• Title/Summary/Keyword: Cyber range

Search Result 102, Processing Time 0.039 seconds

A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems

  • Gunes, Volkan;Peter, Steffen;Givargis, Tony;Vahid, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4242-4268
    • /
    • 2014
  • The Cyber-Physical System (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered system that integrates embedded computing technologies (cyber part) into the physical world. In order to define and understand CPS more precisely, this article presents a detailed survey of the related work, discussing the origin of CPS, the relations to other research fields, prevalent concepts, and practical applications. Further, this article enumerates an extensive set of technical challenges and uses specific applications to elaborate and provide insight into each specific concept. CPS is a very broad research area and therefore has diverse applications spanning different scales. Additionally, the next generation technologies are expected to play an important role on CPS research. All of CPS applications need to be designed considering the cutting-edge technologies, necessary system-level requirements, and overall impact on the real world.

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification

  • Liang, Xinyu;Chen, Jing;Du, Ruiying;Zhao, Tianrui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2507-2528
    • /
    • 2022
  • Blockchain interoperability, which refers in particular to the ability to access information across blockchain systems, plays the key role for different blockchains to communicate with each other, and further supports the superstructure built on top of the cross-chain mechanism. Nowadays, blockchain interoperability technology is still in its infancy. The existing cross-chain scheme such as BTCRelay requires that the smart contract in a blockchain to download and maintain block headers of the other blockchain, which is costly in maintenance and inefficient to use. In this paper, we propose a supervision mechanism between blockchains, called Surveillant. Specially, the new entities called dual-functional nodes are introduced to commit the real-time information from the blockchain under supervision to the supervising blockchain, which enables users to have efficient cross-chain verification. Furthermore, we introduce Merkle mountain range for blocks aggregation to deal with the large-scale committing data. We propose the design of long orphan branch counter to trace the bifurcations in the blockchain under supervision. The existing incentive mechanism is improved to encourage the behaviors of dual-functional nodes. In Surveillant, the analysis and experimental results demonstrate that users are able to have efficient cross-chain verification with low maintenance overhead.

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

A study of Big-data analysis for relationship between students (학생들의 관계성 파악을 위한 빅-데이터 분석에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.113-119
    • /
    • 2015
  • Recent, cyber violence is increasing in a school and the severity of the problems encountered day by day. In particular, the severity of the cyber force using the smart phone is recognized as a very high and great problems socially. Cyberbullying have long damage degree and a wide range time duration against of existed physical cyber violence. Then student's affects is very seriously. Therefore, we analyzes the relationship and languages in the classroom for students to use to identify signs of cyber violence that may occur between friends in the class. And we support this information to identified parent, classroom teachers and school sheriff for prevent cyberbullying accidents in the school. For this research, we will design and implement a messenger in the cyber classroom. It have many components that are Big-data vocabulary, analyzer, and communication interface. Our proposed messenger can analyze lingual sign and friendship between students using Big-data analysis method such as text mining. It can analysis relationship by per-student, per-classroom.

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

A Study on Design Guideline of Cyber Chatting System based on Usability Evaluation (사이버 채팅 시스템의 사용성 평가를 통한 사용자 인터페이스 설계 지침에 관한 연구)

  • 전대인;박정순
    • Archives of design research
    • /
    • v.14 no.1
    • /
    • pp.35-46
    • /
    • 2001
  • Recently varieties of user groups are formed as the number of people using cyber chatting gets increased and there are many changes in the range and field of its use. But because most of the cyber chatting systems are being operated to enlarge the additional sonics use, the using environments are stereotyped. And as its function is being various as well, it can not provide with a user-centered environment. So this thesis compares and analyzes the problems derived from the usability evaluation for solving the problems in using cyber chatting systems, and presents the guidelines of emotion-intended user interface design for improving the usability as the result of the analysis. First, this study investigates cyber chatting systems as a means of web communication tools through the existing literatures. Secondly, this study finds out the problems in using them through satisfaction evaluation, heuristic evaluation, performance evaluation, and observation evaluation and presents a way of solving the provisional problems in using them as the analysis of the result of usability evaluation. And this was proceeded for the purpose of applying and activating the better usability evaluation of cyber chatting systems later. Through the usability evaluation, it is found out that the structuralization of chatting function, the screen visibility by the size and arrangement of the compositional elements of a screen, and the improvement and development of the proper metaphor use of images and functions by the communication environment are necessary.

  • PDF

Hypofractionated stereotactic body radiotherapy in low- and intermediate-risk prostate carcinoma

  • Kim, Hun Jung;Phak, Jeong Hoon;Kim, Woo Chul
    • Radiation Oncology Journal
    • /
    • v.34 no.4
    • /
    • pp.260-264
    • /
    • 2016
  • Purpose: Stereotactic body radiotherapy (SBRT) takes advantage of low ${\alpha}/{\beta}$ ratio of prostate cancer to deliver a large dose in few fractions. We examined clinical outcomes of SBRT using CyberKnife for the treatment of low- and intermediate-risk prostate cancer. Materials and Methods: This study was based on a retrospective analysis of the 33 patients treated with SBRT using CyberKnife for localized prostate cancer (27.3% in low-risk and 72.7% in intermediate-risk). Total dose of 36.25 Gy in 5 fractions of 7.25 Gy were administered. The acute and late toxicities were recorded using the Radiation Therapy Oncology Group scale. Prostate-specific antigen (PSA) response was monitored. Results: Thirty-three patients with a median 51 months (range, 6 to 71 months) follow-up were analyzed. There was no biochemical failure. Median PSA nadir was 0.27 ng/mL at median 33 months and PSA bounce occurred in 30.3% (n = 10) of patients at median at median 10.5 months after SBRT. No grade 3 acute toxicity was noted. The 18.2% of the patients had acute grade 2 genitourinary (GU) toxicities and 21.2% had acute grade 2 gastrointestinal (GI) toxicities. After follow-up of 2 months, most complications had returned to baseline. There was no grade 3 late GU and GI toxicity. Conclusion: Our experience with SBRT using CyberKnife in low- and intermediate-risk prostate cancer demonstrates favorable efficacy and toxicity. Further studies with more patients and longer follow-up duration are required.

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF