• Title/Summary/Keyword: Centralized Monitoring

Search Result 86, Processing Time 0.03 seconds

A Reflectornet Based on Software Defined Network (소프트웨어 정의 네트워크 기반 리플렉터넷)

  • Park, Taejune;Lee, Seungsoo;Shin, Seoungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.397-405
    • /
    • 2014
  • Software-Defined Networking (SDN), which separates the control plane from the data plane and manages data planes in a centralized way, is now considered as a future networking technology, and many researchers and practitioners have dived into this area to devise new network applications, such new routing methods. Likewise, network security applications could be redesigned with SDN, and some pioneers have proposed several interesting network security applications with SDN. However, most approaches have just reimplemented some well-known network security applications, although SDN provides many interesting features, They didn't effectively use them. To investigate if we can use SDN in realizing sophisticated network security applications, we have designed and implemented an advanced network security application, Reflectornet, which redirects malicious or suspicious network trials to other security monitoring points (e.g., honeypot). In addition, we have tested its performance and practicability in diverse angles. Our findings and some insights will encourage other researchers to design better or intelligent network security applications with SDN.

Spatial Variability of Soil Moisture and Irrigation Scheduling for Upland Farming (노지 작물의 적정 관개계획을 위한 토양수분의 공간변이성 분석)

  • Choi, Yonghun;Kim, Minyoung;Kim, Youngjin;Jeon, Jonggil;Seo, Myungchul
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.5
    • /
    • pp.81-90
    • /
    • 2016
  • Due to droughts and water shortages causing severe damage to crops and other vegetations, much attention has been given to efficient irrigation for upland farming. However, little information has been known to measure soil moisture levels in a field scale and apply their spatial variability for proper irrigation scheduling. This study aimed to characterize the spatial variability and temporal stability of soil water contents at depths of 10 cm, 20 cm and 30 cm on flat (loamy soil) and hill-slope fields (silt-loamy soil). Field monitoring of soil moisture contents was used for variogram analysis using GS+ software. Kriging produced from the structural parameters of variogram was applied for the means of spatial prediction. The overall results showed that the surface soil moisture presented a strong spatial dependence at the sampling time and space in the field scale. The coefficient variation (CV) of soil moisture was within 7.0~31.3 % in a flat field and 8.3~39.4 % in a hill-slope field, which was noticeable in the dry season rather than the rainy season. The drought assessment analysis showed that only one day (Dec. 21st) was determined as dry (20.4 % and 24.5 % for flat and hill-slope fields, respectively). In contrary to a hill-slope field where the full irrigation was necessary, the centralized irrigation scheme was appeared to be more effective for a flat field based on the spatial variability of soil moisture contents. The findings of this study clearly showed that the geostatistical analysis of soil moisture contents greatly contributes to proper irrigation scheduling for water-efficient irrigation with maximal crop productivity and environmental benefits.

Decision-making system for the resource forecasting and risk management using regression algorithms (회귀알고리즘을 이용한 자원예측 및 위험관리를 위한 의사결정 시스템)

  • Han, Hyung-Chul;Jung, Jae-Hun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.311-319
    • /
    • 2015
  • In this paper, in order to increase the production efficiency of the industrial plant, and predicts the resources of the manufacturing process, we have proposed a decision-making system for resource implementing the risk management effectively forecasting and risk management. A variety of information that occurs at each step efficiently difficult the creation of detailed process steps in the scenario you want to manage, is a frequent condition change of manufacturing facilities for the production of various products even within the same process. The data that is not contiguous products production cycle also not constant occurs, there is a problem that needs to check the variation in the small amount of data. In order to solve these problems, data centralized manufacturing processes, process resource prediction, risk prediction, through a process current status monitoring, must allow action immediately when a problem occurs. In this paper, the range of change in the design drawing, resource prediction, a process completion date using a regression algorithm to derive the formula, classification tree technique was proposed decision system in three stages through the boundary value analysis.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

An Enhanced Routing Protocol for Supporting Node Mobility in Multi-hop Ad-hoc Networks (다중 홉 Ad-hoc 네트워크에서 노드이동성을 고려한 라우팅 프로토콜에 관한 연구)

