• Title/Summary/Keyword: 설계기반연구

Search Result 10,899, Processing Time 0.046 seconds

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.

An Analysis on the Bleeding Effect of SCW Ground Heat Exchanger using Thermal Response Test Data (열응답시험 데이터를 이용한 SCW형 지중열교환기 블리딩 효과 분석)

  • Chang, Keun-Sun;Kim, Min-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.512-520
    • /
    • 2020
  • Recently, the applications of the standing column well (SCW) ground heat exchanger (GHX) have increased significantly in Korea as a heat transfer mechanism of ground source heat pump systems (GSHP) because of its high heat capacity and efficiency. Among the various design and operating parameters, bleeding was found to be the most important parameter for improving the thermal performance, such as ground thermal conductivity and borehole thermal resistance. In this study, a bleeding analysis model was developed using the thermal response test data, and the effects of bleeding rates and bleeding locations on the thermal performance of anSCW were investigated. The results show that, when the ground water flows into the top of anSCW, the time variation of circulating water temperature decreased with increasing bleeding rate, and the ground thermal conductivity increases by as much as 179% with a 30% bleeding rate. When the ground water flows into the bottom of the SCW, the circulating water temperatures become almost constant after the increase in the beginning time because the circulating water exchanges heat with the ground structure before mixing with the ground water at the bottom.

UbiController: Universal Mobile System for Controlling Appliances in Smart Home Environment (UbiController: 스마트 홈 환경의 가전기기 제어를 위한 통합 모바일 시스템)

  • Yoon, Hyo-Seok;Kim, Hye-Jin;Woo, Woon-Tack;Lee, Sang-Goog
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1059-1071
    • /
    • 2008
  • Users in ubiquitous computing environment can easily access and use a multitude of devices and services anywhere and anytime. The key technology to realize this scenario is the method to intuitively provide proper user interfaces for each device and service. Previous attempts simply provided a designated user interface for each device and service or provided an abstract user interface to control common functions of different services. To select a target appliance, either user directly specified the target device or depended on sensors such as RFID tags and readers limiting the applicable scenarios. In this paper, we present UbiController which uniquely uses camera on the mobile device to recognize markers of appliances to acquire user interface for controlling task. UbiController aims to provide automatic discovery of multiple services in the smart home environment, support traditional GUI and novel camera-based recognition method as well as intuitive interaction methods for users. In this paper, we show experiments on the performance of UbiController's discovery and recognition methods and user feedback on interaction methods from a user study.

  • PDF

Design of a synchronization controller for non-rail mobile rack using repetitive control method (반복제어기법을 이용한 무궤도 이동랙 동기화제어기 설계)

  • Kim, Hwan-Seong;Park, Jin;Ha, Yun-Su
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.6
    • /
    • pp.527-534
    • /
    • 2016
  • The non-rail mobile rack, which is used for cargo storage, can improve the storage capacities of logistics centers. Furthermore, it has the advantage that it can be used in traditional logistics centers without making any changes or renovation, such as installing rails. However, when the rack is operated by separated drive actuators mounted on the left and the right wheels, precise position control of the wheels is necessary even if the unbalanced cargo weight on the rack would affect the control. Therefore, internal synchronization control for position tracking between the left and right wheels on the non-rail mobile rack is necessary in this study. In addition, external synchronization control for realizing the same straight movements between mobile racks is necessary. For the internal and the external synchronization control, we propose a synchronization control algorithm based on the repetitive control theory. An internal synchronization control algorithm with repetitive control theory requires the application of the robust servo control method owing to parameter variations. In this case, we can set up the gains for the robust servo control system by considering the cargo variations on the mobile rack. Furthermore, for developing the external synchronization control algorithm, we use a double repetitive control system to perform synchronization control between mobile racks. The efficiency of the proposed control algorithm will be verified by simulation and experimental results. The proposed algorithm can be easily applied in the industry.

Varied Flow Analysis for Linear Drainage Channels (선형 배수로에 대한 부등류 해석)

  • Ku, Hye-Jin;Jun, Kyung-Soo
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.8
    • /
    • pp.773-784
    • /
    • 2008
  • The present study was carried out to examine flow properties in linear drainage channels such as road surface drainage facilities. The finite difference formulation for the varied flow analysis was solved for flow profiles in the channels. Starting the first step at the control section, the Newton-Raphson method was applied for producing numerical solutions of the equation. We considered two types of linear drainage channels, a channel with one outlet at downstream end and a channel with two outlets at both ends. Moreover, the flow analysis for various channel slopes was performed. However, we considered channels with the two outlets of slopes satisfying the condition that the both ends are the control section. The maximum of those slopes was decided from the relation between the channel slope and the location of control section. The flow of a channel with one outlet was calculated upward and downward from the control section existing in channel or upward from the control section at downstream end. The flow of a channel with two outlets at both ends were calculated for upstream and downstream channel segments divided by the water dividend, respectively and the flow analysis was completed when the water depth at the water dividend calculated from upstream end was equal to that calculated from downstream end. If the slope was larger than the critical slope, the channel with two outlets was likely to behave like the channel with one outlet. The maximum water depth was investigated and compared with that calculated additionally from the uniform flow analysis. The uniform flow analysis was likely to lead a excessive design of a drainage channel with mild slope.

