• Title/Summary/Keyword: DEVS Modeling

Search Result 165, Processing Time 0.023 seconds

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • You Yong-Jun;Lee Jang-Se;Chi Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

A study on the modeling between Discrete event system and continuous-time system (UAV를 위한 이산사건 및 연속시간 시스템간의 연동 모델링에 대한 연구)

  • Kang, Kwang-Chun;Chi, Sung-Do
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.159-164
    • /
    • 2005
  • UAV(Unmanned Air Vehicle) 시스템은 새로운 알고리즘과 소프트웨어 디자인에 바탕을 두고 빠르게 발전하고 있다. 그러나, 일반적으로 쓰이고 있는 전자공학적인 제어 시스템은 개발의 복잡성과 그에 따른 이용증대에 대한 문제점을 가지고 있다. 이에 본 논문에서는 연속시간 시스템으로 표현되는 비행기 모델과 이의 효과적인 제어를 위해 이산사건 시스템으로 표현되는 조종사 모델간의 연동을 제안한다. 전자공학적 모델인 연속시스템은 자세한 표현력을 바탕으로 정량적이고 정확한 비행기 모델을 표현할 수 있으며 제어 모델인 이산사건 시스템은 각 사건과 시스템의 상태에 따른 정성적인 행동제어를 가능하게 한다. 본 연구는 한국항공대학교에서 개발한 이산사건 시뮬레이터인 DEJAVA(DEVS Java)와 연속시간시뮬레이터인 MATLAB 시뮬레이터 환경을 바탕으로, NASA에서 개발된 HL2O 비행시뮬레이터와 조종사 모델을 위한 지능제어시스템 개념을 사용하여 구현되었다.

  • PDF

이산사건 시뮬레이션에 기반한 전자상거래 모델링/해석 소프트웨어 개발

  • 윤근수;안명수;이준원
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.11a
    • /
    • pp.208-212
    • /
    • 2000
  • 최근들어 B2C, B2B로 불리는 인터넷 기반의 전자상거래 시스템의 성공적인 구축이 기업의 비즈니스 성공의 열쇠로 간주될 만큼 그 중요성이 커지고 있다. 본 논문에서는 상거래 행위에 개입하는 다자간의 비즈니스 플로우를 효과적으로 모델링하여 분석할 수 있는 DEVS(Discrete Event Modeling System)이론에 기반한 새로운 비즈니스 모델링/해석 방법론을 제안한다 제안하는 방법은 비즈니스 플로우를 기술할 수 있는 언어를 정의하고, 정의된 언어를 이용하여 기술되는 전자상거래에 개입하는 개체간 거래 행위를 DEVS 모델로 자동 변환하는 방법을 제시한다. 변환된 모델은 이산사건 시뮬레이션 환경인 rDEVSim++ 시뮬레이션 소프트웨어를 이용하여 실행된 후에 그래픽 인터페이스 환경에서 비쥬얼화되어 시스템의 동작 및 성능을 분석 가능하도록 지원한다. 위의 전과정을 포함하도록 개발된 소프트웨어는 기업의 비즈니스 모델 구축용으로 활용이 가능할 뿐만 아니라 전자상거래 관련 인력 양성을 위한 교육용 소프트웨어로도 활용이 가능하다.

  • PDF

Modeling and Simulation of a RAID System (RAID 시스템의 모델링 및 시뮬레이션)

  • 이찬수;성영락;오하령
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2002
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RAID system interacts with a host system by using the high-speed Fibre channel protocol and stores data in an array of IDE disks. The DAVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and MCU unit. The primary-PCI unit interfaces with the host system and I/O data caches. The secondary-PCI unit includes disks. The MCU unit controls overall system. The control algorithm of MCU and PCI transactions are analyzed and modeled, From the analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

Simulation of a Mobile IoT System Using the DEVS Formalism

  • Im, Jung Hyun;Oh, Ha-Ryoung;Seong, Yeong Rak
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.28-36
    • /
    • 2021
  • This paper proposes two novel methods to model and simulate a mobile Internet of Things (IoT) system using the discrete event system specification (DEVS) formalism. In traditional simulation methods, it is advantageous to partition the simulation area hierarchically to reduce simulation time; however, in this case, the structure of the model may change as the IoT nodes to be modeled move. The proposed methods reduce the simulation time while maintaining the model structure, even when the IoT nodes move. To evaluate the performance of the proposed methods, a prototype mobile IoT system was modeled and simulated. The simulation results show that the proposed methods achieve good performance, even if the number of IoT nodes or the movement of IoT nodes increases.

