• Title/Summary/Keyword: Network Scan

Search Result 141, Processing Time 0.025 seconds

The application of convolutional neural networks for automatic detection of underwater object in side scan sonar images (사이드 스캔 소나 영상에서 수중물체 자동 탐지를 위한 컨볼루션 신경망 기법 적용)

  • Kim, Jungmoon;Choi, Jee Woong;Kwon, Hyuckjong;Oh, Raegeun;Son, Su-Uk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.2
    • /
    • pp.118-128
    • /
    • 2018
  • In this paper, we have studied how to search an underwater object by learning the image generated by the side scan sonar in the convolution neural network. In the method of human side analysis of the side scan image or the image, the convolution neural network algorithm can enhance the efficiency of the analysis. The image data of the side scan sonar used in the experiment is the public data of NSWC (Naval Surface Warfare Center) and consists of four kinds of synthetic underwater objects. The convolutional neural network algorithm is based on Faster R-CNN (Region based Convolutional Neural Networks) learning based on region of interest and the details of the neural network are self-organized to fit the data we have. The results of the study were compared with a precision-recall curve, and we investigated the applicability of underwater object detection in convolution neural networks by examining the effect of change of region of interest assigned to sonar image data on detection performance.

A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic (퍼지 로직을 이용한 느린 포트스캔 공격 탐지 및 대응 기법)

  • Kim, Jae-Kwang;Yoon, Kwang-Ho;Lee, Seung-Hoon;Jung, Je-Hee;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.679-684
    • /
    • 2008
  • The slow port scan attack detection is the one of the important topics in the network security. We suggest an abnormal traffic control framework to detect slow port scan attacks using fuzzy rules. The abnormal traffic control framework acts as an intrusion prevention system to suspicious network traffic. It manages traffic with a stepwise policy: first decreasing network bandwidth and then discarding traffic. In this paper, we show that our abnormal traffic control framework effectively detects slow port scan attacks traffic using fuzzy rules and a stepwise policy.

Design and Implementation of A Scan Detection Management System with real time Incidence Response (실시간 e-mail 대응 침입시도탐지 관리시스템의 설계 및 구현)

  • Park, Su-Jin;Park, Myeong-Chan;Lee, Sae-Sae;Choe, Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.359-366
    • /
    • 2002
  • Nowadays, the hacking techniques are developed increasingly with wide use of internet. The recent type of scanning attack is appeared in against with multiple target systems on the large scaled domain rather than single network of an organization. The development of scan detection management system which can detect and analyze scan activities is necessary to prevent effectively those attacking at the central system. The scan detection management system is useful for effective utilization of various detection information that received from scan detection agents. Real time scan detection management system that can do the integrated analysis of high lever more that having suitable construction in environment of large scale network is developed.

A Clustered Reconfigurable Interconnection Network BIST Based on Signal Probabilities of Deterministic Test Sets (결정론적 테스트 세트의 신호확률에 기반을 둔 clustered reconfigurable interconnection network 내장된 자체 테스트 기법)

  • Song Dong-Sup;Kang Sungho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.12
    • /
    • pp.79-90
    • /
    • 2005
  • In this paper, we propose a new clustered reconfigurable interconnect network (CRIN) BIST to improve the embedding probabilities of random-pattern-resistant-patterns. The proposed method uses a scan-cell reordering technique based on the signal probabilities of given test cubes and specific hardware blocks that increases the embedding probabilities of care bit clustered scan chain test cubes. We have developed a simulated annealing based algorithm that maximizes the embedding probabilities of scan chain test cubes to reorder scan cells, and an iterative algorithm for synthesizing the CRIN hardware. Experimental results demonstrate that the proposed CRIN BIST technique achieves complete fault coverage with lower storage requirement and shorter testing time in comparison with the conventional methods.

An Efficient AP Channel Scanning Scheme for Real-time VoIP Streaming in Wireless LAN (WLAN 기반 실시간 VoIP Streaming을 위한 효율적 채널 스캐닝 기법)

  • Cheon, Young-Chang;Youn, Hee-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.595-598
    • /
    • 2014
  • In order to provide the Mobile Stations operating in IEEE 802.11 Wireless LAN network with seamless handover, a comprehensive study on the functions of handover considering various networking environments and characteristics of Mobile Stations is required. Note that the channel scan process finding a new AP takes the major portion of handover time, and this is the most significant issue with seamless handover for real-time multimedia service in WLAN environment. In this paper the functions required to provide seamless handover in IEEE 802.11 WLAN network are identified, and a new scanning technique is proposed with which the Mobile Stations can selectively scan the channels to reduce the channel scan time in various network environments. Here each Mobile Station awares of the channels the neighbor APs are using by scanning them in advance according to the proposed technique. Afterwards, when handover is actually required, the optimal AP is decided quickly by scanning only the predetemined group of channels and order of scan without unnecessary scan of all the channels. In addition, proposes to enter the Scan Trigger Value and Handover Threshold Value in mobile phones in order to prevent the phenomenon can not handover.

