• Title/Summary/Keyword: Cyber Architecture

Search Result 159, Processing Time 0.026 seconds

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Studies on the role of the system administrator according to the changing IT environment (IT환경변화에 따른 시스템 관리자의 역할에 관한 연구)

  • Choi, Dae-young;Kim, Myung-su;Seo, Won-woo;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.264-266
    • /
    • 2014
  • The current is quickly changed to a simple structure in the existing system architecture is complex and diverse structures. Especially due to the new cyber threat is growing more and more system risks. And many kinds of system monitoring and analysis tools are released in order to minimize the risk, but there is a limit to such a system depends on the Partially automated tools. Therefore, to present the role of a system administrator for effectively managing the system for the new changing environment out of the frame of the old system in order to minimize the systemic risk management system in this study.

  • PDF

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure (전기자동차 충전 인프라에서의 보안위협 및 보안요구사항 분석)

  • Kang, Seong-Ku;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1027-1037
    • /
    • 2012
  • With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.

Use of Visual Digital Media to Develop Creativity: The Example of Video Games

  • V., Zabolotnyuk;S., Khrypko;I., Ostashchuk;D., Chornomordenko;A., Timchenko;T., Motruk;K., Pasko;O., Lobanchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.13-18
    • /
    • 2022
  • In the post-information era, most of technologies have a visual part, or at least some functions related to visualization. It is also one of the popular means of presenting materials in education area. However, despite its popularity, the impact of visualization on the effectiveness of learning still remains controversial. Even more controversial is its usefulness in developing creativity, which is one of the most important skills for today's employee. The authors considered the use of visualization as a tool for the development of children's creativity on the example of learning video games, in particular, ClassCraft to distinguish features that, from the point of view of psychology, may lead to developing creativity even being not useful for educational purposes. It is concluded that video games useful for learning may have features, that are inappropriate in formal educational context, but important to develop creative thinking.

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

A Customization Method for Mobile App.'s Performance Improvement (모바일 앱의 성능향상을 위한 커스터마이제이션 방안)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.208-213
    • /
    • 2016
  • In the fourth industrial revolution, customization is becoming a conversation topic in various domains. Industry 4.0 applies cyber-physical systems (CPS), the Internet of Things (IoT), and cloud computing to manufacturing businesses. One of the main phrases in Industry 4.0 is mass customization. Optimized products or services are developed and provided through customization. Therefore, the competitiveness of a product can be enhanced, and satisfaction is improved. In particular, as IoT technology spreads, customization is an essential aspect of smooth service connections between various devices or things. Customized services in mobile applications are assembled and operate in various mobile devices in the mobile environment. Therefore, this paper proposes a method for improving customized cloud server-based mobile architectures, processes, and metrics, and for measuring the performance improvement of the customized architectures operating in various mobile devices based on the Android or IOS platforms. We reduce the total time required for customization in half as a result of applying the proposed customized architectures, processes, and metrics in various devices.

A Detection Model using Labeling based on Inference and Unsupervised Learning Method (추론 및 비교사학습 기법 기반 레이블링을 적용한 탐지 모델)

  • Hong, Sung-Sam;Kim, Dong-Wook;Kim, Byungik;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.65-75
    • /
    • 2017
  • The Detection Model is the model to find the result of a certain purpose using artificial intelligent, data mining, intelligent algorithms In Cyber Security, it usually uses to detect intrusion, malwares, cyber incident, and attacks etc. There are an amount of unlabeled data that are collected in a real environment such as security data. Since the most of data are not defined the class labels, it is difficult to know type of data. Therefore, the label determination process is required to detect and analysis with accuracy. In this paper, we proposed a KDFL(K-means and D-S Fusion based Labeling) method using D-S inference and k-means(unsupervised) algorithms to decide label of data records by fusion, and a detection model architecture using a proposed labeling method. A proposed method has shown better performance on detection rate, accuracy, F1-measure index than other methods. In addition, since it has shown the improved results in error rate, we have verified good performance of our proposed method.

Investigation on the Flexural and Shear Behavior of Fiber Reinforced UHSC Members Reinforced with Stirrups (전단철근과 강섬유로 보강된 초고강도 콘크리트 부재의 휨 및 전단 거동에 관한 연구)

  • Yuh, Ok-Kyung;Ji, Kyu-Hyun;Bae, Baek-Il
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.7
    • /
    • pp.152-163
    • /
    • 2019
  • In this paper, effect of steel fiber inclusion, compressive strength of matrix, shear reinforcement and shear span to depth ratio on the flexural behavior of UHPFRC(Ultra High Performance Fiber Reinforced Concrete) were investigated with test of 10-UHPFRC beam specimens. All test specimens were subjected to the flexural static loading. It was shown that steel fiber significantly improve the shear strength of UHPFRC beams. 2% volume fraction of steel fiber change the mode of failure from shear failure to flexural failure and delayed the failure of compressive strut with comparatively short shear span to depth ratio. UHPFRC beams without steel fiber had a 45-degree crack angle and fiber reinforced one had lower crack angle. Shear reinforcement contribution on shear strength of beams can be calculated by 45-degree truss model with acceptable conservatism. Using test results, French and Korean UHPFRC design recommendations were evaluated. French recommendation have shown conservative results on flexural behavior but Korean recommendation have shown overestimation for flexural strength. Both recommendations have shown the conservatism on the flexural ductility and shear strength either.

A Study on Freezing Assessment of the Water in the Z-Trap of Sewage Bay (PVC 오수받이 내부 Z형 트랩의 동결성 평가에 관한 연구)

  • Lee, Changwoo;Oh, Seungju
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.98-104
    • /
    • 2016
  • This study clarifies the simulation on freezing of remaining water in the Z-trap set up in the PVC sewage bay to control malodor. It made use of commercial FEM LAB program(ver. 3.2) well known as a solution of the problems arising in the flow of various fluid, heat transfer and mass transfer. Simulation results under the temperature $-20^{\circ}C$ outwards show that the water in the Z-trap set up in the sewage bay to control malodor freeze in the 60cm under the ground level after 14 days in the wet ground, and after 17 days in the regular ground. On the other hand, if the soil is dry even after the 42 days does not go down below freezing. Therefore, the water in the Z-trap was confirmed that it does not freeze.