• 제목/요약/키워드: detection mechanisms

검색결과 328건 처리시간 0.027초

Detection and Diagnosis Solutions for Fault-Tolerant VSI

  • Cordeiro, Armando;Palma, Joao C.P.;Maia, Jose;Resende, Maia J.
    • Journal of Power Electronics
    • /
    • 제14권6호
    • /
    • pp.1272-1280
    • /
    • 2014
  • This paper presents solutions for fault detection and diagnosis of two-level, three phase voltage-source inverter (VSI) topologies with IGBT devices. The proposed solutions combine redundant standby VSI structures and contactors (or relays) to improve the fault-tolerant capabilities of power electronics in applications with safety requirements. The suitable combination of these elements gives the inverter the ability to maintain energy processing in the occurrence of several failure modes, including short-circuit in IGBT devices, thus extending its reliability and availability. A survey of previously developed fault-tolerant VSI structures and several aspects of failure modes, detection and isolation mechanisms within VSI is first discussed. Hardware solutions for the protection of power semiconductors with fault detection and diagnosis mechanisms are then proposed to provide conditions to isolate and replace damaged power devices (or branches) in real time. Experimental results from a prototype are included to validate the proposed solutions.

Cholesteric Liquid Crystals as Multi-Purpose Sensor Materials

  • Lisetski, L.N.
    • Journal of Radiation Protection and Research
    • /
    • 제30권1호
    • /
    • pp.27-30
    • /
    • 2005
  • New possibilities are discussed for cholesteric liquid crystals (CLC) as sensor materials for detection of ionizing radiation, biologically active UV radiation, and the presence of hazardous vapors in atmosphere. A distinguishing property of CLC-based detectors is their 'bioequivalence', i.e., mechanisms of their response to external factors essentially imitate the corresponding mechanisms of biological tissues. Such detectors can ensure sufficiently high sensitivity to make feasible their use as alarm indicators or in biophysical studies. Specific examples ate given of sensor compositions and their response characteristics.

A Secure Encryption-Based Malware Detection System

  • Lin, Zhaowen;Xiao, Fei;Sun, Yi;Ma, Yan;Xing, Cong-Cong;Huang, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1799-1818
    • /
    • 2018
  • Malware detections continue to be a challenging task as attackers may be aware of the rules used in malware detection mechanisms and constantly generate new breeds of malware to evade the current malware detection mechanisms. Consequently, novel and innovated malware detection techniques need to be investigated to deal with this circumstance. In this paper, we propose a new secure malware detection system in which API call fragments are used to recognize potential malware instances, and these API call fragments together with the homomorphic encryption technique are used to construct a privacy-preserving Naive Bayes classifier (PP-NBC). Experimental results demonstrate that the proposed PP-NBC can successfully classify instances of malware with a hit-rate as high as 94.93%.

블루투스를 이용한 실내 영역 결정 방법 (Indoor Zone Detection based on Bluetooth Low Energy)

  • 조르주 프리산초;이제민;김형신
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2015년도 제52차 하계학술대회논문집 23권2호
    • /
    • pp.279-281
    • /
    • 2015
  • Location awareness is an important capability for mobile-based indoor services. Those indoor services have motivated the implementation of methods that need high computational load cost and complex mechanisms for positioning prediction. These mechanisms, such as opportunistic sensing and machine learning, require more energy consumption to achieve accuracy. In this paper, we propose the Bluetooth Low Energy indoor zone detection (BLEIZOD) technique. This method exploits the concept of proximity zone to reduce the load cost and complexity. Our proposed method implements the received signal strength indicator (RSSI) function more effectively to gain accuracy and reduce energy consumption.

  • PDF

Chemiresistive Gas Sensors for Detection of Chemical Warfare Agent Simulants

  • Lee, Jun Ho;Lee, Hyun-Sook;Kim, Wonkyung;Lee, Wooyoung
    • 센서학회지
    • /
    • 제28권3호
    • /
    • pp.139-145
    • /
    • 2019
  • Precautionary detection of chemical warfare agents (CWAs) has been an important global issue mainly owing to their toxicity. To achieve proper detection, many studies have been conducted to develop sensitive gas sensors for CWAs. In particular, metal-oxide semi-conductors (MOS) have been investigated as promising sensing materials owing to their abundance in nature and excellent sensitivity. In this review, we mainly focus on various MOS-based gas sensors that have been fabricated for the detection of two specific CWA simulants, 2-chloroethyl ethyl sulfide (2-CEES) and dimethyl methyl phosphonate (DMMP), which are simulants of sulfur mustard and sarin, respectively. In the case of 2-CEES, we mainly discuss $CdSnO_3-$ and ZnO-based sensors and their reaction mechanisms. In addition, a method to improve the selectivity of ZnO-based sensors is mentioned. Various sensors and their sensing mechanisms have been introduced for the detection of DMMP. As the reaction with DMMP may directly affect the sensing properties of MOS, this paper includes previous studies on its poisoning effect. Finally, promising sensing materials for both gases are proposed.

