• Title/Summary/Keyword: Backup System

Search Result 314, Processing Time 0.026 seconds

A Study on Voice Communication Quality Improvement of Intercom System for KUH (한국형 기동헬기 내부통화장치의 통화품질 향상에 관한 연구)

  • Kim, Young Mok;Chang, Joong Jin;Jun, Byung Kyu;Kim, Chang Young;Jeong, Jin Woong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.12
    • /
    • pp.1002-1010
    • /
    • 2013
  • Intercom System(ICS) of Korean Utility Helicopter(KUH) is an essential equipment for pilot to perform flight mission and it consists of communication system of KUH with VHF-FM radio set and U/VHF-AM radio set. It provides pilots and crews with internal communication, external communication and audible alarm. It has function of controlling volume and selecting two communication modes, normal mode and backup mode. This paper summarizes pilot comments in flight test which are classified by cause of occurrence and the troubleshooting process about each comment. It also describes design improvements which was derived from troubleshooting and suggests verification results of flight test.

Implementation of Matrix Receiving Structure for Versatile Multi-Mission LEO Operations (저궤도 다중위성 운용을 위한 매트릭스 구조의 수신 채널 구현)

  • Park, Durk-Jong;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.1001-1007
    • /
    • 2013
  • In the case of multi-mission LEO(Low Earth Orbit) operations, depending on the orbit of each satellite, one ground site is supposed to be communicated with more than two satellites at the same time. On top of that, image data processing system is generally mission-specific and 1:1 backup configuration. For the reason, if ground site has smaller number of antenna than that of satellite, interface with image data processing system would be very complicated. In this paper, considering that two LEO satellites can be operating and image data recording unit in redundancy can be easily plug-in, the implementation of matrix receiving structure is described. This matrix receiving structure has been validated from KOMPSAT-2 and -3(KOrea Multi-Purpose SATellite-2 and -3) since KOMPSAT-3 was launched in May, 2012. This structure will be applied for the KOMPSAT-3A and -5 through its expandability.

Design and Implementation of a Cloud-Based Recovery System against Ransomware Attacks (클라우드 기반 랜섬웨어 복구 시스템 설계 및 구현)

  • Ha, Sagnmin;Kim, Taehoon;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.521-530
    • /
    • 2017
  • In this paper, we propose a protection solution against intelligent Ransomware attacks by encrypting not only source files but also backup files of external storage. The system is designed to automatically back up to the cloud server at the time of file creation to perform monitoring and blocking in case a specific process affects the original file. When client creates or saves a file, both process identifiers, parent process identifiers, and executable file hash values are compared and protected by the whitelist. The file format that is changed by another process is monitored and blocked to prevent from suspicious behavior. By applying the system proposed in this paper, it is possible to protect against damage caused by the modification or deletion of files by Ransomware.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

The Communication protocol proposal at Ad-hoc for Water-Treatment (수처리 계측제어망 Ad-hoc 적용시 데이터 신뢰성 확보를 위한 통신 프로토콜 제안)

  • Yu, Chool;Seo, Gang do;Choi, Hong yeol;Hong, Sung taek;Ji, Yu chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.984-987
    • /
    • 2013
  • In concept, such as the backup of wired network and disaster prevention network of water treatment measurement and control system, reliability and security of high level of sending and receiving data between the nodes must be ensured in Ad-hoc network construction. Rather than apply the common communication protocols of Ad-hoc network construction during the FA network of closed water treatment facility with the facility of a certain scale is concentrated contrast, and high characteristics of the water treatment system infrastructure, public facilities We have developed a specific protocol another that applies the OTP of communication frame of process control commands and H-ARQ with ZRP by applying the flexibility to time constraints such as precision industrial plants to ensure the safety and property of facility operation.

  • PDF

A Study on the Election of Cluster Alternative node for Energy-Efficient in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 클러스터의 대체노드 선출 방법에 관한 연구)

  • Oh, Young-Jun;Lee, Knag-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.233-241
    • /
    • 2013
  • One fundamental issue in ad hoc networks is the alternative node election problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we proposed EEAP(Energy-Efficient Alternative Paths). This is a method of selecting an alternative node for path routing management. When some node disconnection on the path routing, using pre-selected backup node provides immediately recover the path recovery. When selecting an alternative node of Step-Parents head node on the path management, the node's energy level and distance information are cared in context-awareness. This is not only increased the system's capacity cost effectively, but also reduce transmission power entire nodes consume energy. As a result, each node could efficiently management and improves the life time for mobile host and extends system coverage.

An Implementation of Fault Tolerant Software Distributed Shared Memory with Remote Logging (원격 로깅 기법을 이용하는 고장 허용 소프트웨어 분산공유메모리 시스템의 구현)

  • 박소연;김영재;맹승렬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.328-334
    • /
    • 2004
  • Recently, Software DSMs continue to improve its performance and scalability As Software DSMs become attractive on larger clusters, the focus of attention is likely to move toward improving the reliability of a system. A popular approach to tolerate failures is message logging with checkpointing, and so many log-based rollback recovery schemes have been proposed. In this work, we propose a remote logging scheme which uses the volatile memory of a remote node assigned to each node. As our remote logging does not incur frequent disk accesses during failure-free execution, its logging overhead is not significant especially over high-speed communication network. The remote logging tolerates multiple failures if the backup nodes of failed nodes are alive. It makes the reliability of DSMs grow much higher. We have designed and implemented the FT-KDSM(Fault Tolerant KAIST DSM) with the remote logging and showed the logging overhead and the recovery time.

A Study on Acquisition of Overhead Line Location Information of Pantograph for E-Highway (E-Highway를 위한 팬터그래프의 가공선 위치정보 취득에 관한 연구)

  • Gwang-Cheol Song;Jun-Jae An;Tuan-Vu Le;Seong-Mi Park;Sung-Jun Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.5
    • /
    • pp.915-923
    • /
    • 2023
  • As environmental regulations on carbon emissions are strengthened worldwide, the existing internal combustion engine-centered automobile industry is being reformed. In particular, large buses and large cargo trucks are pointed out as one of the main causes of environmental destruction due to excessive carbon emissions. The E-Highway power collection system, which has recently been proposed as a solution, uses the vehicle's battery as a backup power source or regenerative braking, depending on whether the pan head of the pentograph installed in the vehicle is in contact with the overhead line. It is used to store the excess energy generated. However, wear through contact due to continuous contact reduces the current collection effect and causes failure. In this paper, by using the current difference, the horizontal position information of the panhead in contact with the overhead line is acquired, thereby reducing the abrasion of the conductor and the panhead Make it possible to follow the overhead line. The position estimation method proposed in this paper simply configures a device that can detect the position of the overhead line of the pantograph by the difference in resistance. It is economical and has the advantage of reducing the volume. The characteristics of the pantograph estimating the location of overhead lines were analyzed using the difference between the two currents of the current collector, the feasibility of the positioning estimation system was verified through simulations and experiments.