• Title/Summary/Keyword: Online detection

Search Result 334, Processing Time 0.021 seconds

Fake GPS Detection for the Online Game Service on Server-Side (모의 위치 서비스를 이용한 온라인 게임 악용 탐지 방안)

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1069-1076
    • /
    • 2017
  • Recently $Pok\acute{e}mon$ GO implements an online game with location-based real time augmented reality on mobile. The correct play of this game should be based on collecting the $Pok\acute{e}mon$ that appears as the user moves around by foot, but as the popularity increases, it appears an abuse to play easily. Many people have used an application that provides a mock location service such as Fake GPS, and these applications can be judged to be cheating in online games because they can play games in the house without moving. Detection of such cheating from a client point of view (mobile device) can consume a large amount of resources, which can reduce the speed of the game. It is difficult for developers to apply detection methods that negatively affect game usage and user's satisfaction. Therefore, in this paper, we propose a method to detect users abusing mock location service in online game by route analysis using GPS location record from the server point of view.

Ultrasonic wireless sensor development for online fatigue crack detection and failure warning

  • Yang, Suyoung;Jung, Jinhwan;Liu, Peipei;Lim, Hyung Jin;Yi, Yung;Sohn, Hoon;Bae, In-hwan
    • Structural Engineering and Mechanics
    • /
    • v.69 no.4
    • /
    • pp.407-416
    • /
    • 2019
  • This paper develops a wireless sensor for online fatigue crack detection and failure warning based on crack-induced nonlinear ultrasonic modulation. The wireless sensor consists of packaged piezoelectric (PZT) module, an excitation/sensing module, a data acquisition/processing module, a wireless communication module, and a power supply module. The packaged PZT and the excitation/sensing module generate ultrasonic waves on a structure and capture the response. Based on nonlinear ultrasonic modulation created by a crack, the data acquisition/processing module periodically performs fatigue crack diagnosis and provides failure warning if a component failure is imminent. The outcomes are transmitted to a base through the wireless communication module where two-levels duty cycling media access control (MAC) is implemented. The uniqueness of the paper lies in that 1) the proposed wireless sensor is developed specifically for online fatigue crack detection and failure warning, 2) failure warning as well as crack diagnosis are provided based on crack-induced nonlinear ultrasonic modulation, 3) event-driven operation of the sensor, considering rare extreme events such as earthquakes, is made possible with a power minimization strategy, and 4) the applicability of the wireless sensor to steel welded members is examined through field and laboratory tests. A fatigue crack on a steel welded specimen was successfully detected when the overall width of the crack was around $30{\mu}m$, and a failure warnings were provided when about 97.6% of the remaining useful fatigue lives were reached. Four wireless sensors were deployed on Yeongjong Grand Bridge in Souht Korea. The wireless sensor consumed 282.95 J for 3 weeks, and the processed results on the sensor were transmitted up to 20 m with over 90% success rate.

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties (그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석)

  • Jeong, Sihyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.567-575
    • /
    • 2020
  • As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

Detection of Political Manipulation through Unsupervised Learning

  • Lee, Sihyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1825-1844
    • /
    • 2019
  • Political campaigns circulate manipulative opinions in online communities to implant false beliefs and eventually win elections. Not only is this type of manipulation unfair, it also has long-lasting negative impacts on people's lives. Existing tools detect political manipulation based on a supervised classifier, which is accurate when trained with large labeled data. However, preparing this data becomes an excessive burden and must be repeated often to reflect changing manipulation tactics. We propose a practical detection system that requires moderate groundwork to achieve a sufficient level of accuracy. The proposed system groups opinions with similar properties into clusters, and then labels a few opinions from each cluster to build a classifier. It also models each opinion with features deduced from raw data with no additional processing. To validate the system, we collected over a million opinions during three nation-wide campaigns in South Korea. The system reduced groundwork from 200K to nearly 200 labeling tasks, and correctly identified over 90% of manipulative opinions. The system also effectively identified transitions in manipulative tactics over time. We suggest that online communities perform periodic audits using the proposed system to highlight manipulative opinions and emerging tactics.

Realtime e-Actuator Fault Detection using Online Parameter Identification Method (온라인 식별 및 매개변수 추정을 이용한 실시간 e-Actuator 오류 검출)

  • Park, Jun-Gi;Kim, Tae-Ho;Lee, Heung-Sik;Park, Chansik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.3
    • /
    • pp.376-382
    • /
    • 2014
  • E-Actuator is an essential part of an eVGT, it receives the command from the main ECU and controls the vane. An e-Actuator failure can cause an abrupt change in engine output and it may induce an accident. Therefore, it is required to detect anomalies in the e-Actuator in real time to prevent accidents. In this paper, an e-Actuator fault detection method using on-line parameter identification is proposed. To implement on-line fault detection algorithm, many constraints are considered. The test input and sampling rate are selected considering the constraints. And new recursive system identification algorithm is proposed which reduces the memory and MCU power dramatically. The relationship between the identified parameters and real elements such as gears, spring and motor are derived. The fault detection method using the relationship is proposed. The experiments with the real broken gears show the effectiveness of the proposed algorithm. It is expected that the real time fault detection is possible and it can improve the safety of eVGT system.

Incremental SVM for Online Product Review Spam Detection (온라인 제품 리뷰 스팸 판별을 위한 점증적 SVM)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.89-93
    • /
    • 2014
  • Reviews are very important for potential consumer' making choices. They are also used by manufacturers to find problems of their products and to collect competitors' business information. But someone write fake reviews to mislead readers to make wrong choices. Therefore detecting fake reviews is an important problem for the E-commerce sites. Support Vector Machines (SVMs) are very important text classification algorithms with excellent performance. In this paper, we propose a new incremental algorithm based on weight and the extension of Karush-Kuhn-Tucker(KKT) conditions and Convex Hull for online Review Spam Detection. Finally, we analyze its performance in theory.

  • PDF

Online Multi-Task Learning and Wearable Biosensor-based Detection of Multiple Seniors' Stress in Daily Interaction with the Urban Environment

  • Lee, Gaang;Jebelli, Houtan;Lee, SangHyun
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.387-396
    • /
    • 2020
  • Wearable biosensors have the potential to non-invasively and continuously monitor seniors' stress in their daily interaction with the urban environment, thereby enabling to address the stress and ultimately advance their outdoor mobility. However, current wearable biosensor-based stress detection methods have several drawbacks in field application due to their dependence on batch-learning algorithms. First, these methods train a single classifier, which might not account for multiple subjects' different physiological reactivity to stress. Second, they require a great deal of computational power to store and reuse all previous data for updating the signle classifier. To address this issue, we tested the feasibility of online multi-task learning (OMTL) algorithms to identify multiple seniors' stress from electrodermal activity (EDA) collected by a wristband-type biosensor in a daily trip setting. As a result, OMTL algorithms showed the higher test accuracy (75.7%, 76.2%, and 71.2%) than a batch-learning algorithm (64.8%). This finding demonstrates that the OMTL algorithms can strengthen the field applicability of the wearable biosensor-based stress detection, thereby contributing to better understanding the seniors' stress in the urban environment and ultimately advancing their mobility.

  • PDF

Cooperative Detection of Moving Source Signals in Sensor Networks (센서 네트워크 환경에서 움직이는 소스 신호의 협업 검출 기법)

  • Nguyen, Minh N.H.;Chuan, Pham;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.726-732
    • /
    • 2017
  • In practical distributed sensing and prediction applications over wireless sensor networks (WSN), environmental sensing activities are highly dynamic because of noisy sensory information from moving source signals. The recent distributed online convex optimization frameworks have been developed as promising approaches for solving approximately stochastic learning problems over network of sensors in a distributed manner. Negligence of mobility consequence in the original distributed saddle point algorithm (DSPA) could strongly affect the convergence rate and stability of learning results. In this paper, we propose an integrated sliding windows mechanism in order to stabilize predictions and achieve better convergence rates in cooperative detection of a moving source signal scenario.

A Study on the Detection of the Abnormal Tool State for Neural Network in Drilling (신경망에 의한 공구 이상상태 검출에 관한 연구)

  • Shin, Hyung-Gon;Kim, Tae-Young
    • Proceedings of the KSME Conference
    • /
    • 2001.11a
    • /
    • pp.821-826
    • /
    • 2001
  • Out of all metal-cutting processes, the hole-making process is the most widely used. It is estimated to be more than 30% of the total metal-cutting process. It is therefore desirable to monitor and detect drill wear during the hole-drilling process. One important aspect in controlling the drilling process is monitoring drill wear status. Accordingly, this paper deals with Basic system and Online system. Basic system comprised of spindle rotational speed, feed rates, thrust, torque and flank wear measured tool microscope. Online system comprised of spindle rotational speed, feed rates, AE signal, flank wear area measured computer vision. On-line monitoring system does not need to stop the process to inspect drill wear. Backpropagation neural networks (BPNs) were used for on-line detection of drill wear. This paper deals with an on-line drill wear monitoring system to fit the detection of the abnormal tool state.

  • PDF

A method for preventing online games hacking using memory monitoring

  • Lee, Chang Seon;Kim, Huy Kang;Won, Hey Rin;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.141-151
    • /
    • 2021
  • Several methods exist for detecting hacking programs operating within online games. However, a significant amount of computational power is required to detect the illegal access of a hacking program in game clients. In this study, we propose a novel detection method that analyzes the protected memory area and the hacking program's process in real time. Our proposed method is composed of a three-step process: the collection of information from each PC, separation of the collected information according to OS and version, and analysis of the separated memory information. As a result, we successfully detect malicious injected dynamic link libraries in the normal memory space.