• Title/Summary/Keyword: 행위 기반 제어

Search Result 118, Processing Time 0.029 seconds

Implementation of Indoor Environment Monitoring and Automatic Control System based on Internet of Things (사물인터넷 기반 실내 환경 모니터링 및 자동제어 시스템 구현)

  • Lee, Sang Hoon;Kim, Jin-Yeop;Kim, Su-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.71-80
    • /
    • 2016
  • Along with the increase in the standard of living, the interest and awareness level of the public about environmental issues have also gradually increased. Recently, time spent on indoor activities have increased and the need for awareness and demand on methods in improving the quality of an indoor environment has been recognized. The purpose of this study is to sense the environment information through real-time monitoring of the room environment by using the IoT based technology and to maintain and improve the indoor environment to an appropriate level through the developed interlocking controller device. This provides an automatic control system in improving the indoor environment at home and other small areas like general offices in place of the traditional passive interior environmental improvement actions or large-scale facility control system. A status analysis with the relative reference values of the air quality and CO2, temperature and humidity and illumination and noise was applied through transmitting a control signal to automatic control module in accordance with the nine indoor environment standards set to improve the indoor environment.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

A Detection Mechanism of Portscan Attacks based on Fuzzy Logic for an Abnormal Traffic Control Framework (비정상 트래픽 제어 프레임워크를 위한 퍼지로직 기반의 포트스캔 공격 탐지기법)

  • Kim, Jae-Kwang;Kim, Ka-Eul;Ko, Kwang-Sun;Kang, Yong-Hyeog;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1185-1188
    • /
    • 2005
  • 비정상 행위에 대한 true/false 방식의 공격 탐지 및 대응방법은 높은 오탐지율(false-positive)을 나타내기 때문에 이를 대체할 새로운 공격 탐지방법과 공격 대응방법이 연구되고 있다. 대표적인 연구로는 트래픽 제어 기술을 이용한 단계적 대응방법으로, 이 기술은 비정상 트래픽에 대해 단계적으로 대응함으로써 공격의 오탐지로 인하여 정상 서비스를 이용하는 트래픽이 차단되지 않도록 하는 기술이다. 비정상 트래픽 중 포트스캔 공격은 네트워크 기반 공격을 위해 공격대상 호스트의 서비스 포트를 찾아내는 공격으로 이 공격을 탐지하기 위해서는 일정 시간동안 특정 호스트의 특정 포트에 보내지는 패킷 수를 모니터링 하여 임계치와 비교하는 방식의 true/false 방식의 공격 탐지방법이 주로 사용되었다. 비정상 트래픽 제어 프레임워크(Abnormal Traffic Control Framework)는 true/false 방식의 공격 탐지방법을 이용하여 공격이 탐지되었을 때, 처음에는 트래픽 제어로 대응하고 같은 공격이 재차 탐지되었을때, 차단하여 기존의 true-false 방식의 공격 탐지 및 대응방법이 가지는 높은 오탐지율을 낮춘다. 하지만 포트스캔 공격의 특성상, 공격이 탐지된 후 바로 차단하지 못하였을 경우, 이미 공격자가 원하는 모든 정보를 유출하게 되는 문제가 있다. 본 논문에서는 기존의 True/False 방식의 포트스캔 공격 탐지방법에 퍼지 로직 개념을 추가하여 공격 탐지의 정확성을 높이고 기존의 탐지방법을 이용하였을 때보다 신속한 트래픽 제어 및 차단을 할 수 있는 방법을 제안한다.

