• Title/Summary/Keyword: adaptive security

Search Result 248, Processing Time 0.026 seconds

A Study on the control of lights for BEMS using Adaptive GMM (Adaptive GMM을 활용한 BEMS용 조명제어 연구)

  • Ko, Kwangseok;Lee, Juyoung;Kang, Yongsik;Shim, Dongha;Kim, Jaemoon;Kim, Eunsoo;Lee, Jongsung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.116-120
    • /
    • 2012
  • There has been increased interest for building energy-saving for worldwide. There is continuing research on IT technology for efficient management of BEMS. Recently, It be able to control of LED and to maximize energy savings to the development of LED lighting technology. We propose the security image processing system to improve efficiency and we implement the real-time status monitoring system to surveil the object in the building energy management system. In this paper, we proposed the system of LED control using IP camera and Adaptive Gaussian Mixture Model for BEMS. We implement LED light control software on the based of the security camera image processing so the reliable controling based on the security camera is possible efficiently.

IDS System Using Adaptive Resonance Theory2 (Adaptive Resonance Theory2를 이용한 침입탐지 시스템)

  • 박현철;노태우;서재수;박일곤;김진원;문종섭;한광택;최대식;고재영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.43-47
    • /
    • 2001
  • 본 논문은 신경망 이론중 하나인 Adaptive Resonance Theory(ART)을 사용하여 네트워크 상의 불법적인 침입을 탐지하는 기법에 대한 연구이다. ART는 비교사 학습을 하는 신경망으로써, 적응적인 학습능력이 있으며, 또 새로운 패턴에 대해서 새로운 클러스터를 생산하는 능력이 있다. ART의 이러한 특성을 이용하여, 여러 가지 침입패턴을 네트워크상에서 생산하여 학습을 시키고, 또 test 했으며, test 이후에도 on-line 상에서 새로운 공격 pattern도 찾아냄을 보였다. 따라서, 이미 알려진 침입뿐만 아니라 새롭게 발생하는 침입 기법에 대해서도 새로운 rule의 첨가 없이 적극적으로 대처할 수 있을 것으로 예측된다.

  • PDF

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

An Adaptive Security Model for Dynamic Node Behaviour in MANETs

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2861-2880
    • /
    • 2018
  • Mobile Ad hoc Networks (MANETs) have become a viable platform owing to their potential of providing communication without any pre-existing infrastructure and central administrating authority. Mutual support and co-operation among nodes are prerequisites for performing functions in such networks. The scarcity of resources makes it economical for nodes to conserve their resources and misbehave by avoiding participation in the network. Therefore, a mechanism is required to detect and handle such misbehaving nodes and promote co-operation in the network. Existing techniques for handling misbehaving nodes focus only on their current behaviour without considering the antecedent behaviour of nodes. In real world, a node may dynamically change its behaviour in accordance to its requirements. Hence, an efficient mechanism is required for providing security against such misbehaviour. This paper proposes an Adaptive Security Model which contemplates the present as well as anterior behaviour of nodes for providing security against dynamic node behaviour. The adaptivity of the model is nested in its ability to requite well-behaving nodes and penalize misbehaving ones in conformity with their overall behaviour. Simulation results indicate the efficiency of proposed scheme in securing the network from the menace of dynamic behaviour of nodes.

Omnidirectional Camera System Design for a Security Robot (경비용 로봇을 위한 전방향 카메라 장치 설계)

  • Kim, Kilsu;Do, Yongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

A Study on the Improvements of Security and Quality for Analog Speech Scrambler (아날로그 음성 비화기의 비도 및 음질 향상에 관한 연구)

  • 공병구;조동호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.9
    • /
    • pp.27-35
    • /
    • 1993
  • In this paper, a new algorithm for high level security and quality of speech is proposed. The algorithm is based on the rearrangement of the fast fourier transform (FFT) coefficients with pre and post filter process, hamming window and adaptive pseudo spectrum insertion. Then, the pre and post filters are used for the whitening of speech spectrum and the adaptive pseudo spectrum is inserted for the unclassification of silence/speech. Also, the hamming window technique is applied for the robustness to the syncronization error in the telephone line. According to the simulation results, it can be seen that the security of scrambled signal and the quality of descrambled signal have been improved fairly in both subjective and objective performance test and the new FFT scrambler is robust to the synchronization error.

  • PDF

Adaptive Rule Estimation (ARE) Algorithm against Eluding NIDS (적응적 규칙 추정에 의한 네트워크기반 침입탐지시스템 우회공격 방지 기법)

  • Choi, Byeongl-Cheol;Seo, Dong-Il;Sohn, Sung-Won
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.975-978
    • /
    • 2002
  • 본 연구는 네트워크 기반 침입탐지 시스템(NIDS)의 우회공격 방지를 위한 적응적 규칙 추정 알고리즘(ARE; Adaptive Rule Estimation)을 제안한다. 네트워크 기반 침입탐지 시스템에서 가장 많이 사용하는 침입탐지 방법은 규칙 기반의 패턴 매칭 기법이며, 이 방법은 삽입과 삭제에 의한 우회 공격에 많은 취약성을 가지고 있다. 본 연구에서는 이러한 삽입과 삭제에 의한 우회 공격을 방지 하고자 하는 취지에서 제안된 알고리즘이다. 적응적 규칙 추정에 의한 침입 탐지 알고리즘은 두 개의 과정으로 구성되며, 전처리 부분에서는 최적의 규칙을 선택하고, 주처리 부분에서 적응적으로 규칙 패턴의 변형된 위치를 찾아서 비교 판단하는 과정으로 이루어져 있다. 제안된 적응적 규칙 추정 알고리즘은 기존의 규칙 기반 패턴 매칭에서 우회공격이 가능한 것들이 탐지되며, 미탐지 확률을 줄일 수 있다.

  • PDF

An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic (통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

Scalable Hierarchical Identity-based Signature Scheme from Lattices

  • Noh, Geontae;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3261-3273
    • /
    • 2013
  • In the paper, we propose a novel adaptively secure hierarchical identity-based signature scheme from lattices. The size of signatures in our scheme is shortest among the existing hierarchical identity-based signature schemes from lattices. Our scheme is motivated by Gentry et al.'s signature scheme and Agrawal et al.'s hierarchical identity-based encryption scheme.

An Efficient Contact Angle Computation using MADD Edge Detection (적응성 방향 미분의 에지 검출에 의한 효율적인 접촉각 연산)

  • Yang, Myung-Sup;Lee, Jong-Gu;Kim, Eun-Mi;Pahk, Cherl-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.127-134
    • /
    • 2008
  • In this paper, we try to improve the accuracy of automatic measurement for analysis equipment by detecting efficiently the edge of a waterdrop with transparency. In order to detect the edge of a waterdrop with transparency, we use an edge detecting technique, MADD (Modified Adaptive Directional Derivative), which can identify the ramp edges with various widths as the perfectly sharp edges and respond effectively regardless of enlarging or reducing the image. The proposed edge detecting technique by means of perfect sharpening of ramp edges employs the modified adaptive directional derivatives instead of the usual local differential operators in order to detect the edges of image. The modified adaptive directional derivatives are defined by introducing the perfect sharpening map into the adaptive directional derivatives. Finally we apply the proposed method to contact angle arithmetic and show the effiency and validity of the proposed method.

  • PDF