• Title/Summary/Keyword: group detection

Search Result 1,677, Processing Time 0.035 seconds

Study on CAN Anomaly Detection and Handling Method for Vehicle Controllers (차량제어기용 CAN 통신 이상상태 판별 및 처리기술에 관한 연구)

  • Keum, Bok-Hee;Choi, You-Jun;Kim, Moon-Sik;Kim, Jin-Kyu
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1972-1974
    • /
    • 2011
  • 차량에 장착되는 전장품 사이의 정보 교환용 통신방식으로 주로 사용되는 CAN 통신 프로토콜의 이상상태를 분석하고 차량제어기에 적용해야할 CAN 이상상태 검출 및 처리 기능에 대해 연구하였다. 이 연구결과는 CAN 통신 문제의 탐지와 대응 방법을 제시하여 차량운행 시 시스템의 안정성을 높이는데 기여할 것으로 예상된다.

  • PDF

R-Peak Detection Algorithm in ECG Signal Based on Multi-Scaled Primitive Signal (다중 원시신호 기반 심전도 신호의 R-Peak 검출 알고리즘)

  • Cha, Won-Jun;Ryu, Gang-Soo;Lee, Jong-Hak;Cho, Woong-Ho;Jung, YouSoo;Park, Kil-Houm
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.818-825
    • /
    • 2016
  • The existing R-peak detection research suggests improving the distortion of the signal such as baseline variations in ECG signals by using preprocessing techniques such as a bandpass filtering. However, preprocessing can introduce another distortion, as it can generate a false detection in the R-wave detection. In this paper, we propose an R-peak detection algorithm in ECG signal, based on primitive signal in order to detect reliably an R-peak in baseline variation. First, the proposed algorithm decides the primitive signal to represent the QRS complex in ECG signal, and by scaling the time axis and voltage axis, extracts multiple primitive signals. Second, the algorithm detects the candidates of the R-peak using the value of the voltage. Third, the algorithm measures the similarity between multiple primitive signals and the R-peak candidates. Finally, the algorithm detects the R-peak using the mean and the standard deviation of similarity. Throughout the experiment, we confirmed that the algorithm detected reliably a QRS group similar to multiple primitive signals. Specifically, the algorithm can achieve an R-peak detection rate greater than an average rate of 99.9%, based on eight records of MIT-BIH ADB used in this experiment.

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

Application of Borehole Radar to Tunnel Detection (시추공 레이다 탐사에 의한 지하 터널 탐지 적용성 연구)

  • Cho, Seong-Jun;Kim, Jung-Ho;Kim, Chang-Ryol;Son, Jeong-Sul;Sung, Nak-Hun
    • Geophysics and Geophysical Exploration
    • /
    • v.9 no.4
    • /
    • pp.279-290
    • /
    • 2006
  • The borehole radar methods used to tunnel detection are mainly classified into borehole radar reflection, directional antenna, crosshole scanning, and radar tomography methods. In this study, we have investigated the feasibility and limitation of each method to tunnel detection through case studies. In the borehole radar reflection data, there were much more clear diffraction signals of the upper wings than lower wings of the hyperbolas reflected from the tunnel, and their upper and lower wings were spreaded out to more than 10m higher and lower traces from the peaks of the hyperbolas. As the ratio of borehole diameter to antenna length increases, the ringing gets stronger on the data due to the increase in the impedance mismatching between antennas and water in the boreholes. It is also found that the reflection signals from the tunnel could be enhanced using the optimal offset distance between transmitter and receiver antennas. Nevertheless, the borehole radar reflection data could not provide directional information of the reflectors in the subsurface. Direction finding antenna system had a advantage to take a three dimensional location of a tunnel with only one borehole survey even though the cost is still very high and it required very high expertise. The data from crosshole scanning could be a good indicator for tunnel detection and it could give more reliable result when the borehole radar reflection survey is carried out together. The images of the subsurface also can be reconstructed using travel time tomography which could provide the physical property of the medium and would be effective for imaging the underground structure such as tunnels. Based on the results described above, we suggest a cost-effective field procedure for detection of a tunnel using borehole radar techniques; borehole radar reflection survey using dipole antenna can firstly be applied to pick up anomalous regions within the borehole, and crosshole scanning or reflection survey using directional antenna can then be applied only to the anomalous regions to detect the tunnel.

Effect of Postnatal Angelicae Gigantis Radix Herb-acupuncture on Cell Proliferation in Offspring Rats with Prenatal Noise Stress during Pregnancy (당귀약침(當歸藥鍼)이 소음 Stress를 받은 새끼 쥐의 신경세포 생성에 미치는 영향)

  • Chang, So-Young;Kim, Ee-Hwa;Lee, Eun-Yong
    • Journal of Acupuncture Research
    • /
    • v.23 no.3
    • /
    • pp.47-56
    • /
    • 2006
  • Methods : 40 of Female rats were allowed to mate with 40 of male rats. Then, female rats were delivered of offspring rats, After birth 28 days, offspring rats were divided 8 groups, The normal group(Group A), the 10 mg/kg Angelicae gig antis radix~treated group(Group B), the 50 mg/kg Angelicae gigantis radix-treated group(Group C), the 100 mg/kg Angelicae gig antis radix-treated group(Group D), The control (noise-treated) group(Group E). the noise -10 mg/kg Angelicae gigantis radix-treated group(Group F), the noise-50 mg/kg Angelicae gigantis radix~treated group(Group G), and the noise-100 mg/kg Angelicae gigantis radix-treated group(Group H)(n = 5 in each group), From the 15th day of pregnancy, all rats were subcutaneously injected with 50 mg/kg BrdU once a day 30 min before the starting of experimental treatment. Rats of the prenatal noise-treated group were applied with 95 decibel supersonic machine sound for 1h once a day until delivery, After birth 28 days, offspring rats intraperitoneally injected with 50 mg/kg of BrdU and offspring rats were treated Angelicae gigantis radix Herb-acupunture on chungwan(CV12) for 7 consecutive days. For the detection of BrdU-positive cells and Ki-67 positive cells in hippocampus, immunohistochemistry was performed. Results : 1. The number of BrdU-positive cells in the dentate gyrus of noise-treated group was significantly decreased to normal group, and the Group F, G, H were significantly increased to control group. 2. The number of Ki-67 positive cells in the dentate gyrus of noise-treated group was significantly decreased to control group, and the Group G, H were significantly increased to control group. Conclusion : We concluded that postnatal Angelicae gigantis radix administration has effect on cell proliferation in offspring rats with prenatal noise stress during pregnancy.