Estimating Personal and Social Information for Mobile User (모바일 사용자의 개인 및 소셜 정보 추정)

  • Son, Jeong-Woo;Han, Yong-Jin;Song, Hyun-Je;Park, Seong-Bae;Lee, Sang-Jo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.603-614
    • /
    • 2013
  • The popularity of mobile devices provides their users with a circumstance that services and information can be accessed wherever and whenever users need. Accordingly, various studies have been proposed personalized methods to improve accessibility of mobile users to information. However, since these personalized methods require users' private information, they gives rise to problems on security. An efficient way to resolve security problems is to estimate user information by using their online and offline behavior. In this paper, for this purpose, it is proposed a novel user information identification system that identifies users' personal and social information by using both his/her behavior on social network services and proximity patterns obtained from GPS data. In the proposed system, personal information of a user like age, gender, and so on is estimated by analyzing SNS texts and POI (Point of Interest) patterns, while social information between a pair of users like family and friend is predicted with proximity patterns between the users. Each identification module is efficiently designed to handle the characteristics of user data like much noise in SNS texts and missing signals in GPS data. In experiments to evaluate the proposed system, our system shows its superiority against ordinary identification methods. This result means that the proposed system can efficiently reflect the characteristics of user data.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Design and Implementation of an In-Memory File System Cache with Selective Compression (대용량 파일시스템을 위한 선택적 압축을 지원하는 인-메모리 캐시의 설계와 구현)

  • Choe, Hyeongwon;Seo, Euiseong
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.658-667
    • /
    • 2017
  • The demand for large-scale storage systems has continued to grow due to the emergence of multimedia, social-network, and big-data services. In order to improve the response time and reduce the load of such large-scale storage systems, DRAM-based in-memory cache systems are becoming popular. However, the high cost of DRAM severely restricts their capacity. While the method of compressing cache entries has been proposed to deal with the capacity limitation issue, compression and decompression, which are technically difficult to parallelize, induce significant processing overhead and in turn retard the response time. A selective compression scheme is proposed in this paper for in-memory file system caches that rapidly estimates the compression ratio of incoming cache entries with their Shannon entropies and compresses cache entries with low compression ratio. In addition, a description is provided of the design and implementation of an in-kernel in-memory file system cache with the proposed selective compression scheme. The evaluation showed that the proposed scheme reduced the execution time of benchmarks by approximately 18% in comparison to the conventional non-compressing in-memory cache scheme. It also provided a cache hit ratio similar to the all-compressing counterpart and reduced 7.5% of the execution time by reducing the compression overhead. In addition, it was shown that the selective compression scheme can reduce the CPU time used for compression by 28% compared to the case of the all-compressing scheme.

Development of the Small Scale Testbed for Running Dynamic Characteristics Analysis of the Capsule Train (캡슐트레인 주행 동특성 분석을 위한 축소 시험장치의 개발)

  • Lee, Jin-Ho;You, Won-Hee;Lee, Kwansup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.643-651
    • /
    • 2020
  • A capsule train runs inside a sub-vacuum tube and can reach very high speed due to the low air resistance. A capsule train uses a superconducting electrodynamic suspension (SC-EDS) method for levitation, which allows for a large levitation gap and does not require gap control. However, SC-EDS has inherent characteristics such as the large gap variation and a small damping effect in the levitation force, which can degrade the running stability and ride comfort. To overcome this, a stability improvement device should be designed and applied based on dynamic analysis. In this study, a 1/10 small-scale testbed was developed to replicate the dynamic characteristics of a capsule train and investigate the performance of stability improvement devices. The testbed is composed of a 6-degree-of-freedom Stewart platform for the realization of bogie motion, a secondary suspension with a running stabilization device, and a carbody. Based on the dynamic similarity law proposed by Jaschinski, the small-scale testbed was manufactured, and a bogie motion algorithm was applied with the consideration of guideway irregularity and levitation stiffness. The experimental results from the testbed were compared with simulation results to investigate the performance of the testbed.