• Title/Summary/Keyword: Threat Detection

Search Result 377, Processing Time 0.02 seconds

Analysis of Interference Protection Criteria for Interoperability of Radar Systems (레이다 시스템 상호 간 운용을 위한 간섭 보호 기준 분석)

  • Kim, Jung;Jung, Jung-Soo;Kwag, Young-Kil;Kim, Jin-Goog;Jeon, Young-Chan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.4
    • /
    • pp.434-441
    • /
    • 2014
  • Recently, a mutual interference threat has been increasing among the radar systems due to the rapid growth of the military radar operation. In this paper, the radar interference protection criteria is presented for interoperability in terms of the radar coverage and target detection probability in association with the international recommendation on the interference spectrum by ITU-R. The required criteria for the minimum allowable interference is also presented in terms of INR. In order to ensure the maximum detection probability of the radar under the mutual interference situation, only 5 % of detection range loss is allowed for the case of INR of -6 dB, and required SNR is presented at each INR in terms of the detection range and detection probability. This result will be useful for establishing the interference protection criteria in the combined military radar systems.

Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information (플로우 분석을 이용한 분산 서비스 거부 공격 탐지 방법)

  • Jun, Jae-Hyun;Kim, Min-Jun;Cho, Jeong-Hyun;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.203-209
    • /
    • 2014
  • Today, Distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. It is very hard to prevent the DDoS attack. Therefore, an intrusion detection system on large network is need to efficient real-time detection. In this paper, we propose the detection mechanism using analysis of flow information against DDoS attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. The OPNET simulation results show that our ideas can provide enough services in DDoS attack.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

The Modified Fall Detection Algorithm based on YOLO-KCF for Elderly Living Alone Care (독거노인 케어를 위한 개선된 YOLO-KCF 기반 낙상감지 알고리즘)

  • Kang, Kyoung-Won;Park, Soo-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.2
    • /
    • pp.86-91
    • /
    • 2020
  • As the number of elderly people living alone increases, the frequency of fall accidents is also increasing. Falls are a threat to the health of older adults and can reduce their ability to remain independent. To solve this problem, we need real-time technology to recognize and respond to the critical condition of the elderly living alone. Therefore, this paper proposes a modified fall detection algorithm based on YOLO-KCF that can check one of the emergency situations in real time for the elderly living alone. YOLO can detect not only the detection of objects, but also the behavior of objects, namely stand and fall. Therefore, this paper can detect fall using the ratio of change of boundary box between stand and falling situation, and this algorithm can improve the shortcomings of KCF.

Combination of multiplex reverse transcription recombinase polymerase amplification assay and capillary electrophoresis provides high sensitive and high-throughput simultaneous detection of avian influenza virus subtypes

  • Tsai, Shou-Kuan;Chen, Chen-Chih;Lin, Han-Jia;Lin, Han-You;Chen, Ting-Tzu;Wang, Lih-Chiann
    • Journal of Veterinary Science
    • /
    • v.21 no.2
    • /
    • pp.24.1-24.11
    • /
    • 2020
  • The pandemic of avian influenza viruses (AIVs) in Asia has caused enormous economic loss in poultry industry and human health threat, especially clade 2.3.4.4 H5 and H7 subtypes in recent years. The endemic chicken H6 virus in Taiwan has also brought about human and dog infections. Since wild waterfowls is the major AIV reservoir, it is important to monitor the diversified subtypes in wildfowl flocks in early stage to prevent viral reassortment and transmission. To develop a more efficient and sensitive approach is a key issue in epidemic control. In this study, we integrate multiplex reverse transcription recombinase polymerase amplification (RT-RPA) and capillary electrophoresis (CE) for high-throughput detection and differentiation of AIVs in wild waterfowls in Taiwan. Four viral genes were detected simultaneously, including nucleoprotein (NP) gene of all AIVs, hemagglutinin (HA) gene of clade 2.3.4.4 H5, H6 and H7 subtypes. The detection limit of the developed detection system could achieve as low as one copy number for each of the four viral gene targets. Sixty wild waterfowl field samples were tested and all of the four gene signals were unambiguously identified within 6 h, including the initial sample processing and the final CE data analysis. The results indicated that multiplex RT-RPA combined with CE was an excellent alternative for instant simultaneous AIV detection and subtype differentiation. The high efficiency and sensitivity of the proposed method could greatly assist in wild bird monitoring and epidemic control of poultry.

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

Development of Recombinase Polymerase Amplification Combined with Lateral Flow Strips for Rapid Detection of Cowpea Mild Mottle Virus

  • Xinyang Wu;Shuting Chen;Zixin Zhang;Yihan Zhang;Pingmei Li;Xinyi Chen;Miaomiao Liu;Qian Lu;Zhongyi Li;Zhongyan Wei;Pei Xu
    • The Plant Pathology Journal
    • /
    • v.39 no.5
    • /
    • pp.486-493
    • /
    • 2023
  • Cowpea mild mottle virus (CPMMV) is a global plant virus that poses a threat to the production and quality of legume crops. Early and accurate diagnosis is essential for effective managing CPMMV outbreaks. With the advancement in isothermal recombinase polymerase amplification and lateral flow strips technologies, more rapid and sensitive methods have become available for detecting this pathogen. In this study, we have developed a reverse transcription recombinase polymerase amplification combined with lateral flow strips (RT-RPA-LFS) method for the detection of CPMMV, specifically targeting the CPMMV coat protein (CP) gene. The RT-RPA-LFS assay only requires 20 min at 40℃ and demonstrates high specificity. Its detection limit was 10 copies/µl, which is approximately up to 100 times more sensitive than RT-PCR on agarose gel electrophoresis. The developed RT-RPA-LFS method offers a rapid, convenient, and sensitive approach for field detection of CPMMV, which contribute to controlling the spread of the virus.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.

A Study on Candidate Lane Detection using Hybrid Detection Technique (하이브리드 검출기법을 이용한 후보 차선검출에 관한 연구)

  • Park, Sang-Joo;Oh, Joong-Duk;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.18-25
    • /
    • 2016
  • As more people have cars, the threat of traffic accidents is posed on men and women of all ages. The main culprit of traffic accidents is driving while intoxicated or drowsy. The method to recognize and prevent the cause of traffic accidents is to use lane detection. In this study, a total of 4,000 frames (day image: 2,900 frames, night image: 1,100 frames) were used to test lane detection. According to the test, in the case of day image, when the threshold of Sobel edge detection technique was detected with second-order differential equation, there was the highest candidate lane detection rate which was 86.1%. In the threshold of Canny edge detection technique, the highest detection rate of 88.0% was found at Low=50, and High=300. In the case of night image, the threshold of Sobel edge detection technique, when horizontal calculation and vertical calculation had second-order differential equation, and when horizontal-vertical calculation had 1.5th-order differential equation, there was the highest detection rate which was 83.1%. In the threshold of Canny edge detection technique, the highest detection rate of 89.9% was found at Low=50, and High=300.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.