150
    • /
    • 2008
  • 본 논문에서는 무선 센서 네트워크 상의 침입 탐지를 위한 동적인 방어 기법을 제안한다. 제안된 기법은 네트워크 상에 작은 수의 노드를 통하여 모니터링 작업을 수행하여 네트워크 상의 배터리 소모를 최소화함으로써 전체 네트워크의 라이프타임을 연장시킬 수 있도록 한다. 또한, 제안된 기법은 계층적 네트워크를 기반으로 한 간단한 구조를 갖고 있어, 센서 노드 내 배터리, 메모리, 컴퓨팅 파워 등의 제한된 자원에 효과적으로 대처할 수 있다.

Transmission Performance of Lattice Structure Ad-Hoc Network under Intrusions (침해가 있는 격자구조 애드-혹 네트워크의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.767-772
    • /
    • 2014
  • As temporary network, ad-hoc network has been effected by structures and implemented environments of networks. In this paper, transmission performance of lattice structure ad-hoc network, which is expected to use in sensor network and IoT(Internet of Things), is analyzed in point of intrusions and countermeasure for intrusion is suggested. In this paper, computer simulation based on NS-2 is used for performance analysis, VoIP(Voice over Internet Protocol) as a widely used service is chosen for performance measure. MOS(Mean Opinion Score) and call connection rate is used as performance parameter. As results of performance analysis, it is shown that for MOS, random network is better then lattice network at intrusion environments, but for call connection rate, lattice network is better then random network.

An Analysis on the Deployment Methods for Smart Monitoring Systems (스마트 모니터링 시스템의 배치 방식 분석)

  • Heo, No-Jeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.55-62
    • /
    • 2010
  • Monitoring systems are able to report certain events at region of interest(ROI) and to take an appropriate action. From industrial product line full of robots to fire detection, intrusion detection, smart grid application, environmental pollution alarm system, monitoring system has widely used in diverse industry sector. Recently, due to advance of wireless communication technology and availability of low cost sensors, intelligent and/or smart monitoring systems such as sensor networks has been developed. Several deployment methods are introduced to meet various monitoring needs and deployment performance criteria are also summarized to be used to identify weak point and be useful at designing monitoring systems. Both efficiency during deployment and usefulness after the deployment should be assessed. Efficiency factors during deployment are elapsed time, energy required, deployment cost, safety, sensor node failure rate, scalability. Usefulness factors after deployment are ROI coverage, connectivity, uniformity, target density similarity, energy consumption rate per unit time and so on.