• 제목/요약/키워드: Cyber Communication

검색결과 787건 처리시간 0.022초

Study on Timing Failures in Cyber-Physical Systems

  • Kong, Joon-Ik
    • International journal of advanced smart convergence
    • /
    • 제11권3호
    • /
    • pp.56-63
    • /
    • 2022
  • Cyber-physical systems (CPSs) can solve real problems by utilizing closely connected resources in the cyber world. Most problems arise because the physical world is uncertain and unpredictable. To address this uncertainty, information pouring from numerous devices must be collected in real-time, and each interconnected device must share the information. At this time, CPS must meet timing-related techniques and strict timing constraints that can deliver accurate information within predefined deadlines in order to interact closely beyond simply connecting the cyber and physical worlds. Timing errors in safety-critical systems, such as automobiles, aviation, and medical systems, can lead to catastrophic disasters. In this paper, we classify timing problems into two types: real-time delay and synchronization problems. The results of this study can be used in the entire process of CPS system design, implementation, operation, verification, and maintenance. As a result, it can contribute to securing the safety and reliability of CPS.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

인터넷 시대의 남북한 정보통신 교류.협력을 위한 Cyber Network구축방안에 관한 연구 (A Study of Cyber Network Construction Scheme for Communnication Exchange-cooperation between South and North Korea in a Internet Times)

  • 황민호;이재완;최연성;고남영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2000년도 추계종합학술대회
    • /
    • pp.140-145
    • /
    • 2000
  • 인터넷을 통한 남북한의 교류협력은 정보화시대에 부응하는 새로운 남북관계의 토대를 마련해 줄 가능성을 내포하고 있다. 인터넷을 통한 교류협력은 직접접촉에 의할 때 수반되는 여러 불편함이 감소되어 교류가 용이하고 비용이 절감됨으로써 남북간 교류협력의 틀을 마련하는데 기여 할 수 있다. 본 논문에서는 정보통신부문의 남북 교류협력 동향을 인터넷, 소프트웨어, 통신서비스 중심으로 살펴보고, 이를 토대로 남북한의 교류협력을 위한 Cyber Network 구축방안을 제시하고자 한다.

  • PDF

웹기반 사이버 상담시스템의 설계 및 구현 (Design and Implementation of web based cyber counseling system)

  • 이재인
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제12권2호
    • /
    • pp.21-39
    • /
    • 2003
  • Many people including teachers and students' parents must assist each student who will be a hero of future to develop their potential abilities and acquire various skills. Counseling is a fundamental thing to achieve this goal. But, in reality, it is usually difficult to do counseling which makes it possible to establish desirable self-view and world view expertly and systema tically because of burdensome task of teachers, spatial and time limit and students' extracurri cular activities. Taking advantages of computer networking, this research was designed to solve various problematic situations we can usually face with in school and home, to reduce limitations among three parties: teachers, parents and students, and to keep record continuously on the process and contents of counseling. And, also, this research is focused to web-based counseling network that makes possible to build database system easily adapts to specialty of each schools. Web based counseling system will provide these advantages: 1. Through analyzing and editing which will be done by expert In of accumulated database, to realize more systematic and expert database will be possible. 2. Owing to the physical characteristic of cyber space, counseling will be done any time and anywhere the computer is. 3. Because it is possible to minimize social limitations on physical condition, communication channel and anonymity of cyber space, counseling will be relatively easy to perform. 4. The contents of counseling will be automatically recorded on the database.

