• Title/Summary/Keyword: Compound flooding simulation

Search Result 4, Processing Time 0.016 seconds

Simulation of compound flooding using TUFLOW's 1D-2D coupling features (TUFLOW의 1-2차원 연계 기능을 활용한 복합 침수 모의)

  • Hwang, Donggyu;Kang, Teauk;Jin, Yongkyu;Lee, Sangho
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.7
    • /
    • pp.451-460
    • /
    • 2024
  • It is necessary to apply a rational urban flood simulation method to analyze the causes of frequent urban flooding and to develop appropriate countermeasures. Previous studies in Korea have performed flood simulations by inputting the results of manhole overflow from sewer systems and river overflow into two-dimensional flood flow simulation models. It, however, is reasonable to simulate flooding from river and manhole overflows in a complex manner. In this study, we used the 1D-2D coupling functionality of the TUFLOW module, which is a part of XP-SWMM, to simulate the compound flooding of rivers and urban areas. That method was applied to the lower basin of the Naengcheon River in Pohang City, Gyeongsangbuk-do, where both inland flooding and river overflow coincided due to Typhoon Hinnamnor on September 5 and 6, 2022, to verify its applicability.

Knowledge-based Modeling for System Security (시스템 보안을 위한 지식기반 모델링)

  • 서희석;김희원
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.491-500
    • /
    • 2003
  • The need for network security is being increasing due to the development of information communication and internet technology, In this paper, firewall models, operating system models and other network component models are constructed. Each model Is defined by basic or compound model using MODSIM III. In this simulation environment with representative attacks, the following attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service. The simulation is performed with the models that exploited various security policies against these attacks. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Simulation of Network Security with Packet Filtering System (패킷 필터링을 사용한 네트워크 보안 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.231-237
    • /
    • 2002
  • 네트워크 보안은 정보통신 및 인터넷 기술이 발전함에 따라 그 중요성과 필요성이 더욱 절실해지고 있다. 본 연구에서는 네트워크 보안의 대표적인 침입 차단 시스템의 패킷 필터 및 네트워크 구성요소들을 모델링하였다. 각 모델은 DEVS 모델을 참조한 MODSIM III 기반의 기본 모델(Basic Model)과 결합 모델(Compound Model)의 두 가지 유형으로 정의하였다. 기본 모델은 독립적인 기능을 수행하는 단위 모델을 표현하고, 결합 모델은 여러 개의 모델이 연동되어 상위 레벨의 시스템을 표현한다. 시뮬레이션을 위한 모델링과 그래픽 기능이 강력한 MODSIM III를 기반으로 모델들을 비롯한 시뮬레이션 환경을 구현하였다. 대상 네트워크 환경에서 사용한 공격은 서비스 기부 공격 형태인 SYN flooding 공격과 Smurf 공격을 발생하였다. 이 공격들에 대하여, 패킷 필터 모델에 다양한 보안 정책을 적용하여 시뮬레이션을 실행하였다. 본 연구에서의 시뮬레이션을 통하여, 과거의 단순 패킷 필터링에서 진일보한 Stateful Inspection의 우수한 보안 성능과, 보안 정책의 강도를 점점 높였을 때 보안 성능이 향상되는 점을 검증하였다.

  • PDF

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF