• Title/Summary/Keyword: Real-Time Anomalies Detection

Search Result 42, Processing Time 0.027 seconds

Replacement Condition Detection of Railway Point Machines Using Data Cube and SVM (데이터 큐브 모델과 SVM을 이용한 철도 선로전환기의 교체시기 탐지)

  • Choi, Yongju;Oh, Jeeyoung;Park, Daihee;Chung, Yongwha;Kim, Hee-Young
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.33-41
    • /
    • 2017
  • Railway point machines act as actuators that provide different routes to trains by driving switchblades from the current position to the opposite one. Since point failure caused by the aging effect can significantly affect railway operations with potentially disastrous consequences, replacement detection of point machine at an appropriate time is critical. In this paper, we propose a replacement condition detection method of point machine in railway condition monitoring systems using electrical current signals, after analyzing and relabeling domestic in-field replacement data by means of OLAP(On-Line Analytical Processing) operations in the multidimensional data cube into "does-not-need-to-be replaced" and "needs-to-be-replaced" data. The system enables extracting suitable feature vectors from the incoming electrical current signals by DWT(Discrete Wavelet Transform) with reduced feature dimensions using PCA(Principal Components Analysis), and employs SVM(Support Vector Machine) for the real-time replacement detection of point machine. Experimental results with in-field replacement data including points anomalies show that the system could detect the replacement conditions of railway point machines with accuracy exceeding 98%.

KOMPSAT-2 Fault and Recovery Management

  • Baek, Myung-Jin;Lee, Na-Young;Keum, Jung-Hoon
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.3 no.2
    • /
    • pp.31-39
    • /
    • 2002
  • In this paper, KOMPSAT-2 on-board fault and ground recovery management design is addressesed in terms of hardware and software components which provide failure detection and spacecraft safing for anomalies which threaten spacecraft survival. It also includes ground real time up-commanding operation to recover the system safely. KOMPSAT-2 spacecraft fault and recovery management is designed such that the subsequent system configuration due to system initialization is initiated and controlled by processors. This paper will show that KOMPSAT-2 has a new design feature of CPU SEU mitigation for the possible upsets in the processor CPUs as a part of on-board fault management design. Recovery management of processor switching has two different ways: gang switching and individual switching. This paper will show that the difficulties of using multiple-processor system can be managed by proper design implementation and flight operation.

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.

Multi-advanced Sensor-based Building Disaster Prevention Detection System (다중첨단센서기반 건축물 재난방지 감지 시스템)

  • Lim, Jaedon;Kim, Jungjip;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.567-568
    • /
    • 2018
  • In recent years, there have been frequent occurrences of collapsing buildings and tilting accidents due to frequent earthquakes and aging of buildings. Various methods have been proposed to prevent disasters on these buildings. In this paper, we propose a system algorithm that provides an indication of anomalous phenomena such as collapse and tilting of buildings by real - time monitoring of IoT (Internet of Things) - based architectural anomalies. The multi-advanced sensor is based on the Inclinometer sensor and the Accelerometer sensor, transmits the detected data to the server in real time, accumulates the data, and provides the service to cope when the set threshold value is different. It is possible to evacuate and repair the collapse and tilting of the building by warning the occurrence of the upper threshold event event such as the collapse and tilting of the building.

  • PDF

A case study of red tide detection around Korean waters using satellite remote sensing

