• Title/Summary/Keyword: Cyber challenges

Search Result 63, Processing Time 0.02 seconds

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

Author Co-citation Analysis for Digital Twin Studies (디지털 트윈 연구의 저자 동시인용 분석)

  • Kim, Sumin;Suh, Chang-Kyo
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.39-58
    • /
    • 2019
  • Purpose A digital twin is a digital replication of a physical system. Gartner identified the digital twin as one of the Gartner Top 10 Strategic Technology Trend for three years from 2017. The rapid development of the digital twin market is expected to bring about innovation and change throughout society, and much research has been done recently in academia. In this research, we tried to explore the main research trends for digital twin research. Design/methodology/approach We collected the digital twin research from Web of Science, and analyzed 804 articles that was published during time span of 2010-2018. A total of 41 key authors were selected based on the frequency of citation. We created a co-citation matrix for the core authors, and performed multivariate analysis such as cluster analysis and multidimensional scaling. We also conducted social network analysis to find the influential researchers in digital twin research. Findings We identified four major sub- areas of digital twin research: "Infrastructure", "Prospects and Challenges", "Security", and "Smart Manufacturing". We also identified the most influential researchers in digital twin research: Lee EA, Rajkumar R, Wan J, Karnouskos S, Kim K, and Cardenas AA. Limitation and further research suggestion were also discussed as a concluding remarks.

The Negative Effect of Covid-19 Pandemic in the Food Service Business and its Solutions

  • PARK, Hyo-Nam
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.10 no.1
    • /
    • pp.71-81
    • /
    • 2022
  • Purpose - Foodservice production is predominantly susceptible to rampant calamities since it trusts on social gatherings and interactions. This research aims to elaborate a brief framework of the literature review on the research conducted for the Coronavirus outburst regarding the food service sector. Research design, Data, and methodology - The method used in research involving interpretation of the subject content in a text data through a systematic process of classification to identify the themes and coding is referred to as the qualitative content analysis. It can also be defined as a useful research approach method of analysis instead of an empirical analysis. Result - Based on ultimate systematic literature analysis, the author figured out that the vendors should be given importance to the digital traveling interventions as the shortest factor in foodservice processing firms. Designing new sources of revenue and implementing numerous canceled regulations are other resolution that helps challenges in food service industries Conclusion - The Coronavirus pandemic has affected the foodservice business leading to the permanent closure of some businesses. There is a need for a stimulus package from the state to revive these businesses since they play a great role in the economy's growth and are regarded as part of the economy, and most of their activity is undocumented.

Water Digital Twin for High-tech Electronics Industrial Wastewater Treatment System (I): e-ASM Development and Digital Simulation Implementation (첨단 전자산업 폐수처리시설의 Water Digital Twin(I): e-ASM 모델 개발과 Digital Simulation 구현)

  • Shim, Yerim;Lee, Nahui;Jeong, Chanhyeok;Heo, SungKu;Kim, SangYoon;Nam, KiJeon;Yoo, ChangKyoo
    • Clean Technology
    • /
    • v.28 no.1
    • /
    • pp.63-78
    • /
    • 2022
  • Electronics industrial wastewater treatment facilities release organic wastewaters containing high concentrations of organic pollutants and more than 20 toxic non-biodegradable pollutants. One of the major challenges of the fourth industrial revolution era for the electronics industry is how to treat electronics industrial wastewater efficiently. Therefore, it is necessary to develop an electronics industrial wastewater modeling technique that can evaluate the removal efficiency of organic pollutants, such as chemical oxygen demand (COD), total nitrogen (TN), total phosphorous (TP), and tetramethylammonium hydroxide (TMAH), by digital twinning an electronics industrial organic wastewater treatment facility in a cyber physical system (CPS). In this study, an electronics industrial wastewater activated sludge model (e-ASM) was developed based on the theoretical reaction rates for the removal mechanisms of electronics industrial wastewater considering the growth and decay of micro-organisms. The developed e-ASM can model complex biological removal mechanisms, such as the inhibition of nitrification micro-organisms by non-biodegradable organic pollutants including TMAH, as well as the oxidation, nitrification, and denitrification processes. The proposed e-ASM can be implemented as a Water Digital Twin for real electronics industrial wastewater treatment systems and be utilized for process modeling, effluent quality prediction, process selection, and design efficiency across varying influent characteristics on a CPS.