  • PDF

Design of Multi-Level Abnormal Detection System Suitable for Time-Series Data (시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계)

  • Chae, Moon-Chang;Lim, Hyeok;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • As new information and communication technologies evolve, security threats are also becoming increasingly intelligent and advanced. In this paper, we analyze the time series data continuously entered through a series of periods from the network device or lightweight IoT (Internet of Things) devices by using the statistical technique and propose a system to detect abnormal behaviors of the device or abnormality based on the analysis results. The proposed system performs the first level abnormal detection by using previously entered data set, thereafter performs the second level anomaly detection according to the trust bound configured by using stored time series data based on time attribute or group attribute. Multi-level analysis is able to improve reliability and to reduce false positives as well through a variety of decision data set.

Identification of Nandrolone and its Metabolite 5α-Estran-3β, 17α-Diol in Horse Urine after Chemical Derivatization by Liquid Chromatography Tandem Mass Spectrometry

  • Dubey, Saurabh;Beotra, Alka
    • Mass Spectrometry Letters
    • /
    • v.8 no.4
    • /
    • pp.90-97
    • /
    • 2017
  • Androgenic anabolic steroids (AASs) are synthetic derivatives of testosterone with a common structure containing cyclopentanoperhydrophenanthrene nucleus. Their use enhances the muscle building capacity and is beneficial during performance. The AASs are one of the most abused group of substances in horse doping. Liquid chromatography tandem mass spectrometry ($LC/MS^n$) has been successfully applied to the detection of anabolic steroids in biological samples. However, the saturated hydroxysteroids viz: nandrolone, $5{\alpha}-estrane-3{\beta}$, $17{\alpha}-diol$ exhibit lower detection responses in electrospray ionisation (ESI) because of their poor ionisation efficiency. To overcome this limitation pre-column chemical derivatization has been introduced to enhance their detection responses in $LC-ESI-MS^n$ analysis. The aim of present study was to develop a sensitive method for identification and confirmation of nandrolone and its metabolite in horse urine incorporating pre-column derivatization using picolinic acid. The method consists of extraction of targeted steroid conjugates by solid phase extraction (SPE). The eluted steroid conjugates were hydrolysed by methanolysis and free steroids were recovered with liquid-liquid extraction. The resulting steroids were derivatized to form picolinoyl esters and identification was done using LC-ESI-MS/MS in positive ionization mode. The picolinated steroid adduct enhanced the detection levels in comparison to underivatized steroids.

A building roof detection method using snake model in high resolution satellite imagery

  • Ye Chul-Soo;Lee Sun-Gu;Kim Yongseung;Paik Hongyul
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.241-244
    • /
    • 2005
  • Many building detection methods mainly rely on line segments extracted from aerial or satellite imagery. Building detection methods based on line segments, however, are difficult to succeed in high resolution satellite imagery such as IKONOS imagery, for most buildings in IKONOS imagery have small size of roofs with low contrast between roof and background. In this paper, we propose an efficient method to extract line segments and group them at the same time. First, edge preserving filtering is applied to the imagery to remove the noise. Second, we segment the imagery by watershed method, which collects the pixels with similar intensities to obtain homogeneous region. The boundaries of homogeneous region are not completely coincident with roof boundaries due to low contrast in the vicinity of the roof boundaries. Finally, to resolve this problem, we set up snake model with segmented region boundaries as initial snake's positions. We used a greedy algorithm to fit a snake to roof boundary. Experimental results show our method can obtain more .correct roof boundary with small size and low contrast from IKONOS imagery. Snake algorithm, building roof detection, watershed segmentation, edge-preserving filtering

  • PDF

SPACE-BASED OCEAN SURVEILLANCE AND SUPPORT CAPABILITY

  • Yang Chan-Su
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.253-256
    • /
    • 2005
  • The use of satellite remote sensing in maritime safety and security can aid in the detection of illegal fishing activities and provide more efficient use of limited aircraft or patrol craft resources. In the area of vessel traffic monitoring for commercial vessels, Vessel Traffic Service (VTS) which use the ground-based radar system have some difficulties in detecting moving ships due to the limited detection range. A virtual vessel traffic control system is introduced to contribute to prevent a marine accident such as collision and stranding from happening. Existing VTS has its limit. The virtual vessel traffic control system consists of both data acquisition by satellite remote sensing and a simulation of traffic environment stress based on the satellite data, remotely sensed data. And it could be used to provide timely and detailed information about the marine safety, including the location, speed and direction of ships, and help us operate vessels safely and efficiently. If environmental stress values are simulated for the ship information derived from satellite data, proper actions can be taken to prevent accidents. Since optical sensor has a high spatial resolution, JERS satellite data are used to track ships and extract their information. We present an algorithm of automatic identification of ship size and velocity. This paper lastly introduce the field testing results of ship detection by RADARSAT SAR imagery, and propose a new approach for a Vessel Monitoring System(VMS), including VTS, and SAR combination service.

  • PDF