  • PDF

MnO2 Nanowires Electrodeposited in a Porous Network of Agarose Gel as a Pseudocapacitor Electrode

  • Jin, Sohyun;Ryu, Ilhwan;Lim, Geo;Yim, Sanggyu
    • Journal of Electrochemical Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.406-410
    • /
    • 2020
  • Despite a simple preparation of manganese oxide (MnO2) nanowires by electrodeposition, the improvement in specific capacitance (Csp) and voltammetric response of the MnO2 nanowire-based electrodes has been quite limited. This is attributed to the poor electrical conductivity of MnO2 and its dense bulk morphology due to the aggregation of the nanowires. This study investigated the capacitive performance of MnO2 nanowires electrodeposited on agarose thin films. The good ionic conductivity and porous network of the agarose film provided favorable growth conditions for the MnO2 nanowires with suppressed aggregation. A maximum Csp value of 686 F/g measured at a scan rate of 10 mV/s was obtained, which was significantly larger than that of 314 F/g for the agarose-free MnO2 electrode at the same scan rate. The rate capability was also improved. The Csp measured at a high scan rate of 100 mV/s retained 74.0% of the value measured at 10 mV/s, superior to the retention of 71.1% for the agarose-free MnO2 electrode.

Design and Implementation UPS Management System in HFC Network (HFC 전송망을 이용한 UPS 원격관리 시스템의 설계와 구현)

  • 김영화;강준우
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.75-78
    • /
    • 2002
  • Since power failures in high-speed communication network, especially in HFC(Hybrid Fiber Coaxial cable) network are critical, microcontroller-based UPS(Uninterrupted Power Supply) are commonly used in the network. Hardware and software of UPS management system is designed and implemented to monitor and control UPS status to supply electric power to ONU and TBA in the HFC network. The result of laboratory tests and field tess of this system shows the scan rate to be 1 to 10 minutes to sufficiently monitor the status of UPS in the network.

  • PDF

Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS (침입탐지시스템에서 포트 스캔 탐지 개선 및 공격 탐지와 연계한 알고리즘 설계 및 구현)

  • Park Seong-Chul;Ko Han-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.65-76
    • /
    • 2006
  • This paper deals with an effective algerian aimed at improving the port scan detection in an intrusion detection system (IDS). In particular, a detection correlation algerian is proposed to maximize the detection capability in the network-based IDS whereby the 'misuse' is flagged for analysis to establish intrusion profile in relation to the overall port scan detection process. In addition, we establish an appropriate system maintenance policy for port scan detection as preprocessor for improved port scan in IDS, thereby achieving minimum false positive in the misuse detection engine while enhancing the system performance.

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

A Study on the Defect Classification and Evaluation in Weld Zone of Austenitic Stainless Steel 304 Using Neural Network (신경회로망을 이용한 오스테나이트계 스테인리스강 304 용접부의 결함 분류 및 평가에 관한 연구)

  • Lee, Won;Yoon, In-Sik
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.7
    • /
    • pp.149-159
    • /
    • 1998
  • The importance of soundness and safety evaluation in weld zone using by the ultrasonic wave has been recently increased rapidly because of the collapses of huge structures and safety accidents. Especially, the ultrasonic method that has been often used for a major non-destructive testing(NDT) technique in many engineering fields plays an important role as a volume test method. Hence, the defecting any defects of weld Bone in austenitic stainless steel type 304 using by ultrasonic wave and neural network is explored in this paper. In order to detect defects, a distance amplitude curve on standard scan sensitivity and preliminary scan sensitivity represented of the relation between ultrasonic probe, instrument, and materials was drawn based on a quantitative standard. Also, a total of 93% of defect types by testing 30 defect patterns after organizing neural network system, which is learned with an accuracy of 99%, based on ultrasonic evaluation is distinguished in order to classify defects such as holes or notches in experimental results. Thus, the proposed ultrasonic wave and neural network is useful for defect detection and Ultrasonic Non-Destructive Evaluation(UNDE) of weld zone in austenitic stainless steel 304.

  • PDF