  • Kim, Kwan-Woong;Kim, Byun-Gon;Kim, Yong-Kab
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1665-1671
    • /
    • 2007
  • Mobile Ad hoc Networks (MANETs) refer to autonomous networks in which wireless data communications are established between multiple nodes in a given coverage area without a base station or centralized administration. Because of node mobility and limited battery life, the network topology may changes frequently. Selecting the most reliable path during route discovery process is important to improve performance in ad-hoc networks. In this study, we proposed an enhanced routing protocol based on AODV by monitoring variation of receiving signal strength. New metric function that consists of node mobility and hops of path is used for routing decision. From extensive experiments by using NS-2, The performance of the proposed routing scheme has been imp개ved by comparison to AODV protocol.

Distributed IoT Sensor based Laboratory Safety Management System (분산 IoT센서 기반 실험실 안전관리 시스템)

  • Jeong, Daejin;Kim, Jaeyoon;Bae, Sangjung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.90-96
    • /
    • 2019
  • Storage cabinet in a lab in these days measures various environmental factors in real-time with IoT sensors. Preexisting system collects sensor data, analyze a risk and then command other equipment. Such centralized control system tends to have an issue with of speed slowing down. It's because when there are more storage cabinets, there are more data to process. In order to solve this issue, this report addresses decentralized IoT sensor based lab safety control system. It can analyze internal state of storage cabinet to identify any hazardous situations and effectively control them. Such decentralized control system using sensor modules for internal environment of the cabinet storage and automated control algorithm based on administrator's log history can manage any hazardous situations by automated control of environment factors of inside a lab. It would allow users to deal with a hazard if it happens. Even better, it can prevent it to happen from the beginning.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

A Study on the Role of Private-led Information Provision: Case of COVID-19 Pandemic (코로나19 팬데믹 상황에서 살펴본 민간 주도 정보제공의 역할 분석)

  • Cho, Hosoo;Jang, Moonkyoung;Ryu, Min Ho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • With the global pandemic of COVID-19, it is pointed out that exposure to false information to the public could cause serious problems. However, in pandemic situations, there is also an positive effect for the public to share private-led information rather than centralized unilateral delivery of information. This study analyzes the role of private-led information provision in infectious disease situations. To this end, topic modeling and sentiment analysis is carried out on online reviews of all COVID-19-related applications in Google Playstore provided by the Korean government and the private. The results showed that the user's evaluation of private apps, which were used from the early stage of COVID-19, was much higher than the apps provided by the government. In particular, users responded more positively to private apps than government apps in all aspects such as reliability of information, risk avoidance, timeliness, usefulness, and stability. Based on these results, a post-monitoring system is recommended rather than a pre-block of all private apps.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

CCTV-Aided Accident Detection System on Four Lane Highway with Calogero-Moser System (칼로게로 모제 시스템을 활용한 4차선 도로의 사고검지 폐쇄회로 카메라 시스템)

  • Lee, In Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.255-263
    • /
    • 2014
  • Today, a number of CCTV on the highway is to observe the flow of traffics. There have been a number of studies where traffic data (e.g., the speed of vehicles and the amount of traffic on the road) are transferred back to the centralized server so that an appropriate action can be taken. This paper introduces a system that detects the changes of traffic flows caused by an accident or unexpected stopping (i.e., vehicle remains idle) by monitoring each lane separately. The traffic flows of each lane are level spacing curve that shows Wigner distribution for location vector. Applying calogero-moser system and Hamiltonian system, probability equation for each level-spacing curve is derived. The high level of modification of the signal means that the lane is in accident situation. This is different from previous studies in that it does more than looking for the signal from only one lane, now it is able to detect an accident in entire flow of traffic. In process of monitoring traffic flow of each lane, when camera recognizes a shadow of vehicle as a vehicle, it will affect the accident detecting capability. To prevent this from happening, the study introduces how to get rid of such shadow. The system using Basian network method is being compared for capability evaluation of the system of the study. As a result, the system of the study appeared to be better in performance in detecting the modification of traffic flow caused by idle vehicle.