• Title/Summary/Keyword: Monitoring-network

Search Result 3,279, Processing Time 0.03 seconds

Current Status and Future Direction of the NIMS/KMA Argo Program (국립기상과학원 Argo 사업의 현황 및 추진 방향)

  • Baek-Jo Kim;Hyeong-Jun Jo;KiRyong Kang;Chul-Kyu Lee
    • Atmosphere
    • /
    • v.33 no.5
    • /
    • pp.561-570
    • /
    • 2023
  • In order to improve the predictability of marine high-impacts weather such as typhoon and high waves, the marine observation network is an essential because it could be rapidly changed by strong air-sea interaction. In this regard, the National Institute of Meteorological Sciences, Korea Meteorological Administration (NIMS/KMA) has promoted the Argo float observation program since 2001 to participate in the International Argo program. In this study, current status and future direction of the NIMS/KMA Argo program are presented through the internal meeting and external expert forum. To date, a total of 264 Argo floats have been deployed into the offshore around the Korean Peninsula and the Northwestern Pacific Ocean. The real-time and delayed modes quality control (QC) system of Argo data was developed, and an official regional data assembling center (call-sign 'KM') was run. In 2002, the Argo homepage was established for the systematic management and dissemination of Argo data for domestic and international users. The future goal of the NIMS/KMA Argo program is to improve response to the marine high-impacts weather through a marine environment monitoring and observing system. The promotion strategy for this is divided into four areas: strengthening policy communication, developing observation strategies, promoting utilization research, and activating international cooperation.

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture

  • Sakthivel V;Prakash Periyaswamy;Jae-Woo Lee;Prabu P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1968-1985
    • /
    • 2024
  • At present, the world is witnessing a rapid change in all the fields of human civilization business interests and goals of all the sectors are changing very fast. Global changes are taking place quickly in all fields - manufacturing, service, agriculture, and external sectors. There are plenty of hurdles in the emerging technologies in agriculture in the modern days. While adopting such technologies as transparency and trust issues among stakeholders, there arises a pressurized necessity on food suppliers because it has to create sustainable systems not only addressing demand-supply disparities but also ensuring food authenticity. Recent studies have attempted to explore the potential of technologies like blockchain and practices for smart and sustainable agriculture. Besides, this well-researched work investigates how a scientific cum technological blockchain architecture addresses supply chain challenges in Precision Agriculture to take up challenges related to transparency traceability, and security. A robust registration phase, efficient authentication mechanisms, and optimized data management strategies are the key components of the proposed architecture. Through secured key exchange mechanisms and encryption techniques, client's identities are verified with inevitable complexity. The confluence of IoT and blockchain technologies that set up modern farms amplify control within supply chain networks. The practical manifestation of the researchers' novel blockchain architecture that has been executed on the Hyperledger network, exposes a clear validation using corroboration of concept. Through exhaustive experimental analyses that encompass, transaction confirmation time and scalability metrics, the proposed architecture not only demonstrates efficiency but also underscores its usability to meet the demands of contemporary Precision Agriculture systems. However, the scholarly paper based upon a comprehensive overview resolves a solution as a fruitful and impactful contribution to blockchain applications in agriculture supply chains.

A Comparative Errors Assessment Between Surface Albedo Products of COMS/MI and GK-2A/AMI (천리안위성 1·2A호 지표면 알베도 상호 오차 분석 및 비교검증)

  • Woo, Jongho;Choi, Sungwon;Jin, Donghyun;Seong, Noh-hun;Jung, Daeseong;Sim, Suyoung;Byeon, Yugyeong;Jeon, Uujin;Sohn, Eunha;Han, Kyung-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_1
    • /
    • pp.1767-1772
    • /
    • 2021
  • Global satellite observation surface albedo data over a long period of time are actively used to monitor changes in the global climate and environment, and their utilization and importance are great. Through the generational shift of geostationary satellites COMS (Communication, Ocean and Meteorological Satellite)/MI (Meteorological Imager sensor) and GK-2A (GEO-KOMPSAT-2A)/AMI (Advanced Meteorological Imager sensor), it is possible to continuously secure surface albedo outputs. However, the surface albedo outputs of COMS/MI and GK-2A/AMI differ between outputs due to Differences in retrieval algorithms. Therefore, in order to expand the retrieval period of the surface albedo of COMS/MI and GK-2A/AMI to secure continuous climate change monitoring linkage, the analysis of the two satellite outputs and errors should be preceded. In this study, error characteristics were analyzed by performing comparative analysis with ground observation data AERONET (Aerosol Robotic Network) and other satellite data GLASS (Global Land Surface Satellite) for the overlapping period of COMS/MI and GK-2A/AMI surface albedo data. As a result of error analysis, it was confirmed that the RMSE of COMS/MI was 0.043, higher than the RMSE of GK-2A/AMI, 0.015. In addition, compared to other satellite (GLASS) data, the RMSE of COMS/MI was 0.029, slightly lower than that of GK-2A/AMI 0.038. When understanding these error characteristics and using COMS/MI and GK-2A/AMI's surface albedo data, it will be possible to actively utilize them for long-term climate change monitoring.

