• Title/Summary/Keyword: 보안통신

Search Result 4,886, Processing Time 0.03 seconds

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

Performance Analysis of DoS/DDoS Attack Detection Algorithms using Different False Alarm Rates (False Alarm Rate 변화에 따른 DoS/DDoS 탐지 알고리즘의 성능 분석)

  • Jang, Beom-Soo;Lee, Joo-Young;Jung, Jae-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.139-149
    • /
    • 2010
  • Internet was designed for network scalability and best-effort service which makes all hosts connected to Internet to be vulnerable against attack. Many papers have been proposed about attack detection algorithms against the attack using IP spoofing and DoS/DDoS attack. Purpose of DoS/DDoS attack is achieved in short period after the attack begins. Therefore, DoS/DDoS attack should be detected as soon as possible. Attack detection algorithms using false alarm rates consist of the false negative rate and the false positive rate. Moreover, they are important metrics to evaluate the attack detections. In this paper, we analyze the performance of the attack detection algorithms using the impact of false negative rate and false positive rate variation to the normal traffic and the attack traffic by simulations. As the result of this, we find that the number of passed attack packets is in the proportion to the false negative rate and the number of passed normal packets is in the inverse proportion to the false positive rate. We also analyze the limits of attack detection due to the relation between the false negative rate and the false positive rate. Finally, we propose a solution to minimize the limits of attack detection algorithms by defining the network state using the ratio between the number of packets classified as attack packets and the number of packets classified as normal packets. We find the performance of attack detection algorithm is improved by passing the packets classified as attacks.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Proposal for Research Model of High-Function Patrol Robot using Integrated Sensor System (통합 센서 시스템을 이용한 고기능 순찰 로봇의 연구모델 제안)

  • Byeong-Cheon Yoo;Seung-Jung Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.77-85
    • /
    • 2024
  • In this dissertation, a we designed and implemented a patrol robot that integrates a thermal imaging camera, speed dome camera, PTZ camera, radar, lidar sensor, and smartphone. This robot has the ability to monitor and respond efficiently even in complex environments, and is especially designed to demonstrate high performance even at night or in low visibility conditions. An orbital movement system was selected for the robot's mobility, and a smartphone-based control system was developed for real-time data processing and decision-making. The combination of various sensors allows the robot to comprehensively perceive the environment and quickly detect hazards. Thermal imaging cameras are used for night surveillance, speed domes and PTZ cameras are used for wide-area monitoring, and radar and LIDAR are used for obstacle detection and avoidance. The smartphone-based control system provides a user-friendly interface. The proposed robot system can be used in various fields such as security, surveillance, and disaster response. Future research should include improving the robot's autonomous patrol algorithm, developing a multi-robot collaboration system, and long-term testing in a real environment. This study is expected to contribute to the development of the field of intelligent surveillance robots.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

