• 제목/요약/키워드: open set

검색결과 1,090건 처리시간 0.023초

TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델 (A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol)

  • 이세열;김용수
    • 한국지능시스템학회논문지
    • /
    • 제13권4호
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Power Tracking Control of Domestic Induction Heating System using Pulse Density Modulation Scheme with the Fuzzy Logic Controller

  • Nagarajan, Booma;Sathi, Rama Reddy;Vishnuram, Pradeep
    • Journal of Electrical Engineering and Technology
    • /
    • 제9권6호
    • /
    • pp.1978-1987
    • /
    • 2014
  • Power requirement to the induction heating system varies during the heating process. A closed loop control is required to have a smooth control over the power. In this work, a constant frequency pulse density modulation based power tracking control scheme for domestic induction heating system is developed using the Fuzzy Logic Controller. In the conventional power modulation schemes, the switching losses increase with the change in the load. The proposed pulse density modulation scheme maintains minimum switching losses for the entire load range. This scheme is implemented for the class-D series resonant inverter system. Fuzzy logic controller based power tracking control scheme is developed for domestic induction heating power supply for various power settings. The open loop and closed loop simulation studies are done using the MATLAB/Simulink simulation tool. The control logic is implemented in hardware using the PIC16F877A microcontroller. Fuzzy controller tracks the set power by changing the pulse density of the gate pulses applied to the inverter. The results obtained are used to know the effectiveness of the fuzzy logic controller to achieve the set power.

An Improved Sample Balanced Genetic Algorithm and Extreme Learning Machine for Accurate Alzheimer Disease Diagnosis

  • Sachnev, Vasily;Suresh, Sundaram
    • Journal of Computing Science and Engineering
    • /
    • 제10권4호
    • /
    • pp.118-127
    • /
    • 2016
  • An improved sample balanced genetic algorithm and Extreme Learning Machine (iSBGA-ELM) was designed for accurate diagnosis of Alzheimer disease (AD) and identification of biomarkers associated with AD in this paper. The proposed AD diagnosis approach uses a set of magnetic resonance imaging scans in Open Access Series of Imaging Studies (OASIS) public database to build an efficient AD classifier. The approach contains two steps: "voxels selection" based on an iSBGA and "AD classification" based on the ELM. In the first step, the proposed iSBGA searches for a robust subset of voxels with promising properties for further AD diagnosis. The robust subset of voxels chosen by iSBGA is then used to build an AD classifier based on the ELM. A robust subset of voxels keeps a high generalization performance of AD classification in various scenarios and highlights the importance of the chosen voxels for AD research. The AD classifier with maximum classification accuracy is created using an optimal subset of robust voxels. It represents the final AD diagnosis approach. Experiments with the proposed iSBGA-ELM using OASIS data set showed an average testing accuracy of 87%. Experiments clearly indicated the proposed iSBGA-ELM was efficient for AD diagnosis. It showed improvements over existing techniques.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • 제7권1호
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

A GENERIC RESEARCH ON NONLINEAR NON-CONVOLUTION TYPE SINGULAR INTEGRAL OPERATORS

  • Uysal, Gumrah;Mishra, Vishnu Narayan;Guller, Ozge Ozalp;Ibikli, Ertan
    • Korean Journal of Mathematics
    • /
    • 제24권3호
    • /
    • pp.545-565
    • /
    • 2016
  • In this paper, we present some general results on the pointwise convergence of the non-convolution type nonlinear singular integral operators in the following form: $$T_{\lambda}(f;x)={\large\int_{\Omega}}K_{\lambda}(t,x,f(t))dt,\;x{\in}{\Psi},\;{\lambda}{\in}{\Lambda}$$, where ${\Psi}$ = and ${\Omega}$ = stand for arbitrary closed, semi-closed or open bounded intervals in ${\mathbb{R}}$ or these set notations denote $\mathbb{R}$, and ${\Lambda}$ is a set of non-negative numbers, to the function $f{\in}L_{p,{\omega}}({\Omega})$, where $L_{p,{\omega}}({\Omega})$ denotes the space of all measurable functions f for which $\|{\frac{f}{\omega}}\|^p$ (1 ${\leq}$ p < ${\infty}$) is integrable on ${\Omega}$, and ${\omega}:{\mathbb{R}}{\rightarrow}\mathbb{R}^+$ is a weight function satisfying some conditions.

VANETs의 보안을 위한 비정상 행위 탐지 방법 (An Anomaly Detection Method for the Security of VANETs)

  • 오선진
    • 한국인터넷방송통신학회논문지
    • /
    • 제10권2호
    • /
    • pp.77-83
    • /
    • 2010
  • 차량 애드 혹 망 (Vehicular Ad Hoc Networks: VANETs)은 일반적으로 이동성이 높은 차량 노드들로 구성되어 매우 짧은 시간 망 위상이 지속되므로 불안정한 통신 링크를 갖는 자기 조직화 P2P 망이다. VANETs은 고정된 인프라 구조나 중앙 통제 라우팅 장비 없이 자동적으로 망구조를 구성하고, 차량 노드들은 시간에 따라 고속으로 이동하며 망에 결합하거나 이탈하는 개방 망이므로 중앙 집중식 제어 없이 누구나 접속을 허용하기 때문에 망상에 해롭고 비정상 행위 노드들에 대한 침입에 매우 취약하다. 본 논문에서는 이러한 VANETs에서의 노드들의 활동에 대한 비정상 행위를 효율적으로 식별할 수 있는 러프집합기반 비정상 행위 탐지방법을 제안하고, 그 성능을 모의실험을 통해 임계 허용 오차에 대한 비정상 행위 탐지율과 거짓 경고율로 평가하였다.