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

Modelling of Fault Deformation Induced by Fluid Injection using Hydro-Mechanical Coupled 3D Particle Flow Code: DECOVALEX-2019 Task B (수리역학적연계 3차원 입자유동코드를 사용한 유체주입에 의한 단층변형 모델링: DECOVALEX-2019 Task B)

  • Yoon, Jeoung Seok;Zhou, Jian
    • Tunnel and Underground Space
    • /
    • v.30 no.4
    • /
    • pp.320-334
    • /
    • 2020
  • This study presents an application of hydro-mechanical coupled Particle Flow Code 3D (PFC3D) to simulation of fluid injection induced fault slip experiment conducted in Mont Terri Switzerland as a part of a task in an international research project DECOVALEX-2019. We also aimed as identifying the current limitations of the modelling method and issues for further development. A fluid flow algorithm was developed and implemented in a 3D pore-pipe network model in a 3D bonded particle assembly using PFC3D v5, and was applied to Mont Terri Step 2 minor fault activation experiment. The simulated results showed that the injected fluid migrates through the permeable fault zone and induces fault deformation, demonstrating a full hydro-mechanical coupled behavior. The simulated results were, however, partially matching with the field measurement. The simulated pressure build-up at the monitoring location showed linear and progressive increase, whereas the field measurement showed an abrupt increase associated with the fault slip We conclude that such difference between the modelling and the field test is due to the structure of the fault in the model which was represented as a combination of damage zone and core fractures. The modelled fault is likely larger in size than the real fault in Mont Terri site. Therefore, the modelled fault allows several path ways of fluid flow from the injection location to the pressure monitoring location, leading to smooth pressure build-up at the monitoring location while the injection pressure increases, and an early start of pressure decay even before the injection pressure reaches the maximum. We also conclude that the clay filling in the real fault could have acted as a fluid barrier which may have resulted in formation of fluid over-pressurization locally in the fault. Unlike the pressure result, the simulated fault deformations were matching with the field measurements. A better way of modelling a heterogeneous clay-filled fault structure with a narrow zone should be studied further to improve the applicability of the modelling method to fluid injection induced fault activation.

INTENSIVE MONITORING SURVEY OF NEARBY GALAXIES (IMSNG)

  • Im, Myungshin;Choi, Changsu;Hwang, Sungyong;Lim, Gu;Kim, Joonho;Kim, Sophia;Paek, Gregory S.H.;Lee, Sang-Yun;Yoon, Sung-Chul;Jung, Hyunjin;Sung, Hyun-Il;Jeon, Yeong-beom;Ehgamberdiev, Shuhrat;Burhonov, Otabek;Milzaqulov, Davron;Parmonov, Omon;Lee, Sang Gak;Kang, Wonseok;Kim, Taewoo;Kwon, Sun-gill;Pak, Soojong;Ji, Tae-Geun;Lee, Hye-In;Park, Woojin;Ahn, Hojae;Byeon, Seoyeon;Han, Jimin;Gibson, Coyne;Wheeler, J. Craig;Kuehne, John;Johns-Krull, Chris;Marshall, Jennifer;Hyun, Minhee;Lee, Seong-Kook J.;Kim, Yongjung;Yoon, Yongmin;Paek, Insu;Shin, Suhyun;Taak, Yoon Chan;Kang, Juhyung;Choi, Seoyeon;Jeong, Mankeun;Jung, Moo-Keon;Kim, Hwara;Kim, Jisu;Lee, Dayae;Park, Bomi;Park, Keunwoo;O, Seong A
    • Journal of The Korean Astronomical Society
    • /
    • v.52 no.1
    • /
    • pp.11-21
    • /
    • 2019
  • Intensive Monitoring Survey of Nearby Galaxies (IMSNG) is a high cadence observation program monitoring nearby galaxies with high probabilities of hosting supernovae (SNe). IMSNG aims to constrain the SN explosion mechanism by inferring sizes of SN progenitor systems through the detection of the shock-heated emission that lasts less than a few days after the SN explosion. To catch the signal, IMSNG utilizes a network of 0.5-m to 1-m class telescopes around the world and monitors the images of 60 nearby galaxies at distances D < 50 Mpc to a cadence as short as a few hours. The target galaxies are bright in near-ultraviolet (NUV) with $M_{NUV}$ < -18.4 AB mag and have high probabilities of hosting SNe ($0.06SN\;yr^{-1}$ per galaxy). With this strategy, we expect to detect the early light curves of 3.4 SNe per year to a depth of R ~ 19.5 mag, enabling us to detect the shock-heated emission from a progenitor star with a radius as small as $0.1R_{\odot}$. The accumulated data will be also useful for studying faint features around the target galaxies and other science projects. So far, 18 SNe have occurred in our target fields (16 in IMSNG galaxies) over 5 years, confirming our SN rate estimate of $0.06SN\;yr^{-1}$ per galaxy.