  • PDF

SC/ACSR: combining ACSR and Statechart for formal Specification (SC/ACSR : ACSR과 Statechart를 조합한 정형 명세)

  • Hwang, Dae-Yon;Kim, Jin-Hyun;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.214-216
    • /
    • 2011
  • Statechart는 상태 기계를 기반으로 하는 정형 명세 언어로 반응형 시스템의 행위를 상태와 그 상태에서 받는 이벤트에 의한 전이로 표현한다. 프로세스 알제브라의 한 종류인 ACSR은 이벤트 기반으로 프로세스들 간의 통신과 프로세스의 우선 순위, 자원 소모 등의 표현 이 용이한 정형 명세 언어이다. 본 논문에서는 서로 다른 관점의 명세를 하는 이 두 가지 언어가 서로를 보완하여 ACSR을 이용하여 Statechart의 공유 자원에 대한 사용과 제어를 표현하여 보다 시스템을 정확하게 명세할 수 있는 언어를 제시한다. 이를 위해 두 언어의 연결을 위한 정형적 문법과 의미를 제시한다.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

An Efficient Smart Indoor Emotional Lighting Control System based on Android Platform using Biological Signal (생체신호를 이용한 안드로이드 플랫폼 기반의 효율적인 스마트 실내 감성조명 제어 시스템)

  • Yun, Su-Jeong;Hong, Sung-IL;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.199-207
    • /
    • 2016
  • In this paper, we propose efficient smart indoor emotional lighting control system based on android platform using the biological signal. The proposed smart indoor smart emotional lighting control system were configured as the biological signal measurement device and removable smart wall pad, lighting driver, luminaire. The control system was extracts the emotional language by measured the biological signal, and it was transmitted a control signal to each lighting driver using a bluetooth in the wall pad. The lighting driver were designed to control the lighting device through an expansion board by collected control signal and the illuminance information the surrounding. In this case, the wall pad can be selecting of manual control and the bio signal mode by that indoor emotional lighting control algorithms, and it was implemented the control program that possible to partial control by selecting the wanted light. Experiment results of the proposed smart indoor emotional lighting control system, it were possible to the optional control about the luminaire of required area, and the manual control by to adjustable of color temperature with that the efficiently adjustable of lighting by to biological signal and emotional language. Therefore, were possible to effective control for improvement of concentration and business capability of indoor space business conduct by controlling the color and brightness that is appropriate for your situation. And, was reduced power consumption and dimmer voltage, lighting-current than the existing-emotional lighting control system.

On the Development of Agent-Based Online Game Characters (에이전트 기반 지능형 게임 캐릭터 구현에 관한 연구)

