• Title/Summary/Keyword: 통합감시시스템

Search Result 357, Processing Time 0.029 seconds

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

Traffic Management Scheme for Supporting QoS of VBR/ABR Services in ATM Switching Systems (ATM 스위칭 시스템의 VBR/ABR 서비스 품질 지원을 위한 트랙픽 관리 기법)

  • 유인태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1160-1168
    • /
    • 2000
  • This paper presents a real-time integrated traffic management (RITM) scheme that can effectively manage variable bit rate (VBR) and available bit rate (ABR) traffics having unpredictable characteristics in asynchronous transfer mode (ATM) networks. An unique feature of this scheme is that it has a special ATM cell control block which makes it possible to monitor bursty traffics in real-time so that the delay incurred to measure cell arrival rate is minimized. Additionally, the proposed scheme intends to dynamically reassign the leftover network resources to VBR/ABR connections without any deterioration in quality of service (QoS) of the existing connections. The RITM scheme has been verified to reliably monitor incoming traffics and to efficiently manage network resources by computer simulations. The capability of managing the incoming ATM traffics in real-time helps determine an optimal acceptable number of user connections for a given network condition. We can use this value as a threshold to protect the network from being congested and to find out a cost-effective buffer design method.

  • PDF

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Development of GIS based Water Quality Simulation System for Han River and Kyeonggi Bay Area (한강과 경기만 지역 GIS 기반 통합수질모의 시스템 개발)

  • Lee, Chol-Young;Kim, Kye-Hyun
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.77-88
    • /
    • 2008
  • There has been growing demands to manage the water quality of west coastal region due to the large scale urbanization along the coastal zone, the possibility of application of TMDL(Total Maximum Daily Loadings) to Han river, and the natural disaster such as oil spill incident in Taean, Chungnam. However, no system has been developed for such purposes. In this background, the demand of GIS based effective water quality management has been increased to monitor water quality environment and propose best management alternatives for Han river and Kyeonggi bay. This study mainly focused on the development of integrated water quality management system for Han river bas in and its estuary are a connected to Kyeonggi bay to support integrated water quality management and its plan. Integration was made based on GIS by spatial linking between water quality attributes and location information. A GIS DB was built to estimate the amount of generated and discharged water pollutants according to TMDL technical guide and it included input data to use two different water quality models--W ASP7 for Han river and EFDC for coastal area--to forecast water quality and to suggest BMP(Best management Practices). The results of BOD, TN, and TP from WASP7 were used as the input to run EFDC. Based on the study results, some critical areas which have relatively higher pollutant loadings were identified, and it was also identified that the locations discharging water pollutant loadings to river and seasonal factor affected water quality. And the relationship of water quality between river and its estuary area was quantitatively verified. The results showed that GIS based integrated system could be used as a tool for estimating status-quo of water quality and proposing economically effective BMPs to mitigate water pollution. Further studies need to be made for improving system's capabilities such as adding decision making function as well as cost-benefit analysis, etc. Also, the concrete methodology for water quality management using the system need to be developed.

  • PDF

Implementation and Test of DGPS Integrity Monitoring System (DGPS 측정치 무결성 감시 시스템 구현 및 시험)

  • Yun, Youngsun;Park, Sungmin;Kee, Changdon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.2
    • /
    • pp.104-112
    • /
    • 2002
  • Nowadays, many countries are interested in using CPS far navigation system of aircrafts, because it has technical and economic benefits. For the CPS based navigation system, the most important thing is reliability of the system. GPS navigation solution is very accurate. But when some faults are raised in the CPS navigation system of an aircraft, if they cannot be detected and alerts are not generated for pilots, the aircraft cannot be safe. So, I implemented an DGPS integrity monitoring system that detects faults of measurements and exclude the fault measurement from the satellite constellation used for calculating a navigation solution. This paper introduces 'the Least Square Residual Method' used to detect faults of measurements and the implemented real time integrity monitoring system using DGPS. To test the system, I operated the system under many different conditions. And from analysis of the data recorded, I could conclude that when the number of visible satellites was enough to detect faults, the system could detect the faults of measurements perfectly, isolate and exclude the fault measurement well. But for more reliable system, the measurement errors must be estimated more accurately and integrations of CPS and other instruments must be developed.

  • PDF

A Study on Workers' Risk-Aware Smart Bands System in Explosive Areas (폭발위험지역 근로자 위험 인지형 스마트밴드시스템에 대한 연구)

  • Lee, Byong-Kwon
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.73-79
    • /
    • 2019
  • Research is underway on services and systems that provide real-time alerts for suffocating gases and potentially explosive materials, but currently smart bend type services are lacking. This study supports real-time identification of explosion hazards due to static electricity in the workplace and immediate elimination of accident occurrence factors, real-time monitoring of worker status and workplace hazards (oxygen, hazardous chemical concentration), and immediate warning and data in case of danger. We propose a method of establishing an accident prevention system through analysis. In this way, various accidents that may occur in industrial sites are monitored using IoT-based intelligent sensor nodes, wireless network technology, data processing middleware, and integrated control system, and real-time risk information at the industrial sites is prevented and accidents are prevented. By supporting a safe working environment, the company can significantly reduce costs compared to post-procurement costs.

Introduction of the Global Geodetic Observing System (지구측지관측시스템(GGOS) 연구동향)

  • Shin, Young-Hong;Park, Jong-Uk;Seo, Ki-Weon
    • Journal of the Korean earth science society
    • /
    • v.30 no.3
    • /
    • pp.381-397
    • /
    • 2009
  • The Modem Geodesy monitors physical and geometrical shape and motion of the Earth and, more importantly, its temporal variations with unprecedented precision. It provides accurate and stable reference frames for Earth observations in the Space era. Furthermore, with an aid of interdisciplinary approaches, it also traces the causes of the variations in shape and motion of the Earth and eventually contributes to a better understanding of the Earth system. The International Association of Geodesy (IAG) has established the Global Geodetic Observing System (GGOS) to integrate the multitude of geodetic tools and tried to contribute to the management of global environmental changes as a partner of the Global Earth Observation System of Systems (GEOSS). Here we introduce the contribution of geodesy to the various fields of Earth Science by focusing on GGOS and encourage interdisciplinary researches.

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF

An Study on Effective Maintenance and Operation System of Fiber Optic Lines (효과적인 광선로 유지 보수를 위한 시스템 개발에 관한 연구)

  • Jang, Eun-Sang;Park, Kap-Seok;Kim, Seong-Il;Choi, Sin-Ho;Lee, Byeong-Wook
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.54-57
    • /
    • 1998
  • As the physical layer on telecommunication network is replaced fiber optic lines, it is increased the need of systematic maintenance for fiber optic lines. Korea Telecom has developed FLOMS in order to establish maintenance processes for optical fiber lines. FLOMS has functions which manages optical facilities and tests optical fiber lines automatically. As a resuls, this system can check and/or report a fault. Operator, who is reponsible for management of optical fiber lines, can test the characteristics of optical fiber lines remotely using FLOMS. As interpoerable with Digital Transmission Management System, FLOMS provides efficient management for optical fiber lines. This system improves the work process to find fault location fast, detect the degradation of fiber quality, and make database of optical facilities efficiently.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF