scholarly journals VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems

2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Hisham A. Kholidy ◽  
Abdelkarim Erradi

The Cypher Physical Power Systems (CPPS) became vital targets for intruders because of the large volume of high speed heterogeneous data provided from the Wide Area Measurement Systems (WAMS). The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. However, NNGE algorithm tends to produce rules that test a large number of input features. This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. The experiments show that the overall performance of VHDRA using both the vertical and the horizontal reduction reduces the NNGE hyperrectangles by 29.06%, 37.34%, and 26.76% and improves the accuracy of the NNGE by 8.57%, 4.19%, and 3.78% using the Multi-, Binary, and Triple class datasets, respectively.

Author(s):  
Aymen Akremi ◽  
Hassen Sallay ◽  
Mohsen Rouached

Investigators search usually for any kind of events related directly to an investigation case to both limit the search space and propose new hypotheses about the suspect. Intrusion detection system (IDS) provide relevant information to the forensics experts since it detects the attacks and gathers automatically several pertinent features of the network in the attack moment. Thus, IDS should be very effective in term of detection accuracy of new unknown attacks signatures, and without generating huge number of false alerts in high speed networks. This tradeoff between keeping high detection accuracy without generating false alerts is today a big challenge. As an effort to deal with false alerts generation, the authors propose new intrusion alert classifier, named Alert Miner (AM), to classify efficiently in near real-time the intrusion alerts in HSN. AM uses an outlier detection technique based on an adaptive deduced association rules set to classify the alerts automatically and without human assistance.


Author(s):  
Imanuddin Imanuddin ◽  
Fachrid Alhadi ◽  
Raza Oktafian ◽  
Ahmad Ihsan

Computer Vision is one of the branches of Image processing science that allows a combination of human beings, such as identifying an object like an eye and taking a decision. Many of the face detection systems use the Viola Jones method as an object detection method. The method of Viola Jones is known by having high speed and accuracy because it is useful to combine several concepts such as (Haar Features, Integral Image, AdaBoost, and Cascade Classifier) into a major method for detecting objects. The programming language used in this study uses the MATLAB programming language to facilitate the process of creating the system. The research aims to implement Viola Jones into a simple eye-sensing drowsiness system by utilizing the existing libraries in the MATLAB programming language. Once the system is completed, a system test is performed against the detected drowsiness detection characteristics. This eye drowsiness detection system aims to determine if the car rider is sleepy or not when driving with an input in the form of eye detection taken using a digital camera and then inserted into a language Programming GUI Matlab where the value is taken binary eyes, sleepy eyes and not sleepy that will be a reference that will be processed later so that it can produce the output of a warning sound to the rider of the sleepy car vehicle or not The sleepy automatically. The testing of the program gained an amount detected 7 eyes of 10 eyes by using BW 0255 level which is useful to accelerate a program to detect sleepy eyes.


Author(s):  
Ron Blacketer ◽  
J. R. Zaworski ◽  
K. M. Hunter-Zaworski

High-speed passenger rail is becoming a more common form of mass transit. A concern when high-speed rail systems are implemented is the provision of intrusion detection at rail crossings. High-speed rail equipment is lighter and faster than traditional rail equipment, and even small objects can damage or derail it. The goal of this project was to field-test two intrusion detection technologies–-a video detection system and a microwave detection system–-and determine whether they could effectively be used for intrusion detection at rail crossings. The tests used objects of varying size, color, and material composition to serve as intruders. The detection systems used were chosen as a result of several previously performed laboratory studies that suggested that both systems, though designed to detect automobiles and pedestrians, could meet the specified requirements. Field testing, however, showed that the performance level of both systems was lower than expected. Therefore, the conclusion was drawn that the technologies would require much testing and refinement before either could be implemented as a stand-alone rail crossing intrusion detection system. This report describes the field testing that was done to evaluate these systems. It includes a description of the detection systems, the test methods and results, and conclusions about the viability of these technologies for this particular application.