e-Navigation 관련 산업현황에 관한 기초연구

  • Choe, Han-Gyu;Gang, Byeong-Jae
    • 선박안전기술공단연구보고서
    • /
    • s.4
    • /
    • pp.1-108
    • /
    • 2007
  • 2007. 7. 23 IMO의 NAV(항해안전전문위원회)53차 회의에서는 e-Navigation을 해상에서의 안전, 보안, 해양환경보호를 목적으로 전자적인 수단에 의해 선박과 육상에서 해양정보를 수집, 교환, 표시함으로써 항구와 항구간의 항해 및 관련된 서비스를 향상시키는 것으로 정의하고 있다.2005년 11월 영국의 교통부 장관 Stephen 박사는 Royal Institute ofNavigation에서의 연설에서 해상안전과 환경보호를 위하여 선박의 항해를 감시하는 관제소 및 항행하는 선박에 유용하고 정확한 정보가 더 많이 필요함을 역설하였다. 그리고 첨단 기술에 의해 자동화된 항공 항법분야를 예로들면서, 선박의 항법 분야도 항해와 관련된 모든 시설 및 작업을 전자적 수단으로 대체하는 개념인 e-Navigation으로 전환되어야 하며 영국은 이에 필요한 작업을 주도하겠다는 의견을 피력하였다. Stephen은 e-Navigation 도입으로 얻을 수 있는 이익으로 첫째, 항해 실수로 인한 사고 확률저감, 둘째,사고 발생 시 인명 구조 및 피해 확산을 위한 효율적 대응, 셋째, 전통적인항해시설 설치 불필요로 인한 비용 저감, 넷째 선박입출항 수속의 간편화 및항로의 효율적 운용으로 인한 상업적 이익 등을 들었다. 반면에e-Navigation 체계로 전환 시 예상되는 장애로는 첫째, 체계 구축을 위한 비용(특히 개발도상국가들의 경우 어려움 예상), 둘째, e-Navigation의 성과 달성을 위하여 세계 전 해역의 모든 선박이 e-Navigation 체계에 동참하도록유도하는 문제, 셋째, 전자해도 표시 및 선교 장비들에 대한 표준화 문제, 넷째, 육상에 설치할 e-Navigation 센터의 설계 및 구축 등을 꼽았다.IMO는 2005년 81차 MSC(해사안전위원회) 회의에서 영국이 일본, 마샬아일랜드, 네덜란드, 노르웨이, 싱가포르, 미국과 공동으로 제안한 ‘e-Navigation전략 개발’ 의제를 2006년 82차 MSC 회의에서 채택하고, NAV(항해 전문위원회)를 통하여 2008년까지 e-Navigation의 구체적 개념을 정립하고 향후 개발하여야 할 전략적 비전과 정책을 수립하기로 하였다. 이어서 영국을 의장으로 e-Navigation 전략개발 통신작업반이 구성되었는데, 지난 년간 19개국, 16개 전문기관이 참여하여 아래의 작업이 수행되었다. ○ e-Navigation 개념의 정의와 목적 ○ e-Navigation에 대한 핵심 이슈 및 우선 순위 식별 ○ e-Navigation 개발에 따른 이점과 단점의 식별 ○ IMO 및 회원국 등의 역할 식별 ○ 이행계획을 포함한 추가 개발을 위한 작업계획의 작성 IMO에서 수행되고 있는 e-Navigation 전략 개발 의제 일정은 2008년까지이다. 이 전략 개발에 있어서 중요한 요소는 e-Navigation이 포함할 서비스범위, 포함하는 서비스 제공에 필요한 인프라 및 장비의 식별, 인프라 구축및 운용비용을 부담할 주체에 대한 논의, e-Navigation으로 인한 이익과 투자비용에 대한 비교 분석 등이다. 이 과정에서 정부, 선주, 항만운영자, 선원등의 입장 차이와 선진국과 개발도상국 간의 경제 수준 차이는 전략 개발에있어 큰 어려움을 줄 것이므로, 이들이 합의된 전략을 만들기 위해서는 예정된 기간보다 다소 늦어질 가능성도 있다.e-Navigation 전략 개발이 완료되면 1단계로는 해상교통 관제시스템, 선박선교 장비, 무선 통신장비 등에 대한 표준화 작업이 이루어질 것이다. 이 과정에서 각국 간에 자국 보유 기술을 표준화시키기 위한 경쟁이 치열할 것으로 예상된다. 2단계에서는 e-Navigation 체계 하에서의 다양하고 풍부한 서비스 제공을 위한 관련 소프트웨어 및 하드웨어의 개발이 이루어질 것으로전망되는데, 이는 지난 10년간 육상에서 인터넷망 설치 후 이루어진 관련 서비스 산업의 발전을 돌아보면 쉽게 짐작할 수 있을 것이다.e-Navigation 체계 하에서 선박의 항해는 현재와는 전혀 다른 패러다임으로 바뀔 것이다. 