• 제목/요약/키워드: concept-based detection

검색결과 249건 처리시간 0.025초

의미기반 취약점 식별자 부여 기법을 사용한 취약점 점검 및 공격 탐지 규칙 통합 방법 연구 (A Study for Rule Integration in Vulnerability Assessment and Intrusion Detection using Meaning Based Vulnerability Identification Method)

  • 김형종;정태인
    • 정보보호학회논문지
    • /
    • 제18권3호
    • /
    • pp.121-129
    • /
    • 2008
  • 본 논문은 소프트웨어의 취약점을 표현하기 위한 방법으로 단위 취약점을 기반으로 한 의미기반 취약점 식별자 부여 방법을 제안하고 있다. 의미기반 취약점 식별자 부여를 위해 기존의 취약점 단위를 DEVS 모델링 방법론의 SES 이론에서 사용되는 분할 및 분류(Decomposition/Specialization) 절차를 적용하였다. 의미기반 취약점 식별자는 취약점 점검 규칙 및 공격 탐지 규칙과 연관 관계를 좀 더 낮은 레벨에서 맺을 수 있도록 해주고, 보안 관리자의 취약점에 대한 대응을 좀더 편리하고 신속하게 하는 데 활용될 수 있다. 특히, 본 논문에서는 Nessus와 Snort의 규칙들이 의미기반 취약점 식별자와 어떻게 맵핑되는 지를 제시하고, 보안 관리자 입장에서 어떻게 활용 될 수 있는 지를 3가지 관점에서 정리하였다. 본 논문의 기여점은 의미기반 취약점 식별자 개념 정의 및 이를 기반으로 한 취약점 표현과 활용 방법의 제안에 있다.

무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구 (A study on Public Key Authentication using Polynomial Secret Sharing in WSN)

  • 김일도;김동천
    • 한국정보통신학회논문지
    • /
    • 제13권11호
    • /
    • pp.2479-2487
    • /
    • 2009
  • 센서네트워크의 인증과 관련된 초기의 연구에서는 센서노드의 자원제약적인 특징을 고려하여 대칭키 기반의 인증 방식이 주로 제안되었으나, 최근에는 암호알고리즘의 성능이 개선되고 센서노드의 제조기술이 발달하여 Merkle 트리 방식 등 공개키 기반의 인증 방식도 제안되고 있다. 따라서 본 연구에서는 센서네트워크에 효과적으로 적용될 수 있는 새로운 개념의 다항식 비밀분산을 이용한 공개키 인증방식을 제안하며, hash 함수를 이용한 악의적 노드탐지 기법도 제안한다. 제안된 인증방식은 Shamir의 임계치 기법에 변형된 분산정보의 일종인 지수(exponential) 분산정보 개념을 적용하여 동시에 주변 노드들을 인증하면서 센서노드의 자원을 최소로 사용하고 네트워크의 확장성을 제공한다.

밀폐공간에서 액체연료 화염의 거동에 관한 실험적 연구 (An Experimental Study on the Behavior of Liquid Fuel Flames in the Confined Space)

  • 전길송;황지현;이태원
    • 한국안전학회지
    • /
    • 제36권2호
    • /
    • pp.87-93
    • /
    • 2021
  • Modern society shows rapid growth that is different from that of the development of existing technologies. The development of these technologies has led to the tendency of buildings to become dense, large and advancing. Regarding fire hazards, the possibility of large-scale fires causing fatal damage, due to the rapid spread of fire, increases. Therefore, for this reason, fire defense, i.e. detection and fire extinguishing facilities, in buildings are essential and well applied. But there are always limitations to that. Based on this reason, we would like to suggest the introduction of a new concept of a fire safety system. The method presented here is not only to use a single system for fire detection and fire extinguishing systems but to jointly use it in the environment and energy management fields within the building. However, an important step is required before introducing a system of these technologies. The fire extinguishing method proposed by this system is a method of extinguishing by blocking oxygen flowing into the space where the fire occurred. However, a sufficient basis is needed for this system to be applied in practice. Therefore, in this study, we intend to conduct a preliminary experiment to introduce the new concept of fire detection and extinguishing. The experiment used ethanol with a relatively simple combustion reaction and a high possibility of complete combustion. As a result, it was confirmed how the internal values changed during a fire using ethanol. Resultingly, we obtained the internal oxygen concentration and internal environmental changes according to the initial flame size. Lastly, the data accumulated in this study can be used as data for application in an automatic fire extinguishing system.