2014 ◽  
Vol 11 (2) ◽  
pp. 601-622 ◽  
Author(s):  
Yousef Abuadlla ◽  
Goran Kvascev ◽  
Slavko Gajin ◽  
Zoran Jovanovic

Computer systems and networks suffer due to rapid increase of attacks, and in order to keep them safe from malicious activities or policy violations, there is need for effective security monitoring systems, such as Intrusion Detection Systems (IDS). Many researchers concentrate their efforts on this area using different approaches to build reliable intrusion detection systems. Flow-based intrusion detection systems are one of these approaches that rely on aggregated flow statistics of network traffic. Their main advantages are host independence and usability on high speed networks, since the metrics may be collected by network device hardware or standalone probes. In this paper, an intrusion detection system using two neural network stages based on flow-data is proposed for detecting and classifying attacks in network traffic. The first stage detects significant changes in the traffic that could be a potential attack, while the second stage defines if there is a known attack and in that case classifies the type of attack. The first stage is crucial for selecting time windows where attacks, known or unknown, are more probable. Two different neural network structures have been used, multilayer and radial basis function networks, with the objective to compare performance, memory consumption and the time required for network training. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time, with low probability of false alarms.


Author(s):  
V.P. Kshirsagar ◽  
S.S. Vishnu ◽  
S.M. Tidke

The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS).In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based system hence the structure of the rule is also explained. But to match with the high speed of network traffic the performance of the SNORT need to be improved hence the various methods has been developed three of them are reviewed here which are Rules Matching Algorithm Based on Dynamic Adjustment, NAPI and LASSP.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5279
Author(s):  
Dong-Hoon Kwak ◽  
Guk-Jin Son ◽  
Mi-Kyung Park ◽  
Young-Duk Kim

The consumption of seaweed is increasing year by year worldwide. Therefore, the foreign object inspection of seaweed is becoming increasingly important. Seaweed is mixed with various materials such as laver and sargassum fusiforme. So it has various colors even in the same seaweed. In addition, the surface is uneven and greasy, causing diffuse reflections frequently. For these reasons, it is difficult to detect foreign objects in seaweed, so the accuracy of conventional foreign object detectors used in real manufacturing sites is less than 80%. Supporting real-time inspection should also be considered when inspecting foreign objects. Since seaweed requires mass production, rapid inspection is essential. However, hyperspectral imaging techniques are generally not suitable for high-speed inspection. In this study, we overcome this limitation by using dimensionality reduction and using simplified operations. For accuracy improvement, the proposed algorithm is carried out in 2 stages. Firstly, the subtraction method is used to clearly distinguish seaweed and conveyor belts, and also detect some relatively easy to detect foreign objects. Secondly, a standardization inspection is performed based on the result of the subtraction method. During this process, the proposed scheme adopts simplified and burdenless calculations such as subtraction, division, and one-by-one matching, which achieves both accuracy and low latency performance. In the experiment to evaluate the performance, 60 normal seaweeds and 60 seaweeds containing foreign objects were used, and the accuracy of the proposed algorithm is 95%. Finally, by implementing the proposed algorithm as a foreign object detection platform, it was confirmed that real-time operation in rapid inspection was possible, and the possibility of deployment in real manufacturing sites was confirmed.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2674
Author(s):  
Qingying Ren ◽  
Wen Zuo ◽  
Jie Xu ◽  
Leisheng Jin ◽  
Wei Li ◽  
...  

At present, the proposed microwave power detection systems cannot provide a high dynamic detection range and measurement sensitivity at the same time. Additionally, the frequency band of these detection systems cannot cover the 5G-communication frequency band. In this work, a novel microwave power detection system is proposed to measure the power of the 5G-communication frequency band. The detection system is composed of a signal receiving module, a power detection module and a data processing module. Experiments show that the detection frequency band of this system ranges from 1.4 GHz to 5.3 GHz, the dynamic measurement range is 70 dB, the minimum detection power is −68 dBm, and the sensitivity is 22.3 mV/dBm. Compared with other detection systems, the performance of this detection system in the 5G-communication frequency band is significantly improved. Therefore, this microwave power detection system has certain reference significance and application value in the microwave signal detection of 5G communication systems.


Sign in / Sign up

Export Citation Format

Share Document