예를 들어 현재 입출항 시 요구되던 복잡한 절차는one-stop 쇼핑 형태로 단순화되고, 현재 선박 중심의 항해에서 육상e-Navigation 센터가 적극적으로 관여하는 항해 체계로 바뀔 것이며, 해상정보의 공유와 활용이 무선 인터넷을 통해 보다 광범위하게 이루어질 것이 다.e-Navigation의 잠재적 시장 규모는 선박에 새로이 탑재될 지능형 통합 항법시스템 구축과 육상 모니터링 및 지원 시스템 등 직접 시장이 약 50조원,전자해도, 통신장비, 관련 서비스 컨텐츠 등 간접 시장의 규모가 150조원으로 총 200조원으로 대략 추산하고 있다. 향후 이 거대한 시장을 차지하기 위한 전략 수립이 필요한 시점이다. 지금까지 항해 장비 관련 산업은 선진국의일부 업체들에 의해 독점되어 왔다. 우리나라는 조선과 해운에서 모두 선진국임에도 불구하고 이 분야에서는 대부분 수입에 의존해 왔다. e-Navigation체계 하에서는 전체 시장이 커지고 장비의 사양이 표준화됨에 따라 어느 소수 업체가 현재처럼 독점하기는 더 이상 어려울 것으로 예상된다. 따라서e-Navigation은 우리나라도 항해 장비 분야 시장을 차지할 수 있는 좋은 기회라고 할 수 있다. 특히 조선 1위의 장점을 적극 활용한다면 다른 나라보다우위의 경쟁력을 확보할 수도 있다. 또한, 서비스 분야의 시장은 IT 기술과밀접한 관계가 있으므로 IT 강국인 우리나라가 충분한 경쟁력을 갖고 있다고 할 수 있다.그러나, EU를 비롯한 선진국에서는 이미 e-Navigation 에 대비한 연구를10여년 전부터 수행해 왔다. 앞에서 언급한 EU의 MarNIS 사업은 현재 거의마무리 단계로 당장 실용화 할 수 있는 수준에 있는 것으로 보인다. 늦었지만 우리도 이를 따라잡기 위한 연구를 서둘러야 할 것이다. 국내에서도e-Navigation의 중요성을 깊이 인식하고, 2006년에는 관련 산학연 전문가들로 작업반을 구성하여 워크숍 등을 개최한 바 있다. 또한 해양수산부에서도e-Navigation 핵심기술 개발을 위한 연구사업을 기획 추진하고 있다.그러나 현재 항해통신장비들의 기술기준은 ITU의 전파규칙(RR)과 IMO결의 및 SOLAS 협약을 따르고 있는데 이들 규약이나 결의에 대한 국제적인 추이와 비교할 때 국내의 기술은 표준화되지 못한 부분이 많은 실정이다.본 연구에서는 e-Navigation sytem중 표준화가 필요한 요소와 전자해도,AIS 등 e-Navigation(통합전자항법시스템)관련 국내산업현황 실태조사를 통해 국내 e-Navigation기술개발 동향에 대해 조사하고자 한다.

  • PDF

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Effect of microwave radiation on physical special quality of normal, high amylose and waxy corn starches (마이크로웨이브를 조사한 옥수수전분의 물리적 특성변화)

  • Lee Su Jin;Choe Yeong Hui
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.15 no.1
    • /
    • pp.113-125
    • /
    • 2004
  • Effect of microwave radiation on physico-chemical properties of cor'n starches was studied. Waxy com, com and high amylose com starches of varying moisture content(20~35%) were subjected to microwave processing(2450MHz) at $120^{\circ}$ and the experimental starch samples were examined by a X-ray diffractometry, rapid viscosity analyzer(RVA) and. with the samples in temperature was observed and the peaks of high amylose com starches at $2^{\circ}$=5.0, 15.0 and $23.0^{\circ}$, were disappeared indicating the melting of crystallines while those of com and waxy com had not changed. A change in gelatinization pattern was observed in the case of corn starches from type A with nearly no peak-viscosity and breakdown to type C. Except a decreased viscosity, no change was observed in those of waxy com starches.

  • PDF