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

The Role of Cognitive Absorption as a Mediating Variable in Virtual Community (가상공동체에서 매개 변수로서의 몰입의 역할)

  • Kim, Jin-Hwa;Byun, Hyun-Soo
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.47-63
    • /
    • 2004
  • As Internet usages proliferate, the interests on cyber space and virtual community increase. The purpose of this study is to find the role of cognitive absorption as an intermediate variable. It is a variable that links factors that affect on members' usage of virtual community and cognitive absorption. The result of this study shows that challenges, skills, perceived reality, and needs affect the usage of virtual community through cognitive absorption, while only interactivity affects the usage of virtual community directly. This shows that cognitive absorption plays an important role in the usage of virtual community. The major contribution in this study is that cognitive absorption influences on the usage of virtual community greatly. If there is a way to increase the intensity of cognitive absorption, it will strongly help increase the performance of virtual community.

Result Based Evaluation Model and Its Application to Peace Operation of the ROK Military Contingent to UN Mission (한국군의 UN평화활동에 대한 성과기반 평가모델개발과 적용)

  • KWON, Goosoon
    • International Area Studies Review
    • /
    • v.21 no.1
    • /
    • pp.303-324
    • /
    • 2017
  • Current methods to evaluate the performance of ROK military contingents to UN missions unnecessarily raises the issues of relevance, validity and reliability. Thus, this article aims to suggest how the result based evaluation (RBE) model which is widely adopted in the UN field missions as well as the international development community would be modified and applied to peace operation of the ROK contingent. As a result of the study, the model presents a framework that integrates the planning process and monitoring and evaluation with a logical framework, which entails a cycle of assessment of pre-deployment planning, monitoring and phased evaluation, and post-deployment evaluation. Secondly, according to measurement of RBE benchmarks to the present ROK's monitoring and evaluation system, factors in an evaluation unit and a logical framework approach are unmet or partly met to the benchmarks. In addition, ex-post impact evaluation has been rarely performed. Finally, the policy recommendations for resolution of the aforementioned challenges as well as a joint evaluation unit, participated by experts in a civilian, public, and a military domain are proposed.

Case Study of Supportive Music Imagery for Enhancing Self-Worth (지지적 음악심상(SMI)기법을 통한 내담자의 자기가치감 증진에 대한 사례연구)

  • Park, Jieun
    • Journal of Music and Human Behavior
    • /
    • v.17 no.2
    • /
    • pp.57-82
    • /
    • 2020
  • As a case study of the application of supportive music and imagery (SMI), this study examined the impact of SMI in helping clients establish greater self-worth. Sense of self-worth was defined as trust and respect for the self as evidenced by understanding of one's individuality and uniqueness. Participants in the study were two adults in need of help with psychological challenges arising from low self-worth. Each of them participated in SMI sessions once a week, for a total of 6 weeks. Participants' statements on the imagery drawn by them during SMI sessions were analyzed in relation to components of the sense of self-worth. The results of this study showed that SMI sessions helped both clients recognize their internal resources and gaining insight into the value of their internal resources increased their evaluation of their own self-worth. Specific factors of SMI sessions that impacted the clients' self-worth and suggestions for future studies are also discussed.

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Preparation for Nobel Prize in Science (과학분야 노벨상을 위한 준비)

  • Park, Jae-Hwan;Ahn, Jeeyoung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.563-570
    • /
    • 2018
  • The Nobel Prize, which began in 1900, has already produced more than 1,000 winners worldwide. However, South Korea has failed to produce a Nobel Prize winner in the field of science. In order to make the Nobel Prize possible in science, many concerns and improvements are needed in many ways, including scientific administration, bureaucracy, and public education. In the field of science administration, authoritarianism seem to be a major stumbling block. Developing scientific technology by policy means and achievement of scientific technology to make money are not healthy foundation for the Nobel Prize. School education to enhance the value of creativity and challenge in needed. Social awareness is needed to value creativity and challenges. Acceptance of fails is required to succeed. It can make money to study things that don't pay. The Nobel Prize can be approached without the recognition of the Nobel Prize.