• Title/Summary/Keyword: system detection

Search Result 12,222, Processing Time 0.039 seconds

The performance of Bio-aerosol Detection System (BDS) with 405 nm laser diode (405 nm 광원을 이용한 생물입자탐지기의 에어로졸 분석성능)

  • Jeong, Young-Su;Chong, Eugene;Lee, Jong-Min;Choi, Kibong
    • Particle and aerosol research
    • /
    • v.13 no.1
    • /
    • pp.25-31
    • /
    • 2017
  • This paper offer the characteristics for the detection and classification of biological and non-biological aerosol particles in the air by using laser-induced-fluorescence (LIF) based Bio-aerosol Detection System (BDS). The BDS is mainly consist of an optical chamber, in-outlet nozzle system, 405 nm diode laser, an avalanche photo detector (APD) for scattering signal and photomultiplier tubes (PMT) for fluorescence signals in two different wavelength range ; F1, 510-600 nm and F2, 435-470 nm. The detection characteristics, especially ratio of fluorescence signal intensity were examined using well-known components : polystylene latex (PSL), fluorescence PSL, $2{\mu}m$ of SiO2 micro sphere, dried yeast, NADH, ovalbumin, fungicide powder and standard dust. The results indicated that the 405 nm diode laser-based LIF instrument can be a useful bio-aerosol detection system for unexpected biological threaten alter in real-time to apply for dual-use technology in military and civilian fields.

Wireless Intrusion Prevention System based on Snort Wireless (Snort Wireless 기반의 무선 침입 방지 시스템)

  • Kim, A-Yong;Jeong, Dae-Jin;Park, Man-Seub;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.666-668
    • /
    • 2013
  • Wireless network environment is spreading due to the increase of using mobile devices, causing wireless network abuse. Network security and intrusion detection have been paid attention to wireless as well as wired existing and studied actively Snort-based intrusion detection system (Intrusion Detection System) is a proven open source system which is widely used for the detection of malicious activity in the existing wired network. Snort Wireless has been developed in order to enable the 802.11 wireless detection feature. In this paper, Snort Wireless Rule is analyzed. Based on the results of the analysis, present the traveling direction of future research.

  • PDF

Fault Detection and Classification with Optimization Techniques for a Three-Phase Single-Inverter Circuit

  • Gomathy, V.;Selvaperumal, S.
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1097-1109
    • /
    • 2016
  • Fault detection and isolation are related to system monitoring, identifying when a fault has occurred, and determining the type of fault and its location. Fault detection is utilized to determine whether a problem has occurred within a certain channel or area of operation. Fault detection and diagnosis have become increasingly important for many technical processes in the development of safe and efficient advanced systems for supervision. This paper presents an integrated technique for fault diagnosis and classification for open- and short-circuit faults in three-phase inverter circuits. Discrete wavelet transform and principal component analysis are utilized to detect the discontinuity in currents caused by a fault. The features of fault diagnosis are then extracted. A fault dictionary is used to acquire details about transistor faults and the corresponding fault identification. Fault classification is performed with a fuzzy logic system and relevance vector machine (RVM). The proposed model is incorporated with a set of optimization techniques, namely, evolutionary particle swarm optimization (EPSO) and cuckoo search optimization (CSO), to improve fault detection. The combination of optimization techniques with classification techniques is analyzed. Experimental results confirm that the combination of CSO with RVM yields better results than the combinations of CSO with fuzzy logic system, EPSO with RVM, and EPSO with fuzzy logic system.

A Design of false alarm analysis framework of intrusion detection system by using incremental mining method (점진적 마이닝 기법을 적용한 침입탐지 시스템의 오 경보 분석 프레임워크 설계)

  • Kim Eun-Hee;Ryu Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.295-302
    • /
    • 2006
  • An intrusion detection system writes a lot of alarms against attack behaviors in real time. These alarms contain not only actual attack alarms, but also false alarms that are mistakes made by the intrusion detection system. False alarms are the main reason that reduces the efficiency of the intrusion detection system, and we propose framework for false alarms analysis in the paper. Also, we apply an incremental data mining method for pattern analysis of false alarms increasing continuously. The framework consists of GUI, DB Manager, Alert Preprocessor, and False Alarm Analyzer. We analyze the false alarms increasingly through the experiment of the proposed framework and show that false alarms are reduced by applying the analyzed false alarm rules in the intrusion detection system.