Non-invasive acceleration-based methodology for damage detection and assessment of water distribution system

  • Shinozuka, Masanobu;Chou, Pai H.;Kim, Sehwan;Kim, Hong Rok;Karmakar, Debasis;Fei, Lu
    • Smart Structures and Systems
    • /
    • 제6권5_6호
    • /
    • pp.545-559
    • /
    • 2010
  • This paper presents the results of a pilot study and verification of a concept of a novel methodology for damage detection and assessment of water distribution system. The unique feature of the proposed noninvasive methodology is the use of accelerometers installed on the pipe surface, instead of pressure sensors that are traditionally installed invasively. Experimental observations show that a sharp change in pressure is always accompanied by a sharp change of pipe surface acceleration at the corresponding locations along the pipe length. Therefore, water pressure-monitoring can be transformed into acceleration-monitoring of the pipe surface. The latter is a significantly more economical alternative due to the use of less expensive sensors such as MEMS (Micro-Electro-Mechanical Systems) or other acceleration sensors. In this scenario, monitoring is made for Maximum Pipe Acceleration Gradient (MPAG) rather than Maximum Water Head Gradient (MWHG). This paper presents the results of a small-scale laboratory experiment that serves as the proof of concept of the proposed technology. The ultimate goal of this study is to improve upon the existing SCADA (Supervisory Control And Data Acquisition) by integrating the proposed non-invasive monitoring techniques to ultimately develop the next generation SCADA system for water distribution systems.

Computer Vision-based Continuous Large-scale Site Monitoring System through Edge Computing and Small-Object Detection

  • Kim, Yeonjoo;Kim, Siyeon;Hwang, Sungjoo;Hong, Seok Hwan
    • 국제학술발표논문집
    • /
    • The 9th International Conference on Construction Engineering and Project Management
    • /
    • pp.1243-1244
    • /
    • 2022
  • In recent years, the growing interest in off-site construction has led to factories scaling up their manufacturing and production processes in the construction sector. Consequently, continuous large-scale site monitoring in low-variability environments, such as prefabricated components production plants (precast concrete production), has gained increasing importance. Although many studies on computer vision-based site monitoring have been conducted, challenges for deploying this technology for large-scale field applications still remain. One of the issues is collecting and transmitting vast amounts of video data. Continuous site monitoring systems are based on real-time video data collection and analysis, which requires excessive computational resources and network traffic. In addition, it is difficult to integrate various object information with different sizes and scales into a single scene. Various sizes and types of objects (e.g., workers, heavy equipment, and materials) exist in a plant production environment, and these objects should be detected simultaneously for effective site monitoring. However, with the existing object detection algorithms, it is difficult to simultaneously detect objects with significant differences in size because collecting and training massive amounts of object image data with various scales is necessary. This study thus developed a large-scale site monitoring system using edge computing and a small-object detection system to solve these problems. Edge computing is a distributed information technology architecture wherein the image or video data is processed near the originating source, not on a centralized server or cloud. By inferring information from the AI computing module equipped with CCTVs and communicating only the processed information with the server, it is possible to reduce excessive network traffic. Small-object detection is an innovative method to detect different-sized objects by cropping the raw image and setting the appropriate number of rows and columns for image splitting based on the target object size. This enables the detection of small objects from cropped and magnified images. The detected small objects can then be expressed in the original image. In the inference process, this study used the YOLO-v5 algorithm, known for its fast processing speed and widely used for real-time object detection. This method could effectively detect large and even small objects that were difficult to detect with the existing object detection algorithms. When the large-scale site monitoring system was tested, it performed well in detecting small objects, such as workers in a large-scale view of construction sites, which were inaccurately detected by the existing algorithms. Our next goal is to incorporate various safety monitoring and risk analysis algorithms into this system, such as collision risk estimation, based on the time-to-collision concept, enabling the optimization of safety routes by accumulating workers' paths and inferring the risky areas based on workers' trajectory patterns. Through such developments, this continuous large-scale site monitoring system can guide a construction plant's safety management system more effectively.

  • PDF

역전파 알고리즘 기반의 침입 패턴 분석 (An Analysis of Intrusion Pattern Based on Backpropagation Algorithm)

  • 우종우;김상영
    • 인터넷정보학회논문지
    • /
    • 제5권5호
    • /
    • pp.93-103
    • /
    • 2004
  • 침입 탐지시스템 (Intrusion Detection System: IDS)은 기존의 수동적인 탐지 기능에서 벗어나, 보다 다양한 형태와 방법론으로 연구되고 있다. 특히, 최근에는 대용량의 시스템 감사 데이터를 빠르게 처리하고 변형된 형태의 공격에 대비한 수 있는 내구력을 가진 형태의 방법론들이 요구되고 있으며, 이러한 조건을 만족하는 데이터마이닝이나 신경망을 이용한 침입 탐지 시스템에 대한 연구가 활발해 지고 있다. 본 논문에서는 우선. 최근의 다양한 형태의 침입경향들을 분석하고, 보다 효과적인 침입탐지를 위한 방안으로 신경망 기반의 역전파 알고리즘을 이용한 침입 탐지 시스템을 설계$.$구현 하였다. 본 연구의 시스템은 비정상행위 탐지(Anomoly Defection)와 오용탐지 (Misuse Detection)의 두 가지 방법론을 모두 수용하는 방법론을 사용하였으며, 신뢰성있는 KDD Cup ‘99의 데이터를 통한 침입패턴의 분석 및 실험을 수행 하였다. 또한 객체지향적인 네트워크 설계를 통하여 역전파 알고리즘 이외의 다른 알고리즘도 쉽게 적용이 가능하도록 하였다.