  • PDF

Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.204-214
    • /
    • 2022
  • Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • 제55권6호
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

가상 해저 환경 콘텐츠 제작을 위한 Fish 군중행동 시뮬레이터 (Fish Schooling Behavior Simulator for the Contents Production of Cyber Underwater Environment)

  • 김종찬;조승일;김응곤
    • 한국전자통신학회논문지
    • /
    • 제2권1호
    • /
    • pp.25-33
    • /
    • 2007
  • 가상 해저 환경 속에서 군중 행동은 영화, 게임 등의 엔터테인멘트 산업에서 많은 장면으로 연출된다. 컴퓨터 그래픽스 기술의 발달로 인하여 디지털 영화나 애니메이션이 점차 증가함에 따라 다수의 캐릭터들이 등장하는 장면을 쉽게 접할 수 있다. 가상 환경에서 군중의 행동을 효율적으로 처리하는 기술에 관련해서 군중 장면 처리 및 군중 행동 시스템의 구현에 관한 연구는 있었으나, 자연스러운 군중 행동 시뮬레이터를 개발하는 연구는 아직 미흡한 편이다. 본 논문에서는 가상 해저환경에 존재하는 다수의 물고기들의 행동유형을 스마트하게 표현하여 시간과 비용이 많이 소요되는 단점을 보완하며 fish 군중행동 유형을 자동화하면서 사실적이면서 효율적인 가상 해저 환경 콘텐츠 제작을 구현하기 위한 fish 군중행동 시뮬레이터를 개발한다.

  • PDF

학생지도 정보를 제공하는 사이버상담 시스템의 설계 및 구현 (Design and Implementation of A Cyber Counseling System to Support Information for Student Guidance)

  • 오세정;최숙영
    • 한국컴퓨터산업학회논문지
    • /
    • 제2권12호
    • /
    • pp.1573-1580
    • /
    • 2001
  • 첨단 정보통신 기술의 발달로 급속하게 보편화된 PC통신과 인터넷은 청소년의 새로운 문화공간으로 자리잡고 있다. 또한 PC통신과 인터넷은 청소년들이 관심과 흥미를 갖고 있는 매체이므로 이것을 적극 활용한다면 그들이 필요한 때에 효과적인 상담을 할 수 있을 것이다. 더욱이 상담 영역의 확대와 함께 시대의 흐름에 합당한 상담이 가능할 것으로 추측된다. 이에 따라, 청소년 상담분야에서도 사이버상담에 관한 연구가 많이 진행되고 있다. 현재까지의 사이버상담에 관한 연구는 주로 청소년들이 사이버상담을 제대로 활용하기 위한 상담방법. 효과에 관한 내용이 주를 이루는 반면, 웹의 특성과 관련기술을 이용하여 상담내용을 저장하고 상담상황을 분석하여 이를 학생지도에 효과적으로 이용하고자 하는 노력이 없었다. 따라서 본 논문에서는 학생들이 인터넷상에서 상담을 한 후, 교사가 학생들의 여러 가지 문제를 파악할 수 있도록 상담상황과 관련정보를 제공하여 줌으로서 학생생활지도에 도움이 되도록 하는 사이버상담 시스템을 구현한다.

  • PDF

항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략 (Security Problems in Aircraft Digital Network System and Cybersecurity Strategies)

  • 임인규;강자영
    • 한국항행학회논문지
    • /
    • 제21권6호
    • /
    • pp.633-637
    • /
    • 2017
  • 항공기와 항공 네트워크에 대한 사이버 공격은 일반적으로 지상 산업에서 흔히 볼 수 있는 사이버 공격과 크게 다르지 않다. 항공 교통 인프라스트럭처(infrastructure)는 항공 교통 자원 확보를 위해 디지털 기반 구조로 전환되고 있다. 다양한 종류의 통신 환경과 정보 통신, 항법, 감시 및 기내 엔터테인먼트 시스템이 사이버 테러 위협에 노출될 위험을 가중시키고 있다. 또한 무인항공기의 출현은 사이버 테러에 의해 통제될 수 없는 위험을 내포하고 있다. 차세대 데이터 네트워크 시스템 환경에서 항공기 시스템 및 항공 기반의 인프라스트럭처에 대한 사이버 위협의 취약점을 인식하고 항공 선진국의 사이버 보안 표준과 대응 전략을 분석했다. 그리고 국내 항공 환경에서 고려해야 할 사이버 보안 정책에 대한 포괄적인 방안을 논의하고, 보안 환경에 대한 개념과 신속한 대응 전략 수립 등을 논의하였다.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제14권2호
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.