• Title/Summary/Keyword: 지능화 방안

Search Result 218, Processing Time 0.021 seconds

Design of Communication Protocol for Developing WISDOM(Wireless Interface Signal Control System for Dynamic and Optimal Management) (WISDOM(차세대 신호제어시스템) 개발을 위한 통신 프로토콜 설계)

  • Jung, Sung-Dae;Lee, Sang-Sun;Yoon, Young-Bum;Kim, Jong-Bok;Moon, Young-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.92-100
    • /
    • 2008
  • The existing transportation systems is emerged as a major obstacle to solve the problems such as a traffic jam and the increasing cost for a distribution and a traffic safety. In hun, ITS targeting intellectual vehicles and transportation infrastructure like road and signals is getting more important and the standards of ITS wireless communication is also getting attention. New traffic control strategies are being developed to utilize real-time traffic information collected by detection method using ITS wireless technology. Especially, DSRC system is being expanded wit ETCS and the use of OBU is spreading. These infrastructures will have much influence on ITS industry and a profound study on the method of utilizing a present infrastructure is going on in various fields. The optimum traffic signal control system using quality real-time information through these infrastructure is under development and so is WISDOM. Accordingly, this paper proposes communication protocol utilizing DSRC to collect real-time traffic information in WISDOM.

  • PDF

Study on the Standardization of Management Form through Integrated Management of CCTV (CCTV 통합관리를 위한 관리대장 표준화 연구)

  • PARK, Jeong-Woo;LEE, Seong-Ho;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2016
  • Closed-circuit television(CCTV) is a facility that forms the backbone of the ubiquitous services provided by the Integrated Management Center of the Ministry of Land, Infrastructure and Transport and the Integrated Control Center of the Ministry of the Interior. However, it is installed and managed according to different laws, as it is operated and managed by each department. Moreover, because there are no regulatory grounds for unified management of CCTV, each municipality responsible for the actual management manages it based on the individual standards of each department. Thus, the purpose of this study is to develop a standardized management form to establish an integrated management plan. The author inspected the existing situation by examining the legal system and public data and through hands-on worker interviews, and discovered the managed element by reviewing the specifications of the bidding system. The management form for integrated management comprises the above requirements along with the management histories and linkage of intelligent facilities. A uniform management form for integrated management containing specifications of the CCTVs installed by various departments is created, and is easily searched for facilities to check requirements for joint use. The result of this study can contribute to building the database of facility management system for integrated management of facilities at the integrated management center as well as for a detailed simulation of the selection of location of CCTV depending on the CCTV's specifications.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

A Study on the Characteristics and Policy Demand of the Unmanned Vehicle Industry in Gyeonggi-do (경기도 무인이동체 산업 특성과 정책수요)

  • Kim, Myung Jin
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.24 no.3
    • /
    • pp.283-299
    • /
    • 2021
  • As the intelligent revolution triggered by digital technology, unmanned vehicles such as self-driving cars, robots, and drones appeared, which brought about innovative changes in the industry. Gyeonggi Local government has established both an ordinance and a basic plan regarding unmanned vehicles. It is time to prepare a data-based policy by understanding the current state of the unmanned vehicle industry in the province. As a result of the survey, the unmanned vehicle industry in Gyeonggi Province is 25% of the nationwide, and more than 88% is concentrated in the southern part of Gyeonggi Province. The land sector such as the robot and autonomous vehicles are focused on 71.4% and the aviation sector such as drones are 26.7%. However, unmanned vehicle companies in Gyeonggi-do are mostly small-sized businesses with less than 10 years of experience and are in the stage of introduction and growth level. They have a plan to improve technology through continuous R&D by hiring human resources. Therefore, Gyeonggi-do needs to consider policy support for sustainable growth of start-up and small enterprises and for fostering professional manpower and technical skills as well as for establishing an unmanned vehicle industry network to create, share, and spread knowledge.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

A Study on the Changes in Functions of Ship Officer and Manpower Training by the Introduction of Maritime Autonomous Surface Ships (자율운항선박 도입에 따른 해기사 직능 변화와 인력양성에 관한연구)

  • Lim, Sung-Ju;Shin, Yong-John
    • Journal of Navigation and Port Research
    • /
    • v.46 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • This study aims to investigate changes in the demand for ship officers in response to changes in the shipping industry environment in which Maritime Autonomous Surface Ships (MASS) emerge according to the application of the fourth industrial revolution technology to ships, and it looks into changes in the skill of ship officer. It also analyzes and proposes a plan for nurturing ship officers accordingly. As a result of the degree of recognition and AHP analysis, this study suggests that a new training system is required because the current training and education system may cover the job competencies of emergency response, caution and danger navigation, general sailing, cargo handling, seaworthiness maintenance, emergency response, and ship maintenance and management, but tasks such as remote control, monitoring diagnosis, device management capability, and big data analysis require competency for unmanned and shore-based control. By evaluating the importance of change factors in the duties of ship officers in Maritime Autonomous Surface Ships, this study provides information on ship officer educational institutions' response strategies for nurturing ship officers and prioritization of resource allocation, etc. The importance of these factors was compared and evaluated to suggest changes in the duties of ship officers and methods of nurturing ship officers according to the introduction of Maritime Autonomous Surface Ships. It is expected that the findings of this study will be meaningful as it systematically derives the duties and competency factors of ship officers of Maritime Autonomous Surface Ships from a practical point of view and analyzed the perception level of each relevant expert to diagnose expert-level responses to the introduction of Maritime Autonomous Surface Ships.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.