  • PDF

LSTM 및 정보이득 기반의 악성 안드로이드 앱 탐지연구 (A Study on Detection of Malicious Android Apps based on LSTM and Information Gain)

  • 안유림;홍승아;김지연;최은정
    • 한국멀티미디어학회논문지
    • /
    • 제23권5호
    • /
    • pp.641-649
    • /
    • 2020
  • As the usage of mobile devices extremely increases, malicious mobile apps(applications) that target mobile users are also increasing. It is challenging to detect these malicious apps using traditional malware detection techniques due to intelligence of today's attack mechanisms. Deep learning (DL) is an alternative technique of traditional signature and rule-based anomaly detection techniques and thus have actively been used in numerous recent studies on malware detection. In order to develop DL-based defense mechanisms against intelligent malicious apps, feeding recent datasets into DL models is important. In this paper, we develop a DL-based model for detecting intelligent malicious apps using KU-CISC 2018-Android, the most up-to-date dataset consisting of benign and malicious Android apps. This dataset has hardly been addressed in other studies so far. We extract OPcode sequences from the Android apps and preprocess the OPcode sequences using an N-gram model. We then feed the preprocessed data into LSTM and apply the concept of Information Gain to improve performance of detecting malicious apps. Furthermore, we evaluate our model with numerous scenarios in order to verify the model's design and performance.

센서 기반 침입 탐지 시스템의 설계와 구현 (Design and Implementation of Sensor based Intrusion Detection System)

  • 최종무;조성제
    • 정보처리학회논문지C
    • /
    • 제12C권6호
    • /
    • pp.865-874
    • /
    • 2005
  • 컴퓨터 시스템에 저장된 정보는 불법적인 접근, 악의적인 파괴 및 변경, 우연적인 불일치 등으로부터 보호되어야 한다. 본 논문에서는 이러한 공격을 탐지하고 방어할 수 있는 센서기반 침입탐지시스템을 제안한다. 제안된 시스템은 각 중요 디렉터리에 센서 파일을 각 중요 파일에 센서 데이터를 설치한다. 이들 센서 객체는 일종의 덫으로서, 센서 객체에 대한 접근은 침입이라고 간주된다. 이를 통해 불법적으로 정보를 복사하거나 빼내 가려는 가로채기 위협을 효과적으로 방어할 수 있다. 제안된 시스템은 리눅스 시스템 상에서 적재 가능한 커널 모듈(LKM: Loadable Kernel Module) 방식을 사용하여 구현되었다. 본 시스템은 폭 넓은 침입탐지를 위해 호스트 기반의 탐지 기법과 네트워크 기반의 탐지 기법을 서로 결합함으로써 잘 알려지지 않은 가로재기 공격도 탐지 가능하게 하였다.

An Implementation Scheme for the Detection System of RFID Defective Tags Using LabVIEW OOP

  • Jung, Deok-Gil;Jung, Min-Po;Cho, Hyuk-Gyu;Lho, Young-Uhg
    • Journal of information and communication convergence engineering
    • /
    • 제9권1호
    • /
    • pp.21-26
    • /
    • 2011
  • In this paper, we suggest the object-oriented methodology for the design and implementation scheme for the program development in the application of control and instrumentation such as the detection system of RFID defective tags which needs the embedded programming. We apply the design methodology of UML in the system design phase, and suggest the implementation scheme of LabVIEW programs using LVOOP(LabVIEW Object Oriented Programming)in which make it possible to write the object-oriented programming. We design the class diagram and the sequence diagram using UML, and write the classes of LVOOP from the designed class diagram and the main VI from the sequence diagram, respectively. We show that it is possible to develop the embedded programs such as the RFID application through the implementation example of the detection system of RFID defective tags in this paper. And, we obtain the advantages based on the object-oriented design and implementation using the LVOOP approach such as the development of LabVIEW programs by adding the classes and the concept of object of the object-oriented language to LabVIEW.

Integrated vibration control and health monitoring of building structures: a time-domain approach

  • Chen, B.;Xu, Y.L.;Zhao, X.
    • Smart Structures and Systems
    • /
    • 제6권7호
    • /
    • pp.811-833
    • /
    • 2010
  • Vibration control and health monitoring of building structures have been actively investigated in recent years but treated separately according to the primary objective pursued. This paper presents a general approach in the time domain for integrating vibration control and health monitoring of a building structure to accommodate various types of control devices and on-line damage detection. The concept of the time-domain approach for integrated vibration control and health monitoring is first introduced. A parameter identification scheme is then developed to identify structural stiffness parameters and update the structural analytical model. Based on the updated analytical model, vibration control of the building using semi-active friction dampers against earthquake excitation is carried out. By assuming that the building suffers certain damage after extreme event or long service and by using the previously identified original structural parameters, a damage detection scheme is finally proposed and used for damage detection. The feasibility of the proposed approach is demonstrated through detailed numerical examples and extensive parameter studies.