Study on the Development of Road Icing Forecast and Snow Detection System Using State Evaluation Algorithm of Multi Sensoring Method (복합 센서의 상태 판정 알고리즘을 적용한 노면결빙 예측 및 강설 감지 시스템 개발에 관한 연구)

  • Kim, Jong-Woo;Jung, Young-Woo;Nam, Jin-Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.5
    • /
    • pp.113-121
    • /
    • 2013
  • The road icing forecast and snow detection system using state evaluation algorithm of multi sensor optimizes snow melting system to control spread time and amount of chemical spread application This system operates integrated of contact/non-contact sensor and infrared camera. The state evaluation algorithm of the system evaluates road freezing danger condition and snowfall condition (snowfall intensity also) using acquired data such as temperature/humidity, moisture detection and result of image signal processing from field video footage. In the field experiment, it proved excellent and reliable evaluated result of snowfall state detection rate of 89% and wet state detection rate of 94%.

Intrusion Detection System Using the Correlation of Intrusion Signature (침입신호 상관성을 이용한 침입 탐지 시스템)

  • Na Guen-Sik
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.57-67
    • /
    • 2004
  • In this paper we present the architecture of intrusion detection system that enhances the performance of system and the correctness of intrusion detection. A network intrusion is usually composed of several steps of action taken by the attackers. Each action in the steps can be characterized by its signature. But normal and non-intrusive action can also include the same signature, It can result in incorrect detection. The presented system uses the correlation of series of signatures that consist of an intrusion. So Its decision on an intrusion is highly reliable. And variations of known intrusions can easily be detected without any knowledge of the variations.

  • PDF

A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service (안전한 홈네트워크 서비스를 위한 계층적 분산 침입탐지에 관한 연구)

  • Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.49-57
    • /
    • 2008
  • In this paper, we propose a novel hierarchical distributed intrusion detection system, named HNHDIDS(Home Network Hierarchical Distributed Intrusion Detection System), which is not only based on the structure of distributed intrusion detection system, but also fully consider the environment of secure home networks service. The proposed system is hierarchically composed of the one-class support vector machine(support vector data description) and local agents, in which it is designed for optimizing for the environment of secure home networks service. We support our findings with computer experiments and analysis.

High-$T_c$ SQUID Application for Roll to Roll Metallic Contaminant Detector

  • Tanaka, S.;Kitamura, Y.;Uchida, Y.;Hatsukade, Y.;Ohtani, T.;Suzuki, S.
    • Progress in Superconductivity
    • /
    • v.14 no.2
    • /
    • pp.82-86
    • /
    • 2012
  • A sensitive eight-channel high-Tc Superconducting Interference Device (SQUID) detection system for magnetic contaminant in a lithium ion battery anode was developed. Finding ultra-small metallic foreign matter is an important issue for a manufacturer because metallic contaminants carry the risk of an internal short. When contamination occurs, the manufacturer of the product suffers a great loss from recalling the tainted product. Metallic particles with outer dimensions smaller than 100 microns cannot be detected using a conventional X-ray imaging system. Therefore, a highly sensitive detection system for small foreign matter is required. We have already developed a detection system based on a single-channel SQUID gradiometer and horizontal magnetization. For practical use, the detection width of the system should be increased to at least 65 mm by employing multiple sensors. In this paper, we present an 8-ch high-Tc SQUID roll-to-roll system for inspecting a lithium-ion battery anode with a width of 65 mm. A special microscopic type of a cryostat was developed upon which eight SQUID gradiometers were mounted. As a result, small iron particles of 35 microns on a real lithium-ion battery anode with a width of 70 mm were successfully detected. This system is practical for the detection of contaminants in a lithium ion battery anode sheet.

Robustness Analysis and Improvement on Transformed-key Asymmetric Watermarking System (변환키 비대칭 워터마킹 시스템의 강인성 분석 및 개선)

  • Kim, Nam-Jin;Choi, Doo-Seop;Song, Won-Seok;Choi, Hyuk;Kim, Tae-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.119-126
    • /
    • 2010
  • In this paper, we analyze the robustness of transformed-key asymmetric watermarking system and show its improvement by proposing a new detection method. Based on the assumption that the transformed-key asymmetric watermarking system is under the threat of subtraction attack, we first propose the criterion for the detection performance of the watermarking system and analyze the optimum condition on the system. Next, a new detection method is proposed to improve the detection performance of the system based on the criterion. The proposed improvement makes the system robust to not only subtraction attack but also Wu's attack.

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안관리 시스템에서의 침입탐지 및 대응을 위한 보안 정책 모델에 관한 연구)

  • Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.9-17
    • /
    • 2005
  • Recently It's difficult to deal with about variety of attack. And Simple Security management have a problem. It is that they don't develop system measuring their system envoirment and have efficient attack detector, countermeasure organization about large network. Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF