• Title/Summary/Keyword: IPS system

Search Result 270, Processing Time 0.026 seconds

Converting Interfaces on Application-specific Network-on-chip

  • Han, Kyuseung;Lee, Jae-Jin;Lee, Woojoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.4
    • /
    • pp.505-513
    • /
    • 2017
  • As mobile systems are performing various functionality in the IoT (Internet of Things) era, network-on-chip (NoC) plays a pivotal role to support communication between the tens and in the future potentially hundreds of interacting modules in system-on-chips (SoCs). Owing to intensive research efforts more than a decade, NoCs are now widely adopted in various SoC designs. Especially, studies on application-specific NoCs (ASNoCs) that consider the heterogeneous nature of modern SoCs contribute a significant share to use of NoCs in actual SoCs, i.e., ASNoC connects non-uniform processing units, memory, and other intellectual properties (IPs) using flexible router positions and communication paths. Although it is not difficult to find the prior works on ASNoC synthesis and optimization, little research has addressed the issues how to convert different protocols and data widths to make a NoC compatible with various IPs. Thus, in this paper, we address important issues on ASNoC implementation to support and convert multiple interfaces. Based on the in-depth discussions, we finally introduce our FPGA-proven full-custom ASNoC.

Comparative LCA of three types of Interior Panel(IP) in Electric Motor Unit(EMU) (전동차 내장패널(Interior Panel)에 대한 비교 전과정평가)

  • Choi, Yo-Han;Lee, Sang-Yong;Kim, Yong-Ki;Lee, Kun-Mo
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.584-588
    • /
    • 2007
  • A comparative Life Cycle Assessment(LCA) among three types of Electric Motor Unit(EMU) Interior Panel(IP) was conducted. A functional unit for comparative LCA is a weight of IP for 1 EMU. It assumed that Manufacturing stage and its upstream processes, Use stage and End of Life(EoL) stage are included in the boundary of product system. For Use stage, the weight of IP causes electricity consumption. It is assumed that aluminum IP is recycled and the other IPs are incinerated at the EoL stage. As comparison results, aluminum IP has much larger environmental impact(5.162pt) than others(FRP IP; 4.069pt, Phenol IP; 4.053pt) even though recycling consideration is included. The manufacturing stage of aluminum has relative big envrionmental impact(1.824pt) and this point make the most important difference from other IPs(FRP IP; 0.1617pt, Phenol IP; 0.4534pt)). Despite of large weight difference between FRP IP(888.56Kg) and phenol IP(315Kg), the final environmental impact result has only little difference(0.016pt, 0.39%). With this result, the EMU designer can choose IP with a consideration of the environmental performance of IP.

  • PDF

Hacking Detection Mechanism of Cyber Attacks Modeling (외부 해킹 탐지를 위한 사이버 공격 모델링)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1313-1318
    • /
    • 2013
  • In order to actively respond to cyber attacks, not only the security systems such as IDS, IPS, and Firewalls, but also ESM, a system that detects cyber attacks by analyzing various log data, are preferably deployed. However, as the attacks be come more elaborate and advanced, existing signature-based detection methods start to face their limitations. In response to that, researches upon symptom detection technology based on attack modeling by employing big-data analysis technology are actively on-going. This symptom detection technology is effective when it can accurately extract features of attacks and manipulate them to successfully execute the attack modeling. We propose the ways to extract attack features which can play a role as the basis of the modeling and detect intelligent threats by carrying out scenario-based modeling.

FRACTURE STRENGTH OF ZIRCONIA MONOLITHIC CROWNS (지르코니아 단일구조 전부도재관의 파절강도)

  • Jeong Hee-Chan
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.44 no.2
    • /
    • pp.157-164
    • /
    • 2006
  • Purpose: The purpose of this study was to compare the fracture strength of the zirconia monolithic all-ceramic crowns according to the thickness(0.5 mm, 0.8 mm, 1.1 mm) and IPS Empress II ceramic crown of 1.5 mm thickness. Material and method: Eight crowns for each of 3 zirconia crown groups were fabricated using CAD/CAM system(Kavo, Germany) and eight Empress II crowns were made from silicone mold and wax pattern. Each crown group was finished in accordance with the specific manufacturer s instruction. All crowns were luted to the metal dies using resin cement and mounted on the testing jig in a universal testing machine. The load was directed at the center of crown with perpendicular to the long axis of each specimen until catastrophic failure occurred. Analysis of variance and Tukey multiple comparison test(p<.05) were applied to the data. Results and Conclusion: 1. The fracture strength of the zirconia monolithic all-ceramic crown was higher thickness increased(p<.05). 2 The fracture strength of 1.1 mm thickness zirconia monolithic all-ceramic crown was higher than the fracture strength of 1.5 mm thickness IPS Empress II crown(p<.05). 3. The fracture strength of 0.5 mm thickness zirconia monolithic all-ceramic crown exceeded maximum occlusal forces.

A Correspondence Training Scenario against Bypassing Information Protection System Attacks (네트워크 정보보호시스템 우회 공격에 대한 대응훈련 시나리오)

  • Hong, Jeong Soo;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.818-828
    • /
    • 2018
  • Nowadays, various security systems are developed and used for protecting information on the network. Although security solutions can prevent some of the security risks, they provide high performance only if used appropriately in accordance with their purposes and functionality. Security solutions commonly used in information protection systems include firewalls, IDS, and IPS. However, despite various information protection systems are introduced, there are always techniques that can threaten the security systems through bypassing them. The purpose of this paper is to develop effective training techniques for responding to the bypass attack techniques in the information security systems and to develop effective techniques that can be applied to the training. In order to implement the test bed we have used GNS3 network simulator, and deployed it on top of virtual operating system using VirtualBox. The proposed correspondence training scenario against bypassing information protection system attacks could be very effectively used to counteract the real attacks.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Design and implementation of the honeycomb structure visualization system for the effective security situational awareness of large-scale networks (대규모 네트워크의 효과적 보안상황 인지를 위한 벌집 구조 시각화 시스템의 설계 및 구현)

  • Park, Jae-Beom;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1197-1213
    • /
    • 2014
  • Due to the increase in size of the computer network, the network security systems such as a firewall, IDS, IPS generate much more vast amount of information related to network security. So detecting signs of hidden security threats has become more difficult. Security personnels' 'Network Security Situational Awareness(NSSA)' is effectively determining the security situation of overall computer network on the basis of the relation between the security events that occur in the several views. The process of situational awareness is divided into three stages of the 'identification,' 'understanding' and 'prediction'. And 'identification' and 'understanding' are prerequisites for 'predicting' and the following appropriate responses. But 'identification' and 'understanding' in the vast amount of information became more difficult. In this paper, we propose Honeycomb security situational awareness visualization system that is designed to help NSSA in large-scale networks by using visualization techniques known effective to the 'identification' and 'understanding' stages. And we identified the empirical effects of this system on the basis of the 'VAST Challenge 2012' data.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Design of Interface Bridge in IP-based SOC

  • 정휘성;양훈모;이문기
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.349-352
    • /
    • 2001
  • As microprocessor and SOC (System On a Chip) performance moves into the GHz speed, the high-speed asynchronous design is becoming challenge due to the disadvantageous power and speed aspects in synchronous designs. The next generation on-chip systems will consist of multiple independently synchronous modules and asynchronous modules for higher performance, so the interface module for data transfer between multiple clocked IPs is designed with Xilinx FPGA and simulated with RISC microprocessor.

  • PDF