  • 이재호;박인준
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.379-384
    • /
    • 2002
  • 개발적인 측면에서 온라인 게임 환경에서의 NPC(Non Playable Character)들은 환경인식능력, 이동능력, 특수 능력 및 아이템의 소유 배분 등을 원활히 하기 위한 능력들을 소유해야 하며, 게임 환경을 인식, 저장하기 위한 데이터구조와 자신만의 독특한 임무(mission)를 달성하기 위한 계획을 갖고 행위를 해야 한다. 이런 의미에서 NPC는 자신만의 고유한 규칙과 행동 패턴, 그리고 목표(Goal)와 이를 실행하기 위한 계획(plan)을 소유하는 에이전트로 인식되어야 할 것이다. 그러나, 기존 게임의 NPC 제어 구조나 구현 방법은 이러한 요구조건에 부합되지 못한 부분이 많았다. C/C++ 같은 컴퓨터 언어들을 이용한 구현은 NPC의 유연성이나, 행위에 많은 문제점이 있었다. 이들 언어의 switch 문법은 NPC의 몇몇 특정 상태를 묘사하고, 그에 대한 행위를 지정하는 방법으로 사용되었으나, 게임 환경이 복잡해지면서, 더욱더 방대한 코드를 만들어야 했고, 해석하는데 많은 어려움을 주었으며, 동일한 NPC에 다른 행동패턴을 적용시키기도 어려웠다. 또한, 대부분의 제어권을 게임 서버 폭에서 도맡아 함으로써, 서버측에 많은 과부하 요인이 되기도 하였다. 이러한 어려움을 제거하기 위해서 게임 스크립트를 사용하기도 하였지만, 그 또한 단순 반복적인 패턴에 사용되거나, 캐릭터의 속성적인 측면만을 기술 할 수 있을 뿐이었다 이러한 어려움을 해소하기 위해서는 NPC들의 작업에 필요한 지식의 계층적 분화를 해야 하고, 현재 상황과 목표 변화에 적합한 반응을 표현할 수 있는 스크립트의 개발이 필수 적이라 할 수 있다 또한 스크립트의 실행도 게임 서버 측이 아닌 클라이언트 측에서 수행됨으로써, 서버에 걸리는 많은 부하를 줄일 수 있어야 할 것이다. 본 논문에서는, 대표적인 반응형 에이전트 시스템인 UMPRS/JAM을 이용하여, 에이전트 기반의 게임 캐릭터 구현 방법론에 대해 알아본다.퓨터 부품조립을 사용해서 Template-based reasoning 예를 보인다 본 방법론은 검색노력을 줄이고, 검색에 있어 Feasibility와 Admissibility를 보장한다.매김할 수 있는 중요한 계기가 될 것이다.재무/비재무적 지표를 고려한 인공신경망기법의 예측적중률이 높은 것으로 나타났다. 즉, 로지스틱회귀 분석의 재무적 지표모형은 훈련, 시험용이 84.45%, 85.10%인 반면, 재무/비재무적 지표모형은 84.45%, 85.08%로서 거의 동일한 예측적중률을 가졌으나 인공신경망기법 분석에서는 재무적 지표모형이 92.23%, 85.10%인 반면, 재무/비재무적 지표모형에서는 91.12%, 88.06%로서 향상된 예측적중률을 나타내었다.ting LMS according to increasing the step-size parameter $\mu$ in the experimentally computed. learning curve. Also we find that convergence speed of proposed algorithm is increased by (B+1) time proportional to B which B is the number of recycled data buffer without complexity of computation. Adaptive transversal filter with proposed data recycling buffer algorithm could efficiently reject ISI of channel and increase speed of convergence in avoidance burden of computational complexity in reality when it was experimented having

  • PDF

A Cyber-Microcosm Ontology for Efficient Process of Procedural Parts in the Virtual World (가상세계에서 절차적 부분의 효율적 처리를 위한 Cyber-Microcosm Ontology)

  • Noh, Sun-Mi;Park, Jong-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.564-569
    • /
    • 2004
  • Most existing ontologies are suited for static knowledge, so they lack capability of representing procedural knowledge which is essential for an agent's action control or inference in the virtual world. Also they are not prepared to describe objects beyond their fixed ranges of domains as designed. In this paper we propose cyber-microcosm ontology (CMO) which augments procedural aspects and expressive power for multiple forms rather than fixed form as in conventional ontologies. The resulting ontology will provide an enhanced knowledge structure to capture procedural aspects of agents' actions and to facilitate their associated inferencing. The procedural aspects of the CMO are designed based on action frame formed according to diverse elements. They are elaborated in terms of various qualifiers and quantifiers to reflect statistical natures over time and instances.

  • PDF

Design and Implementation of Differencing and Merging Scheme for Cooperative Version Control System (협동 버전제어 시스템을 위한 버전충돌 인지 및 버전병합 기능의 설계와 구현)

  • Lee, Byong-Gul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.126-134
    • /
    • 2000
  • Version control is an application to maintain consistency between different instances of the same document allowing operations such as navigation, differencing, and merging. Most version control systems, however, lack the support of functionality for cooperative writing environment, such as to represent and store the history of the actions of different individuals, to effectively differentiate and merge the individual actions including the text object, and to manage different access privileges for different granularity and individuals. With the help of Activity IDentification (AID) tag and its unique addressing scheme proposed in this paper, differencing and merging become simple and effective. Access and role control is improved by associating the access right table and role assignment in AID scheme also eliminates the requirements for large storage capacity for version information maintenance.

  • PDF