• Title/Summary/Keyword: open set

Search Result 1,090, Processing Time 0.028 seconds

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Power Tracking Control of Domestic Induction Heating System using Pulse Density Modulation Scheme with the Fuzzy Logic Controller

  • Nagarajan, Booma;Sathi, Rama Reddy;Vishnuram, Pradeep
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.1978-1987
    • /
    • 2014
  • Power requirement to the induction heating system varies during the heating process. A closed loop control is required to have a smooth control over the power. In this work, a constant frequency pulse density modulation based power tracking control scheme for domestic induction heating system is developed using the Fuzzy Logic Controller. In the conventional power modulation schemes, the switching losses increase with the change in the load. The proposed pulse density modulation scheme maintains minimum switching losses for the entire load range. This scheme is implemented for the class-D series resonant inverter system. Fuzzy logic controller based power tracking control scheme is developed for domestic induction heating power supply for various power settings. The open loop and closed loop simulation studies are done using the MATLAB/Simulink simulation tool. The control logic is implemented in hardware using the PIC16F877A microcontroller. Fuzzy controller tracks the set power by changing the pulse density of the gate pulses applied to the inverter. The results obtained are used to know the effectiveness of the fuzzy logic controller to achieve the set power.

An Improved Sample Balanced Genetic Algorithm and Extreme Learning Machine for Accurate Alzheimer Disease Diagnosis

  • Sachnev, Vasily;Suresh, Sundaram
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.4
    • /
    • pp.118-127
    • /
    • 2016
  • An improved sample balanced genetic algorithm and Extreme Learning Machine (iSBGA-ELM) was designed for accurate diagnosis of Alzheimer disease (AD) and identification of biomarkers associated with AD in this paper. The proposed AD diagnosis approach uses a set of magnetic resonance imaging scans in Open Access Series of Imaging Studies (OASIS) public database to build an efficient AD classifier. The approach contains two steps: "voxels selection" based on an iSBGA and "AD classification" based on the ELM. In the first step, the proposed iSBGA searches for a robust subset of voxels with promising properties for further AD diagnosis. The robust subset of voxels chosen by iSBGA is then used to build an AD classifier based on the ELM. A robust subset of voxels keeps a high generalization performance of AD classification in various scenarios and highlights the importance of the chosen voxels for AD research. The AD classifier with maximum classification accuracy is created using an optimal subset of robust voxels. It represents the final AD diagnosis approach. Experiments with the proposed iSBGA-ELM using OASIS data set showed an average testing accuracy of 87%. Experiments clearly indicated the proposed iSBGA-ELM was efficient for AD diagnosis. It showed improvements over existing techniques.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

A GENERIC RESEARCH ON NONLINEAR NON-CONVOLUTION TYPE SINGULAR INTEGRAL OPERATORS

  • Uysal, Gumrah;Mishra, Vishnu Narayan;Guller, Ozge Ozalp;Ibikli, Ertan
    • Korean Journal of Mathematics
    • /
    • v.24 no.3
    • /
    • pp.545-565
    • /
    • 2016
  • In this paper, we present some general results on the pointwise convergence of the non-convolution type nonlinear singular integral operators in the following form: $$T_{\lambda}(f;x)={\large\int_{\Omega}}K_{\lambda}(t,x,f(t))dt,\;x{\in}{\Psi},\;{\lambda}{\in}{\Lambda}$$, where ${\Psi}$ = and ${\Omega}$ = stand for arbitrary closed, semi-closed or open bounded intervals in ${\mathbb{R}}$ or these set notations denote $\mathbb{R}$, and ${\Lambda}$ is a set of non-negative numbers, to the function $f{\in}L_{p,{\omega}}({\Omega})$, where $L_{p,{\omega}}({\Omega})$ denotes the space of all measurable functions f for which $\|{\frac{f}{\omega}}\|^p$ (1 ${\leq}$ p < ${\infty}$) is integrable on ${\Omega}$, and ${\omega}:{\mathbb{R}}{\rightarrow}\mathbb{R}^+$ is a weight function satisfying some conditions.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

The study on the Re - design of Banking Business using the Information Technology (정보처리기술을 이용한 은행업무의 재설계에 관한 연구)