정보처리기술을 이용한 은행업무의 재설계에 관한 연구 (The study on the Re - design of Banking Business using the Information Technology)

  • 이순철;천정락
    • Asia pacific journal of information systems
    • /
    • 제6권1호
    • /
    • pp.125-163
    • /
    • 1996
  • Since the bank managers were accustomed to be under the goverment policy and control so far, all what they had to do were just to follow the government policy and wait for customers. These usual practices resultedin neglection of concerns for innovation and competitive power. However, it currently happens the change of business environment such as the liberalization of interest rates and the open finance market policy. Thus, it is necessary for the bank managers to have a concern on that situation for the improvement of profitability through productivity and cost-down. The bank managers are trying to set out an innovation strategy to cope with this situation. An innovation strategy should be based on its own characteristics of banking business. The banking business is different from those of other business because it deals with intangible services rather than material goods and thus, the bank managers have to be more sensitive to the customers. There also exists an inefficiency of internal process due to too many repetition of 'check and balance'. Thus, We set out the five principles and six selected tasks in order to settle down an inefficiency and to redesign a bank operation process.

  • PDF

Bicriteria optimal design of open cross sections of cold-formed thin-walled beams

  • Ostwald, M.;Magnucki, K.;Rodak, M.
    • Steel and Composite Structures
    • /
    • 제7권1호
    • /
    • pp.53-70
    • /
    • 2007
  • This paper presents a analysis of the problem of optimal design of the beams with two I-type cross section shapes. These types of beams are simply supported and subject to pure bending. The strength and stability conditions were formulated and analytically solved in the form of mathematical equations. Both global and selected types of local stability forms were taken into account. The optimization problem was defined as bicriteria. The cross section area of the beam is the first objective function, while the deflection of the beam is the second. The geometric parameters of cross section were selected as the design variables. The set of constraints includes global and local stability conditions, the strength condition, and technological and constructional requirements in the form of geometric relations. The optimization problem was formulated and solved with the help of the Pareto concept of optimality. During the numerical calculations a set of optimal compromise solutions was generated. The numerical procedures include discrete and continuous sets of the design variables. Results of numerical analysis are presented in the form of tables, cross section outlines and diagrams. Results are discussed at the end of the work. These results may be useful for designers in optimal designing of thin-walled beams, increasing information required in the decision-making procedure.

프록시 재암호화 기반의 안전한 전자지불시스템 (Proxy Re-encryption based Secure Electronic Transaction)

  • 고웅;곽진
    • 컴퓨터교육학회논문지
    • /
    • 제15권1호
    • /
    • pp.73-85
    • /
    • 2012
  • 현재 IT와 금융거래를 위한 기술의 발전으로 인해 인터넷과 같은 개방형 통신망을 이용한 효율적인 전자금융 서비스가 사용되고 있다. 이와 같은 환경에서 이용되는 SET, SSL/TLS 등과 같은 프로토콜은 신용카드 기반의 전자결제를 안전하고 효율적으로 수행하기 위해 개발된 전자지불 프로토콜이다. 그러나 대부분의 사용자들은 이에 대하여 정확히 알지 못하며, 보안상의 문제점을 인지하지 못한다. 특히, 이러한 프로토콜은 제품의 구매 및 결제를 위해 세션키를 추가로 생성하여 이용해야하는 등의 키 관리 문제가 존재한다. 따라서 본 논문에서는 이와 같은 문제점을 해결하기 위하여 프록시 재암호화 기법을 이용하여 추가적인 세션키 생성 없이 지불정보 및 주문정보를 송 수신할 수 있는 전자지불시스템을 제안한다.

  • PDF

Dominance, Potential Optimality, and Strict Preference Information in Multiple Criteria Decision Making

  • Park, Kyung-Sam;Shin, Dong-Eun
    • Management Science and Financial Engineering
    • /
    • 제17권2호
    • /
    • pp.63-84
    • /
    • 2011
  • The ordinary multiple criteria decision making (MCDM) approach requires two types of input, alternative values and criterion weights, and employs two schemes of alternative prioritization, dominance and potential optimality. This paper allows for incomplete information on both types of input and gives rise to the dominance relationships and potential optimality of alternatives. Unlike the earlier studies, we emphasize that incomplete information frequently takes the form of strict inequalities, such as strict orders and strict bounds, rather than weak inequalities. Then the issues of rising importance include: (1) The standard mathematical programming approach to prioritize alternatives cannot be used directly, because the feasible region for the permissible decision parameters becomes an open set. (2) We show that the earlier methods replacing the strict inequalities with weak ones, by employing a small positive number or zeroes, which closes the feasible set, may cause a serious problem and yield unacceptable prioritization results. Therefore, we address these important issues and develop a useful and simple method, without selecting any small value for the strict preference information. Given strict information on both types of decision parameters, we first construct a nonlinear program, transform it into a linear programming equivalent, and finally solve it via a two-stage method. An application is also demonstrated herein.