• Title/Summary/Keyword: DEVS(Discrete Event Specification)

Search Result 128, Processing Time 0.022 seconds

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Development of Battle Space Model Based on Combined Discrete Event and Discrete Time Simulation Model Architecture for Underwater Warfare Simulation (수중운동체 교전 시뮬레이션을 위한 이산 사건 및 이산 시간 혼합형 시뮬레이션 모델 구조 기반의 전투 공간 모델 개발)

  • Ha, Sol;Ku, Namkug;Lee, Kyu-Yeul;Roh, Myung-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.11-19
    • /
    • 2013
  • This paper presents the battle space model, which is capable of propagating various types of emissions from platforms in underwater warfare simulation, predicting interesting encounters between pairs of platforms, and managing environmental information. The battle space model has four components: the logger, spatial encounter predictor (SEP), propagator, and geographic information system (GIS) models. The logger model stores brief data on all the platforms in the simulation, and the GIS model stores and updates environmental factors such as temperature and current speed. The SEP model infers an encounter among the platforms in the simulation, and progresses the simulation to the time when this encounter will happen. The propagator model receives various emissions from platforms and propagates these to other "within-range" platforms by considering the propagation losses and delays. The battle space model is based on the discrete event system specification (DEVS) and the discrete time system specification (DTSS) formalisms. To verify the battle space model, simple underwater warfare between a battleship and a submarine was simulated. The simulation results with the model were the same as the simulation results without the model.

Web-based Distributed Experimental Frame for Discrete Event Simulation System (이산사건 시뮬레이션 시스템을 위한 웹 기반 분산 실험 틀)

  • Jung, Inho;Choi, Jaewoong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • The problem of social phenomenon is getting more complicated than past decades, and the simulation engineers need more computation power to solve the problem. Therefore, the needs of the computational resources of the modeling and simulation environment are increasing. In the perspective of the simulation, it is necessary to allocate computational resources flexibly so that the simulation can be performed per the available budget range. As an alternative to the simulation environment to accommodate these requirements, cloud service has emerged as an environment in which computing resources can be used flexibly. This paper proposes a web-based simulation framework which consists of a front-end that reconstructs the simulation model using the web, and a back-end that executes the discrete event simulation. This paper also carried out a case study which shows web-based simulation framework has better overall runtime than standalone simulation framework.

Method for Analysis of C3 System of Systems Using Transformation of Federation Based on an Extended DEVS Formalism (확장된 DEVS 형식론 기반 페더레이션의 변환을 통한 C3 복합 체계의 분석 방법)

  • Kang, Bong Gu;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.13-21
    • /
    • 2018
  • The system of systems (SoS) based analysis method for the C3 system consisting of the communication system and the command and control (C2) system has the advantage that detailed analysis is possible, but it requires long execution time per one trial, which makes the analysis of various scenarios difficult. To solve this problem, this paper proposes a method for analysis of C3 SoS using a transformation of a federation into an integrated simulation. This transformation technique reduces the execution time while maintaining accuracy by abstracting the system other than the one to be analyzed, consisting of model hypothesis and function identification. The former can construct an abstracted model for the simulation through the proposed extended Discrete Event Systems Specification (DEVS) formalism and the latter can express the characteristics of the model influenced by other systems. From the case study on C and C2 analysis, the experimental results show that this method shortened the time considerably while maintaining the accuracy within an acceptable error range and we expect that this method will enable the exploratory analysis of the complex systems other than C3.

Design of the Model for Predicting Ship Collision Risk using Fuzzy and DEVS (퍼지와 DEVS를 이용한 선박 충돌 위험 예측 모델 설계)

  • Yi, Mira
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.127-135
    • /
    • 2016
  • Even thought modernized marine navigation devices help navigators, marine accidents has been often occurred and ship collision is one of the main types of the accidents. Various studies on the assessment method of collision risk have been reported, and studies using fuzzy theory are remarkable for the reason that reflect linguistic and ambiguous criteria for real situations. In these studies, collision risks were assessed on the assumption that the current state of navigation ship would be maintained. However, navigators ignore or turn off frequent alarms caused by the devices predicting collision risk, because they think that they can avoid the collisions in the most of situations. This paper proposes a model of predicting ship collision risk considering the general patterns of collision avoidance, and the approach is based on fuzzy inference and discrete event system specification (DEVS) formalism.

A Digital Twin Simulation Model for Reducing Congestion of Urban Railways in Busan (부산광역시 도시철도 혼잡도 완화를 위한 디지털 트윈 시뮬레이션 모델 개발)

  • Choi, Seon Han;Choi, Piljoo;Chang, Won-Du;Lee, Jihwan
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.10
    • /
    • pp.1270-1285
    • /
    • 2020
  • As a representative concept of the fourth industrial revolution era where everything is digitized, digital twin means analyzing and optimizing a complex system using a simulation model synchronized with the system. In this paper, we propose a digital twin simulation model for the efficient operation of urban railways in Busan. Due to the geopolitical nature of Busan, where there are many mountains and narrow roads, the railways are more useful than other public transportation. However, this inversely results in a high level of congestion, which is an inconvenience to citizens and may be fatal to the spread of the virus, such as COVID19. Considering these characteristics, the proposed model analyzes the congestion level of the railways in Busan. The model is developed based on a mathematical formalism called discrete-event system specification and deduces the congestion level and the average waiting time of passengers depending on the train schedule. In addition, a new schedule to reduce the congestion level is derived through particle swarm optimization, which helps the efficient operation of the railways. Although the model is developed for the railways in Busan, it can also be used for railways in other cities where a high level of congestion is a problem.

Deformable Modeling and a Haptic Interface for Medical Image Simulation (의료 시술 시뮬레이션을 위한 변형 모델링 및 햅틱 인터페이스)

  • 임아영;박주영;이선민;최유주;남상아;김명희
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.103-108
    • /
    • 2002
  • 본 연구는 이산 사건 시스템 형식론(DEVS: Discrete Event System Specification)을 이용한 가상전장 모델링 및 시뮬레이션 방법론을 제안한다. 기존 군체계에 관련된 모델링 기술은 물리적 모델링, 비쥬얼 모델링, 또는 개념적 모델링 등 개별 기능중심의 단편적 플랫폼 모델링에 그치고 있으며, 무기체계 분석 시뮬레이션도 개별 단위체 중심으로 평가되어져서, 다양하고 종합적인 그리고 상호운영성과 재사용성 등을 고려한 통합 모델링 및 시뮬레이션 환경을 제공하지 못하는 단점을 갖는다. 따라서 본 논문에서는 개별 전투병력에서부터 첨단 무기체계에 이르는 다양한 전장 요소들을 계층 구조적으로 통합함으로써 장에서 발생될 수 있는 개별 전투병력의 미시적 행동 특성뿐 아니라 분대/중대/대대/사단급 단위의 거시적 전략/전술에 대한 묘사까지도 가능한 가상전장 모델링 및 시뮬레이션 환경을 제안한다. 제안된 방법론은 분대 단위의 가상 전장 환경에 대한 사례연구를 통해 검증하였으며, 향후 연구로는 대단위 가상전장에 대한 묘사를 위한 HLA 분산 시뮬레이션 기술의 적용에 대한 연구가 필요할 것이다.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Development of SVDB for performance improvement of security (보안 시스템의 성능 향상을 위한 SVDB 개발)

  • 이원영;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.17-21
    • /
    • 2002
  • 네트워크 보안의 중요성과 필요성이 증대됨에 따라 많은 조직들이 다양한 보안 시 스템을 네트워크에 적용하고 있다. 침입 차단 시스템, 침입 탐지 시스템, 취약점 스캐너와 같은 보안 시스템들이 취약성 정보를 공유하게 되면 일관된 통합 보안 환경을 구축할 수 있다. 본 연구진은 통합 보안 시뮬레이션 환경의 구축을 위해 여러 보안 시스템 모델들이 사용할 수 있는 취약성 정보들을 집약시킴으로써 보안 시스템간의 정보 공유를 쉽게 할 수 있는 SVDB (Simulation based Vulnerability Data Base)를 구축하였다. 네트워크의 한 구성요소인 SVDB는 보안 시스템 모델의 구성에 필요한 다양한 정보를 담고 있어 한 호스트나 네트워크가 갖는 취약성을 조기에 발견할 수 있다. 또한 SVDB는 침입 탐지 시스템과 같은 보안 시스템이 존재하는 네트워크를 시뮬레이션 하는데 필요한 보안 정보를 제공한다. 보안시스템을 위한 시뮬레이션 모델은 DEVS (Discrete EVent system Specification) 방법론을 사용하여 구성하였다. 또한 이렇게 구축된 시뮬레이션 모델들이 SVDB와 연동하기 위한 인터페이스 모듈을 구현하였다. 취약성 스캐너, 침입 탐지 시스템, 침임 차단 시스템이 정보를 공유함으로써 공격에 효과적인 대응하는 것을 시뮬레이션을 통해 보인다.

  • PDF