• Title/Summary/Keyword: Link-bypass

Search Result 19, Processing Time 0.026 seconds

A Family of Non-Isolated Photovoltaic Grid Connected Inverters without Leakage Current Issues

  • Ji, Baojian;Wang, Jianhua;Hong, Feng;Huang, Shengming
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.920-928
    • /
    • 2015
  • Transformerless solar inverters have a higher efficiency than those with an isolation link. However, they suffer from a leakage current issue. This paper proposes a family of single phase six-switch transformerless inverter topologies with an ac bypass circuit to solve the leakage current problem. These circuits embed two unidirectional freewheeling current units into the midpoint of a full bridge inverter, to obtain a freewheeling current path, which separates the solar panel from the grid in the freewheeling state. The freewheeling current path contains significantly fewer devices and poor performance body diodes are not involved, leading to a higher efficiency. Meanwhile, it is not necessary to add a voltage balancing control method when compared with the half bridge inverter. Simulation and experiments are provided to validate the proposed topologies.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Dynamic Service Chaining Method Considering Performance of Middlebox Over SDN (소프트웨어 정의 네트워크상의 미들박스 성능을 고려한 동적 서비스 체이닝 방안)

  • Oh, Hyeongseok;Kim, Namgi;Choi, Yoon-Ho
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.47-55
    • /
    • 2015
  • The conventional dynamic routing methods in Software Defined Networks (SDN) set the optimal routing path based on the minimum link cost, and thereby transmits the incoming or outgoing flows to the terminal. However, in this case, flows can bypass the middlebox that is responsible for security service and thus, thus the network can face a threat. That is, while determining the best route for each flow, it is necessary to consider a dynamic service chaining, which routes a flow via a security middlebox. Therefore, int this paper, we propose a new dynamic routing method that considers the dynamic flow routing method combined with the security service functions over the SDN.

Dynamic Analysis and Controller Design for Standalone Operation of Photovoltaic Power Conditioners with Energy Storage

  • Park, Sun-Jae;Shin, Jong-Hyun;Park, Joung-Hu;Jeon, Hee-Jong
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2004-2012
    • /
    • 2014
  • Energy storage devices are necessary to obtain stable utilization of renewable energy sources. When black-out occurs, distributed renewable power sources with energy storage devices can operate under standalone mode as uninterruptable power supply. This paper proposes a dynamic response analysis with small-signal modeling for the standalone operation of a photovoltaic power generation system that includes a bidirectional charger/discharger with a battery. Furthermore, it proposes a DC-link voltage controller design of the entire power conditioning system, using the storage current under standalone operation. The purpose of this controller is to guarantee the stable operation of the renewable source and the storage subsystem, with the power conversion of a very efficient bypass-type PCS. This paper presents the operating principle and design guidelines of the proposed scheme, along with performance analysis and simulation. Finally, a hardware prototype of 1-kW power conditioning system with an energy storage device is implemented, for experimental verification of the proposed converter system.

Application of STANAG-4586 Ed. 4 based Standardization for Up-to-Dated Interoperability of Military UAV System

  • Kim, Hack-Joon;Yoon, Chang-Bae;Hong, Su-Woon;Lee, Woo-Sin;Yoo, In-Deok;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.99-107
    • /
    • 2019
  • With the development of various types of military Unmanned Aircraft(UA)s, the need for interworking and integration between different platforms gradually increased. In order to ensure interoperability at each military UA System(UAS) level, North Atlantic Treaty Organization(NATO) has established STANAG-4586 "Standard Interfaces of Unmanned Aircraft(UA) Control Systems(UCS) for NATO UA Interoperability-Interface Control Document". This paper looks at the basic design structure of STANAG-4586 and the changes on Edition 4 to enhance joint operational capability through reflecting and updating the interoperability design of the military UAS. In particular, we analyze the enhanced Datalink Transition/Handover Procedure and Autonomous functions, one of the biggest features added to the edition. Through this, we propose a modification of UA data link exclusive control using UA Bypass structure, which was impossible in the one-to-one communication structure between existing UA and Core UCS(CUCS). We also suggest ways to improve UA operational reliability by applying Autonomous Functions that directly decides how to deal with emergency situations, rather than by a remote operator over CUCS.

TCP Accelerator for DVB-RCS SATCOM Dynamic Bandwidth Environment with HAIPE

  • Kronewitter, F. Dell;Ryu, Bo;Zhang, Zhensheng;Ma, Liangping
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.518-524
    • /
    • 2011
  • A high assurance IP encryption (HAIPE) compliant protocol accelerator is proposed for military networks consisting of red (or classified) networks and black (or unclassified) networks. The boundary between red and black sides is assumed to be protected via a HAIPE device. However, the IP layer encryption introduces challenges for bandwidth on demand satellite communication. The problems experienced by transmission control protocol (TCP) over satellites are well understood: While standard modems (on the black side) employ TCP performance enhancing proxy (PEP) which has been shown to work well, the HAIPE encryption of TCP headers renders the onboard modem's PEP ineffective. This is attributed to the fact that under the bandwidth-on-demand environment, PEP must use traditional TCP mechanisms such as slow start to probe for the available bandwidth of the link (which eliminates the usefulness of the PEP). Most implementations recommend disabling the PEP when a HAIPE device is used. In this paper, we propose a novel solution, namely broadband HAIPE-embeddable satellite communications terminal (BHeST), which utilizes dynamic network performance enhancement algorithms for high latency bandwidth-on-demand satellite links protected by HAIPE. By moving the PEP into the red network and exploiting the explicit congestion notification bypass mechanism allowed by the latest HAIPE standard, we have been able to regain PEP's desired network enhancement that was lost due to HAIPE encryption (even though the idea of deploying PEP at the modem side is not new). Our BHeST solution employs direct video broadcast-return channel service (DVB-RCS), an open standard as a means of providing bandwidth-on-demand satellite links. Another issue we address is the estimation of current satellite bandwidth allocated to a remote terminal which is not available in DVBRCS. Simulation results show that the improvement of our solution over FIX PEP is significant and could reach up to 100%. The improvement over the original TCP is even more (up to 500% for certain configurations).

Flexible Disjoint Multipath Routing Protocol Using Local Decision in Wireless Sensor Networks (무선 센서 네트워크에서 지역 결정을 통한 유연한 분리형 다중경로 라우팅 프로토콜)

  • Jung, Kwansoo;Yeom, Heegyun;Park, Hosung;Lee, Jeongcheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.911-923
    • /
    • 2013
  • Multipath routing is one of challenging issues for improving the reliability of end-to-end data delivery in wireless sensor networks. Recently, a disjointedness and management of path have been studying to enhance the robustness and efficiency of the multipath routing. However, previous multipath routing protocols exploit the disjointed multipath construction method that is not to consider the wireless communication environment. In addition, if a path failures is occurred due to the node or link failures in the irregular network environment, they maintain the multipath through the simple method that to construct a new extra path. Even some of them have no a method. In order to cope with the insufficiency of path management, a hole detouring scheme, to bypass the failures area and construct the new paths, was proposed. However, it also has the problem that requires a heavy cost and a delivery suspension to the some or all paths in the hole detouring process due to the centralized and inflexible path management. Due to these limitations and problems, the previous protocols may lead to the degradation of data delivery reliability and the long delay of emergency data delivery. Thus, we propose a flexible disjoint multipath routing protocol which constructs the radio disjoint multipath by considering irregular and constrained wireless sensor networks. It also exploits a localized management based on the path priority in order to efficiently maintain the flexible disjoint multipath. We perform the simulation to evaluate the performance of the proposed method.