실시간 임베디드 센서 네트워크 시스템에서 강건한 데이터, 이벤트 및 프라이버시 서비스 기술 (Robust Data, Event, and Privacy Services in Real-Time Embedded Sensor Network Systems)

  • 정강수;;손상혁;박석
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제37권6호
    • /
    • pp.324-332
    • /
    • 2010
  • 실시간 임베디드 센서 네트워크 시스템에서의 이벤트 감지는 대부분 현실세계에서 수집된 센서 데이터들의 조합에 기반한다. 이에 최근에 이루어진 연구들에선 센서 데이터들을 수집, 집계하는 낮은 수준의 다양한 메커니즘들을 제안하였다. 그러나 실시간에서 연속적으로 발생하는 복잡한 이벤트들의 감지와 다양한 종류의 센서들로부터 입력되는 실시간 데이터의 처리를 위한 시스템에 대한 솔루션은 보다 많은 연구를 필요로 한다. 즉, 경량의 데이터 혼합이 가능하고 많은 컴퓨팅 자원을 필요로 하지 않는 실시간 이벤트 감지 기법이 필요하다. 이벤트 감지 프레임워크는 실시간 모니터링과 센서 데이터의 도착으로 일어나는 데이터 융합 메커니즘을 통하여 적시성과 임베디드 센서 네트워크의 자원 요구량을 감소시킬 수 있는 잠재력을 지니고 있다. 또한 임베디드 센서 네트워크 시스템이 신뢰성을 지닐 수 있도록 하기 위한 기반 기술인 프라이버시를 보장할 수 있는 익명화 기술을 설명한다.

비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지 (Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events)

  • 김호동;허준범
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.1255-1261
    • /
    • 2020
  • 캐시 부채널 공격은 CPU의 공유 캐시 자원을 이용하여 시스템에서 민감한 정보를 획득해내는 공격 유형이다. 최근 모바일 시스템에서 클라우드까지 다양한 환경에 공격이 가해짐에 따라 많은 탐지 전략이 제안되었다. 기존의 캐시 부채널 공격들은 많은 수의 캐시 이벤트를 발생시키는 특징을 가지고 있었기 때문에 기존의 탐지 기법은 대부분 캐시 이벤트를 주의 깊게 모니터링하는 것에 기반하여 설계되었다. 그러나 최근에 제안된 공격은 공격 중에 캐시 이벤트를 적게 유발하는 경향이 있다. 예를 들어 PRIME+ABORT 공격은 캐시에 접근하여 액세스 시간을 측정하는 대신 Intel TSX를 활용한다. 이러한 특징으로 인해 캐시 이벤트 기반 탐지 기법은 해당 공격을 탐지하기 어렵다. 본 논문에서는 PRIME+ABORT 공격에 대한 심층 분석을 수행하여 캐시 이벤트 이외에 공격 탐지에 활용 가능한 유용한 하드웨어 이벤트를 밝힌다. 이를 기반으로, PRIME+ABORT 공격 탐지 기법인 PRIME+ABORT Detector를 제시하고, 실험을 통해 제안한 탐지 기법이 0.3%의 성능 오버헤드로 99.5%의 탐지 성공률을 달성할 수 있음을 보인다.

LSP Congestion Control methods in ATM based MPLS on BcN

  • Kim Chul soo;Park Na jung;Ahn Gwi im;Lee Jung tae
    • 한국통신학회논문지
    • /
    • 제30권4A호
    • /
    • pp.241-249
    • /
    • 2005
  • ATM based MPLS(Multiprotocol Label Switching) is discussed for its provisioning QOS commitment capabilities, Traffic engineering and smooth migration for BcN in Korea. At this time, due to the comprehensive nature of ATM protocol, ATM has been adapted as the backbone system for carrying Internet traffic[1,2,3,4]. This paper presents preventive congestion control mechanisms for detecting HTR(Hard-To-Reach) LSP(Label Switched Path) in ATM based MPLS systems. In particular, we have introduced a HTR LSP detection method using network signaling information in an ATM layer. MPLS related studies can cover LSP failures in a physical layer fault, it can not impact network congestion status. Here we will present the research results for introducing HTR LSP detection methods and control mechanisms and this mechanism can be implementing as SOC for high speed processing a packet header. We concluded that it showed faster congestion avoidance abilities with a more reduced system load and maximized the efficiency of network resources by restricting ineffective machine attempts.

TCP/IP 네트워크에서 ARED 알고리즘의 성능 개선 (Improve ARED Algorithm in TCP/IP Network)

  • 남재현
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.177-183
    • /
    • 2007
  • 인터넷에서 종단간 혼잡제어 방식을 지원하기 위해 제안된 라우터에서 큐에 적용되어 패킷을 폐기하는 방법으로 능동적 큐 관리(AQM;Active queue management) 방법이 적용되고 있다. IETF에서 제안된 AQM 알고리즘은 RED(Random Early Detection) 방식이다. RED 알고리즘은 망의 높은 처리율과 낮은 평균 지연을 얻기 위해 네트워크에서 운영된다. 하지만 평균 큐 길이는 네트워크의 혼잡 레벨에 민감한 결과를 갖게 된다. 본 논문에서는 RED 성능에 영향을 미치는 파라메터의 민감성을 감소시키고 성능을 개선시키기 위해 정련된 적응 RED(RARED; Refined Adaptive RED)를 제안한다. 시뮬레이션을 통해 네트워크 전체의 개선된 RARED 알고리즘을 관찰하고 RARED가 패킷 폐기율의 감소와 성공적인 전송률의 개선이 이루어짐을 보여준다.

  • PDF

Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks

  • 소원호;유경민;김영천
    • 한국통신학회논문지
    • /
    • 제33권7B호
    • /
    • pp.592-600
    • /
    • 2008
  • In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.