• Title/Summary/Keyword: Packet detection

Search Result 391, Processing Time 0.024 seconds

Network based Intrusion Detection System using Adaptive Resonance Theory 2 (Adaptive Resonance Theory 2를 이용한 네트워크 기반의 침입 탐지 모델 연구)

  • 김진원;노태우;문종섭;고재영;최대식;한광택
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.129-139
    • /
    • 2002
  • As internet expands, the possibility of attack through the network is increasing. So we need the technology which can detect the attack to the system or the network spontaneously. The purpose of this paper proposes the system to detect intrusion automatically using the Adaptive Resonance Theory2(ART2) which is one of artificial neural network The parameters of the system was tunned by ART2 algorithm using a lot of normal packets and various attack packets which were intentionally generated by attack tools. The results were compared and analyzed with conventional methods.

The Method of Wet Road Surface Condition Detection With Image Processing at Night (영상처리기반 야간 젖은 노면 판별을 위한 방법론)

  • KIM, Youngmin;BAIK, Namcheol
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.3
    • /
    • pp.284-293
    • /
    • 2015
  • The objective of this paper is to determine the conditions of road surface by utilizing the images collected from closed-circuit television (CCTV) cameras installed on roadside. First, a technique was examined to detect wet surfaces at nighttime. From the literature reviews, it was revealed that image processing using polarization is one of the preferred options. However, it is hard to use the polarization characteristics of road surface images at nighttime because of irregular or no light situations. In this study, we proposes a new discriminant for detecting wet and dry road surfaces using CCTV image data at night. To detect the road surface conditions with night vision, we applied the wavelet packet transform for analyzing road surface textures. Additionally, to apply the luminance feature of night CCTV images, we set the intensity histogram based on HSI(Hue Saturation Intensity) color model. With a set of 200 images taken from the field, we constructed a detection criteria hyperplane with SVM (Support Vector Machine). We conducted field tests to verify the detection ability of the wet road surfaces and obtained reliable results. The outcome of this study is also expected to be used for monitoring road surfaces to improve safety.

A New Error Concealment Based on Edge Detection (에지검출을 기반으로 한 새로운 에러 은닉 기법)

  • Yang, Yo-Jin;Son, Nam-Rye;Lee, Guee-Sang
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.623-629
    • /
    • 2002
  • In transmitting compressed video bit-stream over Internet, packet losses cause error propagations in both spatial and temporal domains, which in turn leads to severe degradation I image quality. In this paper, a new error concealment algorithm, called EBMA(Edge Detection based Boundary Matching Algorithm), is proposed to repair damaged portions of the video frames in the receiver. Conventional BMA(Boundary Matching Algorithm) assumes that the pixels on the boundary of the missing block and its neighboring blocks are very similar, but has no consideration of edges across the boundary. In our approach, the edges are detected across the boundary of the lost or erroneous block. Once the orientation of each edge is found, only the pixel difference along the expected edges across the boundary is measured instead of the calculation of difference along the expected edges across the boundary is measured instead of the calculation of differences between all adjacent pixels on the boundary Therefore, the proposed approach needs very few computations and the experiment shows and improvement of the performance over the conventional BMA in terms of both subjective and objective quality of video sequences.

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.

An Efficient Symbol Timing Synchronization Scheme for IEEE 802.11n MIMO-OFDM based WLAN Systems (IEEE 802.11n MIMO-OFDM 기반 무선 LAN 시스템을 위한 효율적인 심볼 동기 방법)

  • Cho, Mi-Suk;Jung, Yun-Ho;Kim, Jae-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.95-103
    • /
    • 2009
  • An efficient symbol time synchronization scheme for IEEE 802.11n MIMO-OFDM based WLAN systems using cyclic shift diversity (CSD) preamble is proposed. CSD is used to prevent unintentional beamforming when the same preamble signal is transmitted through transmit antennas. However, it is difficult to find a proper starting-point of the OFDM symbol with the conventional algorithms because of time offset by multi-peaks which are result from cross-correlation of received CSD preamble with a known short training symbol. In addition, the performance of symbol time sync. is affected by AGC and packet detection position. In this paper, an optimal symbol time synch. algorithm which is composed of the boundary detection scheme between LTS and OFDM symbols, the verification scheme for enhancement of boundary detection accuracy, and the SNR-varying threshold estimation scheme is proposed. Simulation result show that the proposed algorithm has performance gains of 4.3dB in SNR compared to the conventional algorithms at the rate of 1% sync. failure probability for $2{\times}2$ MIMO-OFDM system and 18dB at 0.1% when maximum frequency offset exists. It also can be applied to $4{\times}4$ MIMO-OFDM system without any modification. Hence, it is very suitable for MIMO-OFDM WLAN systems using CSD preamble.

