• Title/Summary/Keyword: alert system

Search Result 361, Processing Time 0.024 seconds

Design of Web based ID Traffic Analysis System (웹기반의 침입탐지 트래픽 분석 시스템 설계)

  • 한순재;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.144-148
    • /
    • 2003
  • A general administrator's response ability plunged in confusion as intrusion detection system like an existing Snort display much alert messages on administrator's screen. Also, there are some possibilities to cause false positive. In this paper, to solve these problems, we designed Web-based ID(Intrusion Detection) traffic analysis system using correlation, and implemented so that administrator can check easily whole intrusion traffic state in web which dividing into normal and intrusion traffic using Libpcap, Snort, ACID, Nmap and Nessus. As a simulation result, it is proved that alert message number and false positive rate are minimized.

  • PDF

Design of LDWS Based on Performance-Based Approach Considering Driver Behaviors (운전자 반응을 고려한 성능기반 기법 적용 차선이탈경보시스템 경보 시점 설계 연구)

  • Kim, Hyung Jun;Yang, Ji Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.1081-1087
    • /
    • 2015
  • This article aims to provide a design method of warning thresholds for active safety systems based on the performance-based approach considering driver behaviors. Both positive and negative consequences of warnings are considered, and the main idea is to choose a warning threshold where the positive consequence is maximized, whereas the negative consequence is minimized. The process of the performance-based approach involves: Defining the operating scenarios; setting the trajectory models, including human characteristics; estimating the alert and nominal trajectories; estimating the performance metrics; generating a performance-metric plot; and determining the alert thresholds. This paper chose a lane-departure warning system as an example to show the usefulness of the performance-based approach. Both human and sensor characteristics were considered in the system design, and this paper provided a quantitative method to include human factors in designing active safety systems.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

A MDR Location Polling Algorithm for Location Based Alert Service (위치기반 경보서비스를 위한 MDR위치조회 알고리듬)

  • Ahn, Byung-Ik;Yang, Sung-Bong
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.3
    • /
    • pp.89-103
    • /
    • 2006
  • Location-Based Services(LBS) has been varied and expanded rapidly in local and overseas markets due to technology developments and expanded applications of wireless internet. Location Based Alert Service(LBA) capable of automatically furnishing data when entering or outing a specific location is expected to become one of the most important services in LBS. For LBA operation, it is essential to periodically get location information about moving object. However, this can cause a serious system load because system should continuously and largely receive location information of many moving objects. Existing and current methods for location polling of moving object are not suitable for an efficient location acquisition and a search structure required for LBA. In this study, to acquire large-scaled location information for LBA, a MDR moving object location polling algorithm will be suggested to reduce unnecessary location information and decrease system load by using mobility patterns of moving object.

  • PDF

Evaluation of Edge-Based Data Collection System through Time Series Data Optimization Techniques and Universal Benchmark Development (수집 데이터 기반 경량 이상 데이터 감지 알림 시스템 개발)

  • Woojin Cho;Jae-hoi Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.453-458
    • /
    • 2024
  • Due to global issues such as climate crisis and rising energy costs, there is an increasing focus on energy conservation and management. In the case of South Korea, approximately 53.5% of the total energy consumption comes from industrial complexes. In order to address this, we aimed to improve issues through the 'Shared Network Utility Plant' among companies using similar energy utilities to find energy-saving points. For effective energy conservation, various techniques are utilized, and stable data supply is crucial for the reliable operation of factories. Many anomaly detection and alert systems for checking the stability of data supply were dependent on Energy Management Systems (EMS), which had limitations. The construction of an EMS involves large-scale systems, making it difficult to implement in small factories with spatial and energy constraints. In this paper, we aim to overcome these challenges by constructing a data collection system and anomaly detection alert system on embedded devices that consume minimal space and power. We explore the possibilities of utilizing anomaly detection alert systems in typical institutions for data collection and study the construction process.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

Detection of Microbial Growth in an Automated Culture System (자동배양기를 이용한 미생물 검출)

  • Sung, Hye-Ran;Kim, Il-Hoi;Kim, Jee-Youn;Lee, Chong-Kil;Chung, Yeon-Bok;Han, Sang-Bae;Song, Suk-Gil
    • Korean Journal of Microbiology
    • /
    • v.44 no.2
    • /
    • pp.130-134
    • /
    • 2008
  • Modern automated culture systems have increased the isolation rate of microorganisms and shortened the time to detection, reducing experimental errors in diagnosis of infecting agents. BacT/ALERT 3D system is based on the colorimetric detection of $CO_2$ produced by the growing microorganisms. In order to evaluate the efficiency of the detection system, sterility test were performed using 6 bacteria. With standard aerobic and anaerobic bottles containing the liquid media, both three aerobic bacteria (P. aeruginosa, M. luteus, B. subtilis) and a facultative bacterium S. aureus were detected up to 1 CFU in 31.44 hr. In addition, growth of anaerobic C. sporogenes was recognized up to 1 CFU in 15.96 hr. The slowly growing bacteria P. acnes was detected up to 10,000 CFU in 129.36 hr. In comparison with conventional culture method, BacT/ALERT 3D automated culture system was more sensitive and saved detection time up to$2\sim10$ hr. Therefore, this automated culture system enables to efficiently detect bacteria in clinical samples and biological medicines.

Acceptability Analysis for a Radio-Based Emergency Alert System at Access Zones of Freeway Tunnels Using a Structural Equation Modeling (구조방정식을 활용한 터널 진입부 라디오 재난경보방송 수용성 분석)

  • Kang, Chanmo;Chung, Younshik;Kim, Jong-Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.6
    • /
    • pp.697-705
    • /
    • 2021
  • Currently, roadway operation agencies provide interior zones of tunnels with emergency information including crash, fire, and vehicles' stop, through state-of-the-art technologies such as variable message signs and radio-based broadcast systems. However, when coping with an emergency in tunnel interior zones, such information could be too late for drivers to access. A radio-based emergency alert system at the access zones of freeway tunnels, on the other hand,could be a good alternative for solving this problem. Therefore, the objective of this study is to assess user acceptability of such an alternative system. To carry out this study, an online survey was conducted on 762 drivers, and the survey results were analyzed using a structural equation modeling to identify factors affecting acceptability of the proposed system. As a result, driver characteristics such as age group, driving frequency, and driving career, utilization of conventional traffic information, and usefulness of conventional traffic information have a positive impact on acceptability. It is expected that the findings of the study will be a basis to effectively address and deploy a new emergency alert system at the access zones of freeway tunnels.