• Title/Summary/Keyword: Fault and Security Management

Search Result 33, Processing Time 0.034 seconds

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Employing SNMP to Manage Ubiquitous Environments

  • Murtaza Syed Shariyar;Amin Syed Obaid;Hong Choong Seon;Choi Sang Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.196-198
    • /
    • 2005
  • The vision of ubiquitous computing is becoming a reality now .Service discovery in ubiquitous environment, as well as adding semantics to the data is quite established. But, not many researchers have thought about the management of these devices. We envisage that by integrating SNMP with service discovery protocols, we could leverage the use of management factors (like performance, fault and security management etc) in the business, organizations, and other multi-user environments.

  • PDF

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

A Model of Software Rejuvenation for Survivability (생존성을 위한 소프트웨어 재활기법의 모델)

  • Aung, Khin Mi Mi;Park, Jong-Sou
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1965-1968
    • /
    • 2003
  • The importance of Security measures by means of Physical Security, Network Security and Online/Internet Security. Lack of security is one of the primary obstacles in fielding many technologies in both commercial and DoD networks. Moreover, Internet censorship may be growing and is becoming increasingly sophisticated. In this paper, we will evaluate the Practice to Policy to Theory Approach for survivability by means of software rejuvenation models. These models would be assessed the effectiveness of proactive fault management in operational software systems and determined optimal times to perform rejuvenation.

  • PDF

Preventive Control for Transient Security with Generation Rescheduling Based on Rotor Trajectory Index

  • Verma, Kusum;Niazi, K.R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.465-473
    • /
    • 2015
  • The increasing need to improve transient security assessment of existing or forecasted operating conditions of networks by power system operators is major concern of the power system security monitoring problem at the Energy Management Systems. This paper proposes a preventive control of transient stability with generation rescheduling based on rotor trajectory index obtained using time domain simulations. This index may help power engineers in making operational decision and to obtain a generation configuration with better transient security dispatch. The effectiveness of the proposed methodology is demonstrated on IEEE 39-bus New England system for a three phase fault at different loading conditions with single and multiple line outage cases.

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

A Study on the Improving Power System Reliability According to the Reactive Power Problem in the Bulk Power Station (대전원단지의 무효전력 출력제약에 따른 영향에 대한 연구)

  • Song, Seok-Ha;Joo, Joan-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.73-75
    • /
    • 2002
  • This paper presents the properly method of system security and facility countermeasures. We performed simulation for yearly peak of Korean power system in 2002 under the reactive power problem in a nuclear power plants. Analysis of the problems in power system operation by power flow, fault and stability study. Establishment of power system optimal operating plan by stabilizer and maintaining the reasonable voltage level.

  • PDF

A Dynamic Routing Algorithm for Management of the IMS Nodes Using SNMP (SNMP를 이용한 IMS 노드의 동적 라우팅 알고리즘)

  • Cho, Jae-Hyoung;Lee, Jae-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.214-219
    • /
    • 2011
  • The IMS (IP Multimedia Subsystem) is used for providing multimedia services to network provider. The IMS is composed of many nodes, depending on their function. According to the status (fault, performance, etc.) of each node, we need to provide dynamic routing algorithm. In this paper, we propose a dynamic routing algorithm for management of the IMS nodes using SNMP based on FCAPS (Fault, Configuration, Accounting, Performance and Security) in the IMS network.

A Design of TINA-based Performance Management Architecture

  • Seoung-Woo Kim;Young-Tak Kim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1144-1152
    • /
    • 2000
  • In order to guarantee the user-requested quality-of-service(QoS) and keep the network utilization at maximum it is required to manage the network performance continuously after the network installation. The performance management function should provide the useful information for the network expansion and the capacity reallocation in the future. Currently the TINA provides the specification of the management function of configuration management connection management and fault management ; but the management function of performance management and security management are not well-defined yet. In this paper we propose a TINA-based performance management architecture for the efficient performance management of the heterogeneous networks or NEs with TMN and SNMP management functions. And we examine the proposed architecture into the ATM network (with SNMP and TMN) monitoring. The proposed architecture is based on the distributed processing architecture and the concept the TMN perfo mance management. The proposed architecture have been designed and implemented in multiprocess and multithread structure.

  • PDF

A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System

  • Song, Kyoung-Tack;Kim, Shee-Ihn;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.301-317
    • /
    • 2020
  • An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.