• Title/Summary/Keyword: trail detection

Search Result 19, Processing Time 0.031 seconds

A Study on the Air Traffic Situation Variables which Influence the Job Performance of Military Air Traffic Controllers (군관제사의 직무 수행과 항공교통상황 변인의 영향 연구)

  • Sin, Hyon-Sam;Jang, Jung-Ha;Ahn, Jae-Mo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • The air traffic situation variables were emphasized in this research to review the awareness level of job performance of military air traffic controllers in application of air traffic situation variables such as detection of aircraft identification, type of aircraft, position ,speed, altitude, determination of separation between departing and arriving in-trail aircraft, physical airport conditions, adverse weather conditions, NAVAID outage and ATC facilities' operational status. In this respect, This study was conducted under the auspice of ATC facility operating agencies and devoting air force air traffic controller's participation by answering the questionnaires from nine radar approach control facilities and other air traffic control towers.

A Study on the Position Tracking of Moving Image for Surveillance System (이동영상 위치추적 감시시스템에 관한 연구)

  • Lee Seung-Young;Jung Tae-Rim;Hur Chang-Wu;Ryu Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.205-208
    • /
    • 2006
  • The position tracking of moving image for surveillance system is presented in this paper. The image of objects moving is detected with difference image between the background image not to be moved relatively and the forward moving image. The moving image is tracked with edge detection and moving vector to the object. The experiment result shows that the system enable to trail the position of moving objects obviously and is able to discriminate an infiltration.

  • PDF

Development and Evaluation of Real-time Acoustic Detection System of Harmful Red-tide Using Ultrasonic Sound (초음파를 이용한 유해적조의 실시간 음향탐지 시스템 개발 및 평가)

  • Kang, Donhyug;Lim, Seonho;Lee, Hyungbeen;Doh, Jaewon;Lee, Youn-Ho;Choi, Jee Woong
    • Ocean and Polar Research
    • /
    • v.35 no.1
    • /
    • pp.15-26
    • /
    • 2013
  • The toxic, Harmful Algal Blooms (HABs) caused by the Cochlodinium polykrikoides have a serious impact on the coastal waters of Korea. In this study, the acoustic detection system was developed for rapid HABs detection, based on the acoustic backscattering properties of the C. polykrikoides. The developed system was mainly composed of a pulser-receiver board, a signal processor board, a control board, a network board, a power board, ultrasonic sensors (3.5 and 5.0 MHz), an environmental sensor, GPS, and a land-based control unit. To evaluate the performance of the system, a trail was done at a laboratory, and two in situ trials were conducted: (1) when there was no red tide, and (2) when there was red tide. In the laboratory evaluation, the system performed well in accordance with the number of C. polykrikoides in the received level. Second, under the condition when there was no red tide in the field, there was a good correlation between the acoustic data and sampling data. Finally, under the condition when there was red tide in the field, the system successfully worked at various densities in accordance with the number of C. polykrikoides, and the results corresponded with the sampling data and monitoring result of NFRDI (National Fisheries Research & Development Institute). From the laboratory and field evaluations, the developed acoustic detection system for early detecting HABs has demonstrated that it could be a significant system to monitor the occurrence of HABs in coastal regions.

The Real-Time Detection of the Malicious JavaScript (실시간으로 악성 스크립트를 탐지하는 기술)

  • Choo, Hyun-Lock;Jung, Jong-Hun;Kim, Hwan-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.51-59
    • /
    • 2015
  • JavaScript is a popular technique for activating static HTML. JavaScript has drawn more attention following the introduction of HTML5 Standard. In proportion to JavaScript's growing importance, attacks (ex. DDos, Information leak using its function) become more dangerous. Since these attacks do not create a trail, whether the JavaScript code is malicious or not must be decided. The real attack action is completed while the browser runs the JavaScript code. For these reasons, there is a need for a real-time classification and determination technique for malicious JavaScript. This paper proposes the Analysis Engine for detecting malicious JavaScript by adopting the requirements above. The analysis engine performs static analysis using signature-based detection and dynamic analysis using behavior-based detection. Static analysis can detect malicious JavaScript code, whereas dynamic analysis can detect the action of the JavaScript code.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

Implementation of Secure Linux OS based on Kernel (커널 기반의 보안 리눅스 운영체제 구현)

  • 박태규;임연호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.33-43
    • /
    • 2001
  • This paper presents a secure Linux OS in which multi-level security functions are implemented at the kernel level. Current security efforts such as firewall or intrusion detection system provided in application-space without security features of the secure OS suffer from many vulnerabilities. However the development of the secure OS in Korea lies in just an initial state, and NSA has implemented a prototype of the secure Linux but published just some parts of the technologies. Thus our commercialized secure Linux OS with multi-level security kernel functions meets the minimum requirements for TCSEC B1 level as well kernel-mode encryption, real-time audit trail with DB, and restricted use of root privileges.

Applicability for Detecting Trails by Using KOMPSAT Imagery (등산로 탐지를 위한 KOMPSAT 영상의 활용가능성)

  • Bae, Jinsu;Yim, Jongseo;Shin, Young Ho
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.6
    • /
    • pp.607-619
    • /
    • 2015
  • It is important to detect trails accurately for finding a proper management. We examined the applicability of KOMPSAT imagery to detect trails and found that it could be an efficient alternative to track trails correctly. We selected K2 and K3 imagery with different spatial resolution. Then, we processed each imagery to get NDVI, SAVI, and SC data. And then, we identified trails by object-based analysis and network analysis. Finally, we evaluated the potential trails with F-measurement and Jaccard coefficient which are based on correctness and completeness. The results show that the applicability is quite different in each case. Among them, especially the SC data with K3 shows the most highest value; correctness of detecting legal trails is 0.44 and completeness of that is 0.54. F-measurement and Jaccard coefficient are 0.49 and 0.32. In general, although there is a limit in detecting trails by using only KOMPSAT imagery, the usefulness of KOMPSAT imagery can be a higher considering its cost efficiency and availability of acquiring periodic data.

  • PDF