• 제목/요약/키워드: Cyber-physical system

검색결과 225건 처리시간 0.024초

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.

개인정보 손해배상책임 보장제도의 쟁점과 과제 (Issues and Tasks of Personal Information Protection Liability Insurance)

  • 이수연;권헌영
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

실시간 인터렉티브 미디어 시스템을 활용한 무용공연의 사이버 물리 시스템 구조 (Structure of Cyber Physical System in Dance Performances with Real Time Interactive Media System)

  • 김은정;조성희
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2018년도 춘계 종합학술대회 논문집
    • /
    • pp.279-280
    • /
    • 2018
  • 본 연구는 무용공연에서 사용되는 실시간 인터렉티브 미디어 시스템(interative media system)을 사이버물리시스템(CPS, Cyber-Physical System)의 관점으로 분석한 것이다. 4차 산업혁명시대에서 극대화된 가상공간과 현실공간의 연결성과 자동화가 무용예술에서 어떤 양상으로 일어나고 있는지 알아보기 위해 실시간 인터렉티브 미디어시스템을 활용한 무용공연들을 대상으로 연구한 결과, 사이버물리시스템의 연산, 통신, 조작의 과정들은 모션트레킹시스템(motion tracking system)을 통해 물리개체인 무용수들의 움직임, 근육 내부의 반응 등의 정보에 따라 조작되어 소프트웨어의 연산을 거쳐 프로젝션 맵핑(projection mapping)으로 영상으로 출력되는 과정을 거치는 것으로 나타났다. 추후, 다양한 사례연구를 통해 무용공연에서의 4차 산업혁명 요소들을 구체화하여야한다.

  • PDF

Analysis of the Current Status of Internet Fashion Shopping Malls and Proposal of a Cyber Fitting System as an Improvement

  • Tak, Myung-Ja;Kim, Chee-Yong
    • 한국멀티미디어학회논문지
    • /
    • 제12권12호
    • /
    • pp.1809-1818
    • /
    • 2009
  • In order to correctly understand the Internet fashion shopping mall, which is expected to continuously grow up, and to strengthen marketing activities in cyber space, a more scientific and systematic research is necessary. Most of the early researches of the Internet fashion shopping mall were focused on technical parts so they studied the environmental and physical characteristics of the Internet fashion shopping mall, but recently, the Internet fashion shopping mall is activated and accordingly, the interest in Internet shopping users is going up. Under this circumstance, the research to understand the characteristics of Internet shopping consumers becomes necessary. Therefore, the research was conducted by a survey, focusing on college students who use Internet a lot. The survey covered the experience and the type of using the Internet fashion shopping mall, the extent of satisfaction, strengths, and weaknesses of the Internet fashion shopping mall, the use of a cyber fitting system, and the possibility of the development of the Internet fashion shopping mall having a cyber fitting system. As a result of the study, it was found that: most of the students used the Internet fashion shopping mall; they used a fashion-specialized mall most; they pointed out economy of time as the biggest strength of using the Internet fashion shopping mall; they thought the biggest weakness of the Internet fashion shopping mall is that they can not try on clothes so they can not check whether clothes go well with them or not; and regarding the intention to use a cyber fitting system if available and the possibility of the development of the Internet fashion shopping mall, they replied that they would use it and the malls with the system would be developed. Based on the results, this study proposes a cyber fitting system as an improvement of the Internet fashion shopping mall.

  • PDF

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • 제41권5호
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

A Human-centric and Environment-aware Testing Framework for Providing Safe and Reliable Cyber-Physical System Services

  • In-Young Ko;KyeongDeok Baek;Jung-Hyun Kwon;Hernan Lira;HyeongCheol Moon
    • Journal of Web Engineering
    • /
    • 제19권2호
    • /
    • pp.139-166
    • /
    • 2020
  • The functions, capabilities, and effects produced by the application services of cyber physical systems (CPS) are usually consumed by users performing their daily activities in a variety of environmental conditions. Thus, it is critical to ensure that those systems neither interfere with human activities nor harm the users involved. In this paper, we propose a framework for testing and verifying the safety and reliability of CPS services from the perspectives of CPS environments and users. The framework provides an environmentaware testing method by which the efficiency of testing CPS services can be improved by prioritizing CPS environments and by applying machinelearning techniques. The framework also includes a metric by which we can automate the test of the most effective services that deliver effects from physical devices to users. Additionally, the framework provides a computational model that assesses mental workloads to test whether a CPS service can cause cognitive depletion or contention problems for users. We conducted a series of experiments to show the effectiveness of the proposed approaches for ensuring the safety and reliability of CPS application services during the development and operation phases.

북한의 사이버공격과 대응방안에 관한 연구 (A Study on North Korea's Cyber Attacks and Countermeasures)

  • 정민경;임종인;권헌영
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship

  • Jeoungkyu Lim;Yunja Yoo
    • 해양환경안전학회지
    • /
    • 제30권3호
    • /
    • pp.263-274
    • /
    • 2024
  • The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.

원자력발전소 사이버보안 훈련을 위한 HIL(Hardware In the Loop) System 개발 (Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants)

  • 송재구;이정운;이철권;이찬영;신진수;황인구;최종균
    • 정보보호학회논문지
    • /
    • 제29권4호
    • /
    • pp.867-875
    • /
    • 2019
  • 원자력을 포함한 산업제어시스템에 대한 사이버보안 사건이 증가함에 따라 기술적 보안 조치와 더불어 사이버보안교육 훈련 및 사이버 비상사건 대응 훈련이 요구되고 있다. 대상 설비를 운영 관리하는 담당자들에게 효과적인 사이버보안 인식 및 교육 훈련을 위해서는 센서 수준에서부터 발전소 운영 상태까지 사이버공격으로 인한 영향 분석이 가능한 훈련용 시스템이 요구된다. 이에 본 논문에서는 원자력 운영 상태를 모사하는 발전소 시뮬레이션과 특정 계통의 시뮬레이션 및 물리장치를 포함하는 원자력발전소 사이버보안 훈련용 HIL 시스템을 개발하였다. 이를 통해 계통담당자 및 사이버보안조직을 대상으로 하는 기술적 훈련, 사이버보안 조직 및 비상사건대응 조직을 대상으로 하는 특화된 사이버보안 훈련을 지원하고자 한다.