• Title/Summary/Keyword: DEVS modeling and simulation

Search Result 149, Processing Time 0.023 seconds

Modeling and Simulation for Performance Evaluation of VoIP Spam Detection Mechanism (VoIP 스팸 탐지 기술의 성능 평가를 위한 모델링 및 시물레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Kim, Myuhng-Joo;Jeong, Jong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.95-105
    • /
    • 2009
  • Spam call is one of the main security threat in VoIP services. In this paper, we have designed simulation model for performance evaluation of VoIP spam defense mechanism. The simulation model has functions for performance evaluation such as calls generation and input/output comparison. Four representative caller models have been developed for performance evaluation and each model has its own characteristics as statistical parameters. The target mechanism of performance evaluation is SPIT(Spam over Internet Telephony) level decision algorithm, and we have derived SPIT levels of caller models. The performance evaluation model is designed using the DEVS formalism and DEVSJAVA$^{TM}$ is exploited for development and execution of simulation models.

Modeling and Simulation of a RAID System (RAID 시스템의 모델링 및 시뮬레이션)

  • 이찬수;성영락;오하령
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2002
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RAID system interacts with a host system by using the high-speed Fibre channel protocol and stores data in an array of IDE disks. The DAVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and MCU unit. The primary-PCI unit interfaces with the host system and I/O data caches. The secondary-PCI unit includes disks. The MCU unit controls overall system. The control algorithm of MCU and PCI transactions are analyzed and modeled, From the analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

Service Prediction-Based Job Scheduling Model for Computational Grid (계산 그리드를 위한 서비스 예측 기반의 작업 스케줄링 모델)

  • Jang Sung-Ho;Lee Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.91-100
    • /
    • 2005
  • Grid computing is widely applicable to various fields of industry including process control and manufacturing, military command and control, transportation management, and so on. In a viewpoint of application area, grid computing can be classified to three aspects that are computational grid, data grid and access grid. This paper focuses on computational grid which handles complex and large-scale computing problems. Computational grid is characterized by system dynamics which handles a variety of processors and jobs on continuous time. To solve problems of system complexity and reliability due to complex system dynamics, computational grid needs scheduling policies that allocate various jobs to proper processors and decide processing orders of allocated jobs. This paper proposes a service prediction-based job scheduling model and present its scheduling algorithm that is applicable for computational grid. The service prediction-based job scheduling model can minimize overall system execution time since the model predicts the next processing time of each processing component and distributes a job to a processing component with minimum processing time. This paper implements the job scheduling model on the DEVS modeling and simulation environment and evaluates its efficiency and reliability. Empirical results, which are compared to conventional scheduling policies, show the usefulness of service prediction-based job scheduling.

  • PDF

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Modeling and Simulation of the Efficient Certificate Status Validation System on Public Key Infrastructure (공개키 기반 구조에서의 효율적인 인증서 상태 검증 방법에 관한 모델링 및 시뮬레이션)

  • 최지혜;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.7-12
    • /
    • 2004
  • 공개키 기반 구조(PKI; Public Key Infrastructure)에 필수적인 요소인 인증서의 상태 검증에 있어서 인증서 상태 검증 서버인 OCSP (Online Certificate Status Protocol) 서버는 실시간 상태 검증을 제공한다. 그러나, 서버와 클라이언트의 메시지 인증을 위해 전자 서명을 수행해야 하며, 이 때 사용되는 공개 암호 연산 과정의 복잡성은 동시에 많은 클라이언트의 요청이 발생할 경우에 응답 시간을 크게 지연시킨다는 단점을 가지고 있다. 본 논문에서는 이러한 문제를 해결하기 위한 인증서 상태 검증 서버의 시뮬레이션 모델을 DEVS (Discrete Event system Specification) 방법론을 이용하여 설계하였다. 이 모델은 인증서의 상태 검증을 요청하는 영역에 위치하여 해쉬 함수를 적용한 인증을 수행하도록 구성되었으며, 시뮬레이션 결과는 제시한 방법이 인증서 상태 검증 속도를 증대시켜 결과적으로 사용자의 응답 시간이 감소되는 것을 보여준다.

