• Title/Summary/Keyword: Local Anomaly

Search Result 83, Processing Time 0.02 seconds

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

Variation of the Hemispheric Asymmetry of the Equatorial Ionization Anomaly with Solar Cycle

  • Kwak, Young-Sil;Kil, Hyosub;Lee, Woo Kyoung;Yang, Tae-Yong
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.3
    • /
    • pp.159-168
    • /
    • 2019
  • In solstices during the solar minimum, the hemispheric difference of the equatorial ionization anomaly (EIA) intensity (hereafter hemispheric asymmetry) is understood as being opposite in the morning and afternoon. This phenomenon is explained by the temporal variation of the combined effects of the fountain process and interhemispheric wind. However, the mechanism applied to the observations during the solar minimum has not yet been validated with observations made during other periods of the solar cycle. We investigate the variability of the hemispheric asymmetry with local time (LT), altitude, season, and solar cycle using the electron density taken by the CHAllenging Minisatellite Payload satellite and the global total electron content (TEC) maps acquired during 2001-2008. The electron density profiles provided by the Constellation Observing System for Meteorology, Ionosphere, and Climate satellites during 2007-2008 are also used to investigate the variation of the hemispheric asymmetry with altitude during the solar minimum. During the solar minimum, the location of a stronger EIA moves from the winter hemisphere to the summer hemisphere around 1200-1400 LT. The reversal of the hemispheric asymmetry is more clearly visible in the F-peak density than in TEC or in topside plasma density. During the solar maximum, the EIA in the winter hemisphere is stronger than that in the summer hemisphere in both the morning and afternoon. When the location of a stronger EIA in the afternoon is viewed as a function of the year, the transition from the winter hemisphere to the summer hemisphere occurs near 2004 (yearly average F10.7 index = 106). We discuss the mechanisms that cause the variation of the hemispheric asymmetry with LT and solar cycle.

Implementation and Validation of Earth Acquisition Algorithm for Communication, Ocean and Meteorological Satellite

  • Park, Sang-Wook;Lee, Young-Ran;Lee, Byoung-Sun;Hwang, Yoo-La;Lee, Un-Seob
    • Journal of Astronomy and Space Sciences
    • /
    • v.28 no.4
    • /
    • pp.345-354
    • /
    • 2011
  • Earth acquisition is to solve when earth can be visible from satellite after Sun acquisition during launch and early operation period or on-station satellite anomaly. In this paper, the algorithm and test result of the Communication, Ocean and Meteorological Satellite (COMS) Earth acquisition are presented in case of on-station satellite anomaly status. The algorithms for the calculation of Earth-pointing attitude control parameters including those attitude direction vector, rotation matrix, and maneuver time and duration are based on COMS configuration (Eurostar 3000 bus). The coordinate system uses the reference initial frame. The constraint calculating available time-slot to perform the earth acquisition considers eclipse, angular separation, solar local time, and infra-red earth sensor blinding conditions. The results of Electronics and Telecommunications Research Institute (ETRI) are compared with that of the Astrium software to validate the implemented ETRI software.

Restoration of Landsat ETM+ SLC-off Gaps Using SPOT Image (SPOT 영상을 이용한 Landsat-7의 SLC-off 영상 복원)

  • Kim Hye-Jin;Yu Ki-Yun;Kim Yong-Il
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2006.04a
    • /
    • pp.229-234
    • /
    • 2006
  • On May 31, 2003. Landsat 7 experienced an anomaly causing the Scan Line Corrector(SLC) to stop functioning normally. The SLC-off causes individual scan lines to alternately overlap and then leave large gaps at the edge of the Image. A many scientists with ongoing experience using ETM+ data evaluated the scientific usability and validity of Landsat 7 products containing the SLC anomaly The best reference scene for gap-filling is the other SLC-on Landsat scene that provide same resolution, few changes, and similar data acquisition. But receiving of Landsat imagery is not stable in Korea. So SPOT image can be another alternative solution because it is a steady-state multispectral satellite image as Landsat image. In this study, we filled the SLC-off gap s of 2, 3, 4 bands using SPOT image by a local regression technique, and assigned the optimum spectral value to gaps of 1, 5, 7 bands based on a spectral adjacency. Through this process, we could restore Landsat SLC-off image and evaluated the accuracy of the results.

  • PDF

A DoS Detection Method Based on Composition Self-Similarity

  • Jian-Qi, Zhu;Feng, Fu;Kim, Chong-Kwon;Ke-Xin, Yin;Yan-Heng, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1463-1478
    • /
    • 2012
  • Based on the theory of local-world network, the composition self-similarity (CSS) of network traffic is presented for the first time in this paper for the study of DoS detection. We propose the concept of composition distribution graph and design the relative operations. The $(R/S)^d$ algorithm is designed for calculating the Hurst parameter. Based on composition distribution graph and Kullback Leibler (KL) divergence, we propose the composition self-similarity anomaly detection (CSSD) method for the detection of DoS attacks. We evaluate the effectiveness of the proposed method. Compared to other entropy based anomaly detection methods, our method is more accurate and with higher sensitivity in the detection of DoS attacks.