Clinical Characteristics of Haenyeo with Depressive Disorders (해녀 우울장애 환자의 임상적 특징)

  • Park, Joon Hyuk;Jun, Byoung Sun;Lee, Chang In;Kim, Moon-Doo;Jeong, Ji Woon;Jung, Young-Eun
    • Korean Journal of Biological Psychiatry
    • /
    • v.23 no.2
    • /
    • pp.63-68
    • /
    • 2016
  • Objectives Haenyeo are Korean professional women breath-hold divers in Jeju island. The aim of this study was to investigate the clinical characteristics of depressed Haenyeo group, compared to non-Haenyeo depressed group. Methods This study included 75 Haenyeo and 340 non-Haenyeo with depressive disorders recruited from the Dementia Early Detection Program in Jeju island. Structural diagnostic interviews were performed using the Korean version of Mini International Neuropsychiatric Interview. All patients completed the questionnaires, including the Subjective Memory Complaints Questionnaire (SMCQ), the Patient Health Questionnaire-15 (PHQ-15), and the Blessed dementia scale. Depression was evaluated by the Korean version of short form the Geriatric Depression Scale (K-SGDS) and cognition was assessed by the Korean version of the Consortium to Establish a Registry for Alzheimer's Disease (CERAD) assessment packet. Results Although the mean scores of the K-SGDS were similar between Haenyeo and non-Haenyeo depressed groups, the Haenyeo group showed a higher mean score on the PSQ-15 (p < 0.001, ANCOVA adjusting for age, the K-SGDS and education). The Haenyeo group showed poorer performance on the Korean Version of Frontal Assessment Batter (p < 0.001), the Mini-Mental State Examination in the Korean version of the CERAD Assessment Packet (p < 0.018), the word fluency test (p < 0.001), and the word list memory test (p = 0.012) in ANCOVA adjusting for age and education. The mean SMCQ score was higher in the Haenyeo depressed group than in the non-Haenyeo depressed group. Conclusions The Haenyeo depressed group shows cognitive dysfunction, especially frontal lobe dysfunction, compared to the non-Haenyeo depressed group, indicating the Haenyeo depressed group may have more severe frontolimbic dysfunction due to chronic exposure to hypoxia. The Haenyeo depressed group suffers more somatic symptoms than the non-Haenyeo depressed group.

System of gas sensor for conbinating wire and wireless using Internet of Things (IOT기술을 이용한 유무선 통합 가스검출 시스템 구현)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.297-304
    • /
    • 2015
  • This study concerns the integrated gas sensor system of wire and wireless communication by using IoT(Internet of Things) technology. First, communication part is that it delivers the detection information, which transferred by wire or wireless communication and required control procedure based on a wireless module that receives the gas leakage information from wired or wireless detector, to administrator or user's terminal. Second, receiver part is that it shows the location and information, which received from the wired detector formed by a detecting sensor's node as linking with the communication part, and transfers these to the communication part. Third, wireless detector formed as a communication module of a detecting sensor node is that it detects gas leakage and transfers the information through wireless as a packet.Fourth, wired detector communicated with the receiver part and formed as a communication module of a detecting sensor node is that it detects gas leakage, transfers and shows the information as a packet. Fifth, administrator's terminal is that it receives gas leakage information by the communication part, transfers the signal by remote-control, and shut off a gas valve as responding the information. Sixth, database is that it is connected with the communication part; it sets and stores the default values for detecting smoke, CO., and temperature; it transfers this information to the communication part or sends a gas detecting signal to user's terminal. Seventh, user's terminal is that it receives each location's default value which stored and set at the database; it manages emergency situation as shutting off a gas valve through remote control by corresponding each location's gas leakage information, which transferred from the detector to the communication part by wireless.It is possible to process a high quality data regarding flammable or toxic gas by transferring the data, which measured by a sensor module of detector, to the communication part through wire and wireless. And, it allows a user to find the location by a smart phone where gas leaks. Eventually, it minimizes human life or property loss by having stability on gas leakage as well as corresponding each location's information quickly.