  • Suh, Y.S.;Lee, N.K.;Jang, L.H.;Kim, H.G.;Hwang, J.D.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.654-655
    • /
    • 2003
  • Korea has experienced 10 a Cochlodinium polykrikoides red tide outbreaks during the last 10 years (1993-2002). The monitoring activities at National Fisheries Research and Development Institute (NFRDI) in Korea have been extended to all the coastal waters after the worst of fish killing by C. polykrikoides blooms in 1995. NFRDI is looking forward to finding out the feasibility of red tide detection around Korean waters using satellite remote sensing of NOAA/AVHRR, Orbview-2/SeaWiFS, IRS-P4/OCM and Terra/MODIS on real time base. In this study, we used several alternative methods including climatological analysis, spectral and optical methods which may offer a potential detection of the major species of red tide in Korean waters. The relationship between the distribution of SST and C. polykrikoides bloom areas was studied. In climatological analysis, NOAA, SeaWiFS, OCM satellite data in 20th and 26th August 2001 were chosen using the known C. polykrikoides red tide bloom area mapped by helicopter reconnaissance and ground observation. The 26th August, 2001 SeaWiFS chlorophyll a anomaly imageries against the imageries of non-occurring red tide for August 20, 2001 showed the areas C. polykrikoides occurred. The anomalies of chlorophyll a concentration from satellite data between before and after red tide outbreaks showed the similar distribution of C. polykrikoides red tide in 26th August, 2001. The distribution of the difference in SST between daytime and nighttime also showed the possibility of red tide detection. We used corrected vegetation index (CVI) to detect floating vegetation and submerged vegetation containing algal blooms. The simple result of optical absorption from C. polykrikoides showed that if we use the optical characteristics of each red tide we will be able to get the feasibility of the red tide detection.

  • PDF

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

Individual Pig Detection Using Kinect Depth Information and Convolutional Neural Network (키넥트 깊이 정보와 컨볼루션 신경망을 이용한 개별 돼지의 탐지)

  • Lee, Junhee;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.2
    • /
    • pp.1-10
    • /
    • 2018
  • Aggression among pigs adversely affects economic returns and animal welfare in intensive pigsties. Recently, some studies have applied information technology to a livestock management system to minimize the damage resulting from such anomalies. Nonetheless, detecting each pig in a crowed pigsty is still challenging problem. In this paper, we propose a new Kinect camera and deep learning-based monitoring system for the detection of the individual pigs. The proposed system is characterized as follows. 1) The background subtraction method and depth-threshold are used to detect only standing-pigs in the Kinect-depth image. 2) The standing-pigs are detected by using YOLO (You Only Look Once) which is the fastest and most accurate model in deep learning algorithms. Our experimental results show that this method is effective for detecting individual pigs in real time in terms of both cost-effectiveness (using a low-cost Kinect depth sensor) and accuracy (average 99.40% detection accuracies).

An Anomalous Host Detection Technique using Traffic Dispersion Graphs (트래픽 분산 그래프를 이용한 이상 호스트 탐지 기법)

  • Kim, Jung-Hyun;Won, You-Jip;Ahn, Soo-Han
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.69-79
    • /
    • 2009
  • Today's Internet is one of the necessaries of our life. Anomalies of the Internet provoke social problems. For that reason, Internet Measurement which studies characteristics on Internet traffic attracts pubic attention. Recently, Traffic Dispersion Graph (TDG), a novel traffic analysis method, was proposed. The TDG is not a statistical analysis method but a graphical visualization method on interactions among network components. In this paper, we propose a new anomaly detection paradigm and its technique using TDG. The existing studies have focused on detecting anomalous packets of flows. On the other hand, we focus on detecting the sources of anomalous traffic. To realize our paradigm, we designed the TDG Clustering method. Through this method, we could classify anomalous hosts infected by various worm viruses. We obtained normal traffic through dropping traffic of the anomalous hosts. Especially, we expect that the TDG clustering method can be applied to real-time anomaly detection because calculations of the method are fast.

Anomaly Data Detection Using Machine Learning in Crowdsensing System (크라우드센싱 시스템에서 머신러닝을 이용한 이상데이터 탐지)

  • Kim, Mihui;Lee, Gihun
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.475-485
    • /
    • 2020
  • Recently, a crowdsensing system that provides a new sensing service with real-time sensing data provided from a user's device including a sensor without installing a separate sensor has attracted attention. In the crowdsensing system, meaningless data may be provided due to a user's operation error or communication problem, or false data may be provided to obtain compensation. Therefore, the detection and removal of the abnormal data determines the quality of the crowdsensing service. The proposed methods in the past to detect these anomalies are not efficient for the fast-changing environment of crowdsensing. This paper proposes an anomaly data detection method by extracting the characteristics of continuously and rapidly changing sensing data environment by using machine learning technology and modeling it with an appropriate algorithm. We show the performance and feasibility of the proposed system using deep learning binary classification model of supervised learning and autoencoder model of unsupervised learning.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.