• Title/Summary/Keyword: Cyber scenario

Search Result 62, Processing Time 0.024 seconds

A DQN-based Two-Stage Scheduling Method for Real-Time Large-Scale EVs Charging Service

  • Tianyang Li;Yingnan Han;Xiaolong Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.551-569
    • /
    • 2024
  • With the rapid development of electric vehicles (EVs) industry, EV charging service becomes more and more important. Especially, in the case of suddenly drop of air temperature or open holidays that large-scale EVs seeking for charging devices (CDs) in a short time. In such scenario, inefficient EV charging scheduling algorithm might lead to a bad service quality, for example, long queueing times for EVs and unreasonable idling time for charging devices. To deal with this issue, this paper propose a Deep-Q-Network (DQN) based two-stage scheduling method for the large-scale EVs charging service. Fine-grained states with two delicate neural networks are proposed to optimize the sequencing of EVs and charging station (CS) arrangement. Two efficient algorithms are presented to obtain the optimal EVs charging scheduling scheme for large-scale EVs charging demand. Three case studies show the superiority of our proposal, in terms of a high service quality (minimized average queuing time of EVs and maximized charging performance at both EV and CS sides) and achieve greater scheduling efficiency. The code and data are available at THE CODE AND DATA.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

An Authoring Strategy of Educational Contents using Component Technology and Concept-Based Branch Method (컴포넌트 기술과 개념단위 분기방법을 이용한 교육을 콘텐츠의 저작지침)

  • 오용선;신운섭
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper, we propose a novel model and effective authoring strategy of educational contents which improve the drilling effects in the cyber education through Internet. Especially we offer an authoring process of digital contents of engineering departs using JAVA component library technology and concept-based branch method, making the element of the library as unit-contents separated in accordance with their characteristics arid then accessing them at arbitrary instant in the replaying time. In proportion to the proposed model and strategy, the resultant contents shows advanced adaptabilities and interactions so that the contents can be user-oriented considerations. Combining and realizing the proposed authoring strategy for constitution of digital contents, we can get a more efficient scenario of making and drilling especially in the area of engineering or language courses.

  • PDF

The Study on the Developing Process of BIM Modeling for Urban-life-housing Based on Unit Modular (유닛모듈러 기반 도시형 생활주택의 BIM 모델링 프로세스 개발 연구)

  • Lee, Chang-Jae;Lim, Seok-Ho
    • KIEAE Journal
    • /
    • v.12 no.6
    • /
    • pp.77-84
    • /
    • 2012
  • The current architectural design of unit modular has been based on 2D of CAD program, so unit modular character which needs unit information management, as a dried-member system, has no effect on design process. The purpose of this study is We have developed a suitable BIM design process, according to various works of construction, then tried to contribute to supply and activation of the urban-life-housing based on unit modular. The BIM modeling process based on unit modular has been in order of unit combination with preparing manual classification, and, it has been constructed, at construction site, from housing foundation to roof finish by Bottom-up method. At a manufacturing factory, it has been produced in order of 1) grouping materials and parts, 2) fabricating unit boxes, and 3) interference examination of unit boxes, and each order has been classified as housing structure, architecture, plumbing process separately. At a construction site, the fabrication has been done in order of, like as a real housing construction scenario, 1) RC foundation work 2) unit module job-site-fabrication work, 3) roof truss work, 4) plumbing and HVAC work, and 5) housing interior finish work. After modeling process, the interference examination on each work of construction has finally completed modeling. The Unit modular utilizing BIM modeling can make easy housing maintenance through systematic control with preparing manual of unit module information, and securing accurate and speedy construction information. And it will promote design credibility and create maximum effect of unit modular construction method, such as construction period reduction and upgrade of construction quality, etc., through the computer simulation as real as construction environment in cyber space, and with the interfering examination.

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

A collaborative Serious Game for fire disaster evacuation drill in Metaverse (재난 탈출 협동 훈련 기능성 게임의 메타버스 플랫폼 구현)

  • Lee, Sangho;Ha, Gyutae;Kim, Hongseok;Kim, Shiho
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.70-77
    • /
    • 2021
  • The purpose of Serious games in immersive Metaverse platform to provide users both fun and intriguing learning experiences. We proposes a serious game for self-trainable fire evacuation drill with collaboration among avatars synchronized with multiple trainees and optionally with real-time supervising placed at different remote physical locations. The proposed system architecture is composed of wearable motion sensors and a Head Mounted Display to synchronize each user's intended motions to her/his avatar activities in a cyberspace in Metaverse environment. The proposed system provides immersive as well as inexpensive environments for easy-to-use user interface for cyber experience-based fire evacuation training system. The proposed configuration of the user-avatar interface, the collaborative learning environment, and the evaluation system on the VR serious game are expected to be applied to other serious games. The game was implemented only for the predefined fire scenario for buildings, but the platform can extend its configuration for various disaster situations that may happen to the public.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

An Interoperable Mapping Model between SEP 2.0 & OpenADR 2.0b for ICT Grid Convergence (ICT 전력 융합을 위한 SEP 2.0과 OpenADR 2.0b간의 상호운용 매핑 모델)

  • Choi, Min-Young;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.41-49
    • /
    • 2017
  • The 'NIST Framework and Road Map for Smart Grid Interoperability Standards' proposes an architecture framework to secure the direction of development and standard interoperability of smart grid and provides a list of identified standard, standard cyber security strategies, and certification framework. In particular, SEP 2.0 and OpenADR 2.0 are the examples. SEP 2.0 and OpenADR 2.0 can functionally link HEMS and Smart Grid, but interoperability standards between the two protocols are not planned in above document. The OpenADR Alliance also announced that work is underway to define mapping tables for interoperability between OpenADR 2.0 and SEP 2.0, but no information is yet available. Therefore, In this paper, in developing energy efficiency improvement HEMS, we propose a mapping model that supports syntactic and semantic founded interoperability between SEP 2.0 and OpenADR 2.0b for ICT grid convergence based on the standard specification document of each protocol and confirmed through an example of the semantic mapping function based on the demand response service scenario.

The Power of Reputation: Can Socal Reputation Effect on Likability, Trust and Preference of Interpersonal Relationship? (평판의 위력: 사회적 평판이 호감과 신뢰 및 선호도에 영향을 미치는가?)

  • Heung-Pyo Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.17 no.3
    • /
    • pp.261-285
    • /
    • 2011
  • In our studies, We defined the concept of social reputation and aimed to estimate the effect of social reputation on likability, trust, preference of interpersonal relationship. To accomplish these goal, photographs of 12 persons(six young unmarried man, six young unmarried women) volunteered were shown to 60 raters, and the one male and one female pictures of scores of facial attractiveness are nearest to median were selected as experimental figures in preliminary study. After this, We asked 260 raters to assess likability, trust, preference of interpersonal relationship after showing raters the chosen pictures of man and woman and telling scenario of positive, negative reputation about these two persons. The outcomes showed that in both men and women, likability, trust, preference of persons who gained positive reputation were significantly higher than persons gained negative reputation. Facial attractiveness was effect on likability, trust, and preference, but effect size of reputation was much higher on likability, interpersonal preference, especially trust level. Also, in three-way ANCOVA results, Woman has showed higher likability and trust than man under the condition of good reputation in both woman was rater and object to be assessed, but on the contrary, likability, trust, and preference of woman were lower than man in either woman was rater or object to be judged under the bad reputation,. Lastly, this study's implications and limitations were discussed.

  • PDF