Traffic Flow Analysis Methodology Using the Discrete Event Modeling and Simulation (이산 사건 모델링 및 시뮬레이션을 이용한 교통 흐름 분석 방법론)

  • 이자옥;지승도
    • Journal of Korean Society of Transportation
    • /
    • v.14 no.1
    • /
    • pp.101-116
    • /
    • 1996
  • Increased attention has been paid in recent years to the need of traffic management for alleviating urban traffic congestion. This paper presents a discrete event modeling and simulation framework for analyzing the traffic flow. Traffic simulation models can be classified as being either microscopic and macroscopic models. The discrete event modeling and simulation technique can be basically employed to describe the macroscopic traffic simulation model. To do this, we have employed the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. The SES/MB framework supports to hierarchical, modular discrete event modeling and simulation environment. We also adopt the Symbolic DEVS (Discrete Event System Specification) to developed the automated analysis methodology for generating optimal signal light policy. Several simulation tests will demonstrates the techniques.

  • PDF

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Development of Torpedo Target Detection Section Interface Simulation System based on DEVS Integrated Development Environment (DEVS 통합개발환경 기반 모의 어뢰 표적탐지부 연동장비 개발)

  • Lee, Min Kyu;Hwang, Kun Chul;Lee, Dong Hoon;Nah, Young In;Kim, Woo Shik
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.25-34
    • /
    • 2015
  • It is necessary for us to undergo trial and error for eliciting the rational requirement of the acquisition of weapon systems, but the M&S is general approach due to costs and risk of the development. In addition to the acquisition of weapon systems, M&S is extensively employed in the analysis and the training of developed weapon systems. The ADD (Agency for Defense Development) has developed DEVS integrated development environment (QUEST) that provides M&S general ground technique composed of simulation model implementation services, simulation result analysis services, and simulation interface services. This paper describes the interface architecture and the implementation of torpedo target detection section interface simulation system using QUEST. The torpedo target detection section interface simulation system is composed of torpedo target detection section which calculates a result of target detection and the QUEST scenario generator which provides simulation scenario for performance test of the torpedo target detection section. The interface architecture of torpedo target detection section interface simulation system is designed to verify the interface and performance of the torpedo target detection section by linking with the QUEST scenario generator.

DEVS-Based Simulation Model Development for Composite Warfare Analysis of Naval Warship (함정의 복합전 효과도 분석을 위한 DEVS 기반 시뮬레이션 모델 개발)

  • Mi Jang;Hee-Mun Park;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.41-58
    • /
    • 2023
  • As naval warfare changes to composite warfare that includes simultaneous engagements against surface, underwater, and air enemies, performance and tactical analysis are required to respond to naval warfare. In particular, for practical analysis of composite warfare, it is necessary to study engagement simulations that can appropriately utilize the limited performance resources of the detection system. This paper proposes a DEVS (Discrete Event Systems Specifications)-based simulation model for composite warfare analysis. The proposed model contains generalized models of combat platforms and armed objects to simulate various complex warfare situations. In addition, we propose a detection performance allocation algorithm that can be applied to a detection system model, considering the characteristics of composite warfare in which missions must be performed using limited detection resources. We experimented with the effectiveness of composite warfare according to the strength of the detection system's resource allocation, the enemy force's size, and the friendly force's departure location. The simulation results showed the effect of the resource allocation function on engagement time and success. Our model will be used as an engineering basis for analyzing the tactics of warships in various complex warfare situations in the future.

War Game Simulation Using Parametric Behavior Modeling Method (파라미터 행위 모델링 기법을 이용한 전쟁게임 시뮬레이션)

  • Kim, Jae-Hyun;Kim, Tag-Gon;Lee, Wan-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.126-134
    • /
    • 2006
  • The object oriented co-modeling methodology, previously introduced, employs a layered approach in war game models development in which an upper layer models abstract behavior of an object and a lower one models details of the object. Within the methodology military domain experts and simulation experts models an object at the upper and the lower layers, respectively in concurrent manner. This paper proposes a method of constructing a war game simulator using parametric behavior modeling technique, which provides a means for military domain experts/users to change model's detailed behavior with no knowledge on modeling semantics. The proposed simulator would support new algorithms or strategies with minimal cost and could be modified even by the users who are ignorant about modeling technique. To demonstrate the effectiveness of the proposed framework, a naval war game simulator is exemplified.

  • PDF