A Scheme of Distributed Network Security Management against DDoS Attacks (DDoS 공격에 대응하는 분산 네트워크 보안관리 기법)

  • Kim Sung-Ki;Yoo Seung-Hwan;Kim Moon-Chan;Min Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.72-83
    • /
    • 2006
  • It is not a practical solution that the DDoS attacks or worm propagations are protected and responded within a domain itself because it clogs access of legitimate users to share communication lines beyond the boundary a domain. Especially, the DDoS attacks with spoofed source address or with bogus packets that the destination addresses are changed randomly but has the valid source address does not allow us to identify access of legitimate users. We propose a scheme of distributed network security management to protect access of legitimate users from the DDoS attacks exploiting randomly spoofed source IP addresses and sending the bogus packets. We assume that Internet is divided into multiple domains and there exists one or more domain security manager in each domain, which is responsible for identifying hosts within the domain. The domain security manager forwards information regarding identified suspicious attack flows to neighboring managers and then verifies the attack upon receiving return messages from the neighboring managers. Through the experiment on a test-bed, the proposed scheme was verified to be able to maintain high detection accuracy and to enhance the. normal packet survival rate.

An Algorithm to Detect P2P Heavy Traffic based on Flow Transport Characteristics (플로우 전달 특성 기반의 P2P 헤비 트래픽 검출 알고리즘)

  • Choi, Byeong-Geol;Lee, Si-Young;Seo, Yeong-Il;Yu, Zhibin;Jun, Jae-Hyun;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.317-326
    • /
    • 2010
  • Nowadays, transmission bandwidth for network traffic is increasing and the type is varied such as peer-to-peer (PZP), real-time video, and so on, because distributed computing environment is spread and various network-based applications are developed. However, as PZP traffic occupies much volume among Internet backbone traffics, transmission bandwidth and quality of service(QoS) of other network applications such as web, ftp, and real-time video cannot be guaranteed. In previous research, the port-based technique which checks well-known port number and the Deep Packet Inspection(DPI) technique which checks the payload of packets were suggested for solving the problem of the P2P traffics, however there were difficulties to apply those methods to detection of P2P traffics because P2P applications are not used well-known port number and payload of packets may be encrypted. A proposed algorithm for identifying P2P heavy traffics based on flow transport parameters and behavioral characteristics can solve the problem of the port-based technique and the DPI technique. The focus of this paper is to identify P2P heavy traffic flows rather than all P2P traffics. P2P traffics are consist of two steps i)searching the opposite peer which have some contents ii) downloading the contents from one or more peers. We define P2P flow patterns on these P2P applications' features and then implement the system to classify P2P heavy traffics.

Digital Twin-Based Communication Optimization Method for Mission Validation of Swarm Robot (군집 로봇의 임무 검증 지원을 위한 디지털 트윈 기반 통신 최적화 기법)

  • Gwanhyeok, Kim;Hanjin, Kim;Junhyung, Kwon;Beomsu, Ha;Seok Haeng, Huh;Jee Hoon, Koo;Ho Jung, Sohn;Won-Tae, Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Robots are expected to expand their scope of application to the military field and take on important missions such as surveillance and enemy detection in the coming future warfare. Swarm robots can perform tasks that are difficult or time-consuming for a single robot to be performed more efficiently due to the advantage of having multiple robots. Swarm robots require mutual recognition and collaboration. So they send and receive vast amounts of data, making it increasingly difficult to verify SW. Hardware-in-the-loop simulation used to increase the reliability of mission verification enables SW verification of complex swarm robots, but the amount of verification data exchanged between the HILS device and the simulator increases exponentially according to the number of systems to be verified. So communication overload may occur. In this paper, we propose a digital twin-based communication optimization technique to solve the communication overload problem that occurs in mission verification of swarm robots. Under the proposed Digital Twin based Multi HILS Framework, Network DT can efficiently allocate network resources to each robot according to the mission scenario through the Network Controller algorithm, and can satisfy all sensor generation rates required by individual robots participating in the group. In addition, as a result of an experiment on packet loss rate, it was possible to reduce the packet loss rate from 15.7% to 0.2%.