REGIONAL ODONTODYSPLASIA : A REPORT OF TWO CASE (국소적 치아이형성증(regional odontodysplasia)에 대한 증례보고)

  • Son, Duk-Il;Kim, Hyun-Jung;Nam, Soon-Hyeun;Kim, Young-Jin
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.24 no.1
    • /
    • pp.19-26
    • /
    • 1997
  • Odontodysplasia is a rare developmental anomaly of tooth formation in which hard tissue are affected. Odontodyplasia affects the primary and permanent dentitions in the maxilla, mandible, or both jaws. The maxilla is involved twice as often as the mandible. The condition is more common in female than in male patients and in the anterior than in the posterior regions. The clinical manifestation of odontodysplasia are hypoplasia and hypocalcification of the enamel and dentin of affected teeth. Teeth tend to be small and discolored, with short roots and widely open pulp canal. Delayed eruption of affected teeth with abscess formation is common. Radiographically teeth assume a faint radiolucent image ("ghost teeth"). enamel and dentin appear thin and are similar in radiodensity. The pulp chambers are often larger than normal, calcifications(pulp stone and denticle) are found within them. The etiology of regional odontodysplasia is unknown. However, several causes have been discussed, including somatic mutation, local circulatory disorders, local trauma, failure of migration and differentiation of neural crest cells, local infection.

  • PDF

Abnormal Behavior Recognition Based on Spatio-temporal Context

  • Yang, Yuanfeng;Li, Lin;Liu, Zhaobin;Liu, Gang
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.612-628
    • /
    • 2020
  • This paper presents a new approach for detecting abnormal behaviors in complex surveillance scenes where anomalies are subtle and difficult to distinguish due to the intricate correlations among multiple objects' behaviors. Specifically, a cascaded probabilistic topic model was put forward for learning the spatial context of local behavior and the temporal context of global behavior in two different stages. In the first stage of topic modeling, unlike the existing approaches using either optical flows or complete trajectories, spatio-temporal correlations between the trajectory fragments in video clips were modeled by the latent Dirichlet allocation (LDA) topic model based on Markov random fields to obtain the spatial context of local behavior in each video clip. The local behavior topic categories were then obtained by exploiting the spectral clustering algorithm. Based on the construction of a dictionary through the process of local behavior topic clustering, the second phase of the LDA topic model learns the correlations of global behaviors and temporal context. In particular, an abnormal behavior recognition method was developed based on the learned spatio-temporal context of behaviors. The specific identification method adopts a top-down strategy and consists of two stages: anomaly recognition of video clip and anomalous behavior recognition within each video clip. Evaluation was performed using the validity of spatio-temporal context learning for local behavior topics and abnormal behavior recognition. Furthermore, the performance of the proposed approach in abnormal behavior recognition improved effectively and significantly in complex surveillance scenes.

Extraction of Geomagnetic Field from KOMSAT-1 Three-Axis Magnetometer Data

  • Hwang, Jong-Sun;Lee, Sun-Ho;Min, Kyung-Duck;Kim, Jeong-Woo
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.242-242
    • /
    • 2002
  • The Earth's magnetic field acquired from KOMPSAT-1's TAM (Three-Axis Magnetometer) between June 19th and 21st 2000 was analyzed. The TAM, one of the KOMPSAT-1's Attitude and Orbit Control Subsystems, plays an important role in determining and controlling the satellite's attitude. This also can provide new insight on the Earth's magnetic field. By transforming the satellite coordinate from ECI to ECEF, spherical coordinate of total magnetic field was achieved. These data were grouped into dusk (ascending) and dawn (descending) data sets, based on their local magnetic times. This partitioning is essential for performing 1-D WCA (Wavenumber Correlation Analysis). Also, this enhances the perception of external fields in the Kompsat-1's TAM magnetic maps that were compiled according to different local. The dusk and dawn data are processed independently and then merged to produce a total field magnetic anomaly map. To extract static and dynamic components, the 1-D and 2-D WCAs were applied to the sub-parallel neighboring tracks and dawn-dusk data sets. The static components were compared with the IGRF, the global spherical harmonic magnetic field model. The static and dynamic components were analyzed in terms of corefield, external, and crustal signals based on their origins.

  • PDF

A Geophysical Study on the Geotectonics and Opening Mechanism of the Ulleung Basin, East Sea (동해 울릉분지의 지구조 및 성인에 관한 지구물리학적 연구)

  • Suh, Man-Cheol;Lee, Gwang-Hoon;Shon, Ho-Woong
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.3 no.1
    • /
    • pp.34-44
    • /
    • 1998
  • Analysis of gravity, magnetic, and seismic reflection data from the Ulleung Basin, East Sea has provided some insights into the opening mechanism and crustal type of the basin. Free-air gravity anomaly data show positive anomalies of about 40~60 mgal near the Korea Plateau and Oki Bank and of about -20~20 mgal in the central basin. Bouguer gravity anomaly data exhibit NE-SW trending positive anomalies of about 150 mgal in the central basin which is interpreted to be related to high-density crustal material. Abrupt changes in both Free-air and Bouguer gravity anomaly profiles across the basin margins may be due to transition between continental and oceanic crusts. Magnetic anomalies in the basin are generally less than -400 nT. No stripe pattern is evident in the magnetic anomaly map but a NW-SE trending symmetric pattern is seen in some magnetic profiles. The symmetric pattern is probably associated with the high-density crustal material in the central basin suggested by Bouguer gravity anomaly. The acoustic basement in the deep part of the basin has only a small amount of local relief. No graben or half-graben structures are seen in the acoustic basement from which mechanical extension might be inferred. The lack of high-relief structures in the acoustic basement may suggest that the basin is underlain by oceanic crust or that the basement is overlain by thick volcanic layer which obscures the structures and relief of the basement. High-density crust in the central basin inferred from gravity data, abrupt changes in gravity anomalies across the basin margins, symmetric pattern seen in some magnetic anomaly profiles, and lack of relief in the acoustic basement may suggest sea-floor spreading origin of the Ulleung Basin.

  • PDF

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF