• Title/Summary/Keyword: Flooding system

Search Result 427, Processing Time 0.036 seconds

Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information (플로우 분석을 이용한 분산 서비스 거부 공격 탐지 방법)

  • Jun, Jae-Hyun;Kim, Min-Jun;Cho, Jeong-Hyun;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.203-209
    • /
    • 2014
  • Today, Distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. It is very hard to prevent the DDoS attack. Therefore, an intrusion detection system on large network is need to efficient real-time detection. In this paper, we propose the detection mechanism using analysis of flow information against DDoS attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. The OPNET simulation results show that our ideas can provide enough services in DDoS attack.

Review of Safety for Pressure-Relieving Systems of Small to Middle Scale Chemical Plants (중소규모 화학공장의 압력방출시스템에 대한 안전성 검토)

  • Yim, Ji-Pyo;Jin, Dae-Young;Ma, Byung-Chol;Kang, Sung-Ju;Chung, Chang-Bock
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.6
    • /
    • pp.48-55
    • /
    • 2015
  • A variety of safety issues were investigated for chemical reactors using a toluene solvent in case of a fire at small to middle scale chemical plants. The issues covered the operation of pressure-relieving valves and the subsequent discharges of the toluene to the atmosphere either directly or through an absorber, which represent the current practice at most small chemical plants. It was shown that the safety valve on the reactor may not operate within about twenty minutes after an external fire breaks out, but, once relieved, the toluene vapor released directly to the atmosphere may form a large explosion range on the ground. It was also shown that if the discharge is routed to an existing absorber used for the scrubbing of volatile organic compounds or dusts, the column may not operate normally due to excessive pressure drops or flooding, resulting in the hazardous release of toluene vapors. This study proposed two ways of alleviating these risks. The first is to ruduce the discharge itself from the safety valve by using adequate insulation and protection covers on the reactor and then introduce it into the circulation water at the bottom of the absorber through a dip linet pipe equipped with a ring-shaped sparger. This will enhance the condensation of toluene vapors with the reduced effluent vapors treated in the packing layers above. The second is to install a separate quench drum to condense the routed toluene vapors more effectively than the existing absorber.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Development of Urban Flood Risk Maps for Strengthening Urban Planning Toward Disaster Prevention (재해예방형 도시계획 지원을 위한 도시침수 위험도 공간정보 개발)

  • Lee, Jongso;Lee, Sangeun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.2
    • /
    • pp.203-213
    • /
    • 2018
  • This study aims to propose the methods for urban flood risk maps which are useful in strengthening urban planning toward disaster prevention by climate change. Selecting the Gwangju city, Gyeonggi-do as study area, it analyzes urban flood at a RCP 8.5 scenario, and develops gridded information regarding risk components such as hazard, exposure, and vulnerability. It turns out that flooding would occur at a bend interval of the Mokhyun stream and also at the joint of the Gyungan and the Mokhyun streams, showing the similarity with the inundation trace map. In particular, the Songjeong dong is analyzed to be seriously exposed and to be highly vulnerable to flood inundation. With all results together, this study concludes that the proposed methods could be used as a basis for strengthening urban planning toward flood disaster prevention system.

Seasonal Water Change Assessment at Mahanadi River, India using Multi-temporal Data in Google Earth Engine

  • Jena, Ratiranjan;Pradhan, Biswajeet;Jung, Hyung-Sup;Rai, Abhishek Kumar;Rizeei, Hossein Mojaddadi
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.1
    • /
    • pp.1-13
    • /
    • 2020
  • Seasonal changes in river water vary seasonally as well as locationally, and the assessment is essential. In this study, we used the recent technique of post-classification by using the Google earth engine (GEE) to map the seasonal changes in Mahanadi river of Odisha. However,some fixed problems results during the rainy season that affects the livelihood system of Cuttack such as flooding, drowning of children and waste material deposit. Therefore, this study conducted 1) to map and analyse the water density changes and 2) to analyse the seasonal variation of river water to resolve and prevent problem shortcomings. Our results showed that nine types of variation can be found in the Mahanadi River each year. The increase and decrease of intensity of surface water analysed, and it varies in between -130 to 70 ㎥/nf. The highest frequency change is 2900 Hz near Cuttack city. The pi diagram provides the percentage of seasonal variation that can be observed as permanent water (30%), new seasonal (28%), ephemeral (12%), permanent to seasonal (7%) and seasonal (10%). The analysis is helpful and effective to assess the seasonal variation that can provide a platform for the development of Cuttack city that lies in Mahanadi delta.

A study on the development of oil skimming ship for large quantity of oil pollution (대형 오염방제 선박의 개발에 관한 연구)

  • 권기생
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.2 no.1
    • /
    • pp.57-65
    • /
    • 1996
  • The latest date, No. 1 YouII was grounded and sunk into the sea at MAMHYUNGJEDO ( South brother Island) in Sep. 21. 1995, and M.V. Sea Prince of V.L.C.C also made a big oil poullution accident owing to Typhoon "Paei" at front sea of Yeu Choun on Jul. 25. 1995. The large or small scall scale of oil poullution accident frequently was occurred about 300-350 cases per ine(1) year. The countries advanced in marine relations like as, nited Kingdom and Japan, have perfect system The country of expert education, training and oil recovery equipments in oil poullution accidents. The large quantity oil skimming ship's basic condition need general skimming ship which was high speed and large quantity skimming ability , and hve to store the recovered oil into tanks This oil skimming shop are composit the skimmer whuch move up and down according to the wace movements, storage tank which storage the recovered oil in after side, transfer pump which transformed from flooding tank to separating tank and separating tank which separated the oil mixtures, Also there are cylindrical floated which keep the auto positing, gate which keep the auto positing, gate which protect and guide the recovering oil from sea and balance weight for skimmer balance. Also there are cylindrical floated which keep the auto positing, gate which protect and guide the recovering oil from sea and balance weight for skimmer balance. The important arrangement is twin arm which moved by two hinge and move te skimming unit by wave movement. In gate of inside, made long wear in the gate bellow position, there are also connected the flexible hose for oil mixtures drop. The separating tank composited with multi-divided bulkhead for ffective oil and sea water separating by settling and flotation principle. As use the above natural princile and equipment, we can remove the large quantity oil by developed oil skimming ship.ming ship.

  • PDF

Evaluation of Collaborative Filtering Methods for Developing Online Music Contents Recommendation System (온라인 음악 콘텐츠 추천 시스템 구현을 위한 협업 필터링 기법들의 비교 평가)

  • Yoo, Youngseok;Kim, Jiyeon;Sohn, Bangyong;Jung, Jongjin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.7
    • /
    • pp.1083-1091
    • /
    • 2017
  • As big data technologies have been developed and massive data have exploded from users through various channels, CEO of global IT enterprise mentioned core importance of data in next generation business. Therefore various machine learning technologies have been necessary to apply data driven services but especially recommendation has been core technique in viewpoint of directly providing summarized information or exact choice of items to users in information flooding environment. Recently evolved recommendation techniques have been proposed by many researchers and most of service companies with big data tried to apply refined recommendation method on their online business. For example, Amazon used item to item collaborative filtering method on its sales distribution platform. In this paper, we develop a commercial web service for suggesting music contents and implement three representative collaborative filtering methods on the service. We also produce recommendation lists with three methods based on real world sample data and evaluate the usefulness of them by comparison among the produced result. This study is meaningful in terms of suggesting the right direction and practicality when companies and developers want to develop web services by applying big data based recommendation techniques in practical environment.

A study on Inference Network Based on the Resilient Ontology-based Dynamic Multicast Routing Protocol (상황인식 기반의 RODMRP 추론망 연구)

  • Kim, Sun-Guk;Chi, Sam-Hyun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1214-1221
    • /
    • 2007
  • Ad-hoc network is soft wireless communication network that is consisted of mobile node and clusters without helping of infrastructure. We propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. Proposed structure is consisted of context awareness parameters as like distance between each nodes. The proposed architecture performs two types of routing discovery. One is Flooding Discovery Routing(FDR) for comparing analysis step and Local Discovery Routing(LDR) to compose path of node forecast(preservation) step from node's state value. The inference network structure of proposed RODMRP(Resilient Ontology-based Dynamic Multicast Routing Protocol) adopts a tree structure to enhance an efficient packet in various environment between mobile node. We will have developed an algorithm that will desist multi-hierarchy Layered networks to simulate a desired system.

A Study on Water Balance in Stationary Load Proton Exchange Membrane(PEM) Fuel Cell Power Generator (고정 부하를 갖는 PEM 연료전지 발전기에 있어서의 수분 평형에 관한 연구)

  • Bakhtiar, Agung;Oh, Hoo-Kyu;Yoon, Jung-In;Kim, Young-Bok;Choi, Kwang-Hwan
    • Journal of the Korean Solar Energy Society
    • /
    • v.31 no.4
    • /
    • pp.128-135
    • /
    • 2011
  • 일반적으로 PEM 연료전지에서는 수분 균형이 시스템의 효율에 결정적으로 영향을 미치기 때문에, 이에 대한 균형(balance)을 잡는 것이 매우 중요하다. 특히, 촉매 층에서 물이 넘치는 익수현상(flooding)이나 건조현상(drying)이 발생하게 되면 연료전지의 효율이 급격하게 저하하므로, 항상 수분의 균형이 잡히도록 시스템을 제어하는 것이 일반적이다. 이 때,수분의 익수현상이나 건조현상은 PEM 연료전지의 용량과 주위의 환경, 즉 온도와 습도에 많은 영향을 받게 된다. 금번 논문에서는 가정용 규모인 3kW급에서 10kW급까지의 PEM 연료전지를 설치하였을 때, 주위의 환경(온도와 습도)이 수분 이동에 어떠한 영향을 미치는 지를 시간에 따라서 시뮬레이션(simulation)한 결과를 보여주고 있다. 결과에서 유입공기의 온도가 $50^{\circ}C$ 이하일 경우, 고정부하가 5kW급 이하이면 대부분이 건조현상이 발생하였으나, 고정부하가 6kW급 이상이 되면 익수현상이 운전시간이 20분 이내에서 발생하였다. 또한 고정부하를 최고 10kW급까지 올린 경우, 유입공기의 온도가 $50^{\circ}C$까지는 익수현상이 발생하였으나 $60^{\circ}C$ 이상인 경우에는 거의 건조현상이 발생함을 알 수 있었다.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.