  • Lee, Sun-Cheol;Cheon, Jeong-Rak
    • Asia pacific journal of information systems
    • /
    • v.6 no.1
    • /
    • pp.125-163
    • /
    • 1996
  • Since the bank managers were accustomed to be under the goverment policy and control so far, all what they had to do were just to follow the government policy and wait for customers. These usual practices resultedin neglection of concerns for innovation and competitive power. However, it currently happens the change of business environment such as the liberalization of interest rates and the open finance market policy. Thus, it is necessary for the bank managers to have a concern on that situation for the improvement of profitability through productivity and cost-down. The bank managers are trying to set out an innovation strategy to cope with this situation. An innovation strategy should be based on its own characteristics of banking business. The banking business is different from those of other business because it deals with intangible services rather than material goods and thus, the bank managers have to be more sensitive to the customers. There also exists an inefficiency of internal process due to too many repetition of 'check and balance'. Thus, We set out the five principles and six selected tasks in order to settle down an inefficiency and to redesign a bank operation process.

  • PDF

Bicriteria optimal design of open cross sections of cold-formed thin-walled beams

  • Ostwald, M.;Magnucki, K.;Rodak, M.
    • Steel and Composite Structures
    • /
    • v.7 no.1
    • /
    • pp.53-70
    • /
    • 2007
  • This paper presents a analysis of the problem of optimal design of the beams with two I-type cross section shapes. These types of beams are simply supported and subject to pure bending. The strength and stability conditions were formulated and analytically solved in the form of mathematical equations. Both global and selected types of local stability forms were taken into account. The optimization problem was defined as bicriteria. The cross section area of the beam is the first objective function, while the deflection of the beam is the second. The geometric parameters of cross section were selected as the design variables. The set of constraints includes global and local stability conditions, the strength condition, and technological and constructional requirements in the form of geometric relations. The optimization problem was formulated and solved with the help of the Pareto concept of optimality. During the numerical calculations a set of optimal compromise solutions was generated. The numerical procedures include discrete and continuous sets of the design variables. Results of numerical analysis are presented in the form of tables, cross section outlines and diagrams. Results are discussed at the end of the work. These results may be useful for designers in optimal designing of thin-walled beams, increasing information required in the decision-making procedure.

Proxy Re-encryption based Secure Electronic Transaction (프록시 재암호화 기반의 안전한 전자지불시스템)

  • Go, Woong;Kwak, Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.1
    • /
    • pp.73-85
    • /
    • 2012
  • Presently, Enhanced electronic financial service are offered used open network due to development of IT and financial transactions. The protocol in this environments such as SET, SSL/TLS, and so on are electronic transaction protocol to perform electronic payment securely and efficiently. However, most users still does not know accurately how to use and potential problems. It especially has key management problem about generate session key for purchase products or payment. To solve this problem, we propose proxy re-encryption based secure electronic transaction to transmit payment and order information without addition session key.

  • PDF

Dominance, Potential Optimality, and Strict Preference Information in Multiple Criteria Decision Making

  • Park, Kyung-Sam;Shin, Dong-Eun
    • Management Science and Financial Engineering
    • /
    • v.17 no.2
    • /
    • pp.63-84
    • /
    • 2011
  • The ordinary multiple criteria decision making (MCDM) approach requires two types of input, alternative values and criterion weights, and employs two schemes of alternative prioritization, dominance and potential optimality. This paper allows for incomplete information on both types of input and gives rise to the dominance relationships and potential optimality of alternatives. Unlike the earlier studies, we emphasize that incomplete information frequently takes the form of strict inequalities, such as strict orders and strict bounds, rather than weak inequalities. Then the issues of rising importance include: (1) The standard mathematical programming approach to prioritize alternatives cannot be used directly, because the feasible region for the permissible decision parameters becomes an open set. (2) We show that the earlier methods replacing the strict inequalities with weak ones, by employing a small positive number or zeroes, which closes the feasible set, may cause a serious problem and yield unacceptable prioritization results. Therefore, we address these important issues and develop a useful and simple method, without selecting any small value for the strict preference information. Given strict information on both types of decision parameters, we first construct a nonlinear program, transform it into a linear programming equivalent, and finally solve it via a two-stage method. An application is also demonstrated herein.