  • PDF

A Study on Mine Artillery Hit Using DEVS (DEVS을 이용한 갱도포병 타격에 관한 연구)

  • Chung, Young-Ho;Shin, Ki-Tae;Park, Jin-Woo
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.45-51
    • /
    • 2008
  • The enemy will attempt to destroy our troop's core facilities using various fire supports at the beginning of war. Among these fire supports, artillery is given a most deal of weight and mine artillery is a great threat to our troops because it has a superior predominance on the ability of survival. A study about hitting mine artillery has been developed inside the military field only. However, these studies had been mostly qualitative analyses, thus having limitations in the aspects of nonobjectiveness and simplicity. Current study attempts to develop theory on hitting mine artillery beginning from mine opening until the target got hit, based on the assumption that one side which has inferior force will attack first. We studied on hitting mine artillery in a quantitative way using DEVS method.

  • PDF

An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment (클라우드 컴퓨팅 공동 환경의 네스티드 세션관리에서의 응용 및 오류 훅킹)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.145-150
    • /
    • 2012
  • This paper explains a performance analysis of an error detection system running on nested session management of cloud computing collaboration environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia remote control based on nested session management of cloud computing collaboration environment.

Performance Analysis of Error Classification System on Distributed Multimedia Environment (분산 멀티미디어 환경에서 실행되는 오류 분류 시스템의 성능 분석)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.4 no.2
    • /
    • pp.181-189
    • /
    • 2003
  • The requirement of distributed multimedia applications is the need for sophisticated QoS(quality of service) management. In terms of distributed multimedia systems, the most important catagories for quality of service are a timeless, volume, and reliability In this paper, we discuss a method for increasing reliability through fault tolerance. We describe the design and implementation of the ECA running on distributed multimedia environment. ECA is a system is able to classify automatically a software error based on distributed multimedia. This papaer explains a performance analysis of an error classification system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions.

  • PDF

Temporal Logic Application Technique for Solving Spatio-temporal Problem in BM-DEVS Modeling And Simulation Environment (BM-DEVS 모델링과 시뮬레이션 환경에서의 시공간 문제 해결을 위한 시간 논리 적용 기법)

  • Jungsub Ahn;Taeho Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.47-49
    • /
    • 2023
  • 사회적으로 복잡한 문제들이 시공간 형태로 문제 표현이 가능하고 이를 활용하여 문제를 해결하기 위한 연구들이 진행 중이다. 특히, 시뮬레이션 이론 중 하나인 BM-DEVS는 시공간 논리를 적용하여 실세계에서 일어나는 문제들을 시공간 규칙으로써 표현하였고 이를 모델에 적용하여 시스템에서 행위를 모니터링한다. 하지만 BM-DEVS에서는 시스템 차원에서 정의된 시공간 규칙들을 평가하기 위하여 Büchi 오토마타로의 변환과 오토마타를 모델들에 반영할 수 있어야 한다. 이를 위하여 시스템을 구축하는 모델러가 직접 규칙을 오토마타로 변환하는 작업을 해야하며 이에 대한 오토마타를 모델에 적용하기까지는 많은 시간이 소요된다. 이러한 문제를 해결하기 위해 본 논문에서는 모델링의 단순화를 위하여 시공간 규칙을 모델들에 자동적으로 적용하는 방법에 대하여 소개한다.

  • PDF

Development of Torpedo Target Detection Section Interface Simulation System based on DEVS Integrated Development Environment (DEVS 통합개발환경 기반 모의 어뢰 표적탐지부 연동장비 개발)

  • Lee, Min Kyu;Hwang, Kun Chul;Lee, Dong Hoon;Nah, Young In;Kim, Woo Shik
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.25-34
    • /
    • 2015
  • It is necessary for us to undergo trial and error for eliciting the rational requirement of the acquisition of weapon systems, but the M&S is general approach due to costs and risk of the development. In addition to the acquisition of weapon systems, M&S is extensively employed in the analysis and the training of developed weapon systems. The ADD (Agency for Defense Development) has developed DEVS integrated development environment (QUEST) that provides M&S general ground technique composed of simulation model implementation services, simulation result analysis services, and simulation interface services. This paper describes the interface architecture and the implementation of torpedo target detection section interface simulation system using QUEST. The torpedo target detection section interface simulation system is composed of torpedo target detection section which calculates a result of target detection and the QUEST scenario generator which provides simulation scenario for performance test of the torpedo target detection section. The interface architecture of torpedo target detection section interface simulation system is designed to verify the interface and performance of the torpedo target detection section by linking with the QUEST scenario generator.