• 제목/요약/키워드: Network Analysis Application

Search Result 1,481, Processing Time 0.028 seconds

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

Statistical network analysis for epilepsy MEG data

  • Haeji Lee;Chun Kee Chung;Jaehee Kim
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.6
    • /
    • pp.561-575
    • /
    • 2023
  • Brain network analysis has attracted the interest of neuroscience researchers in studying brain diseases. Magnetoencephalography (MEG) is especially proper for analyzing functional connectivity due to high temporal and spatial resolution. The application of graph theory for functional connectivity analysis has been studied widely, but research on network modeling for MEG still needs more. Temporal exponential random graph model (TERGM) considers temporal dependencies of networks. We performed the brain network analysis, including static/temporal network statistics, on two groups of epilepsy patients who removed the left (LT) or right (RT) part of the brain and healthy controls. We investigate network differences using Multiset canonical correlation analysis (MCCA) and TERGM between epilepsy patients and healthy controls (HC). The brain network of healthy controls had fewer temporal changes than patient groups. As a result of TERGM, on the simulation networks, LT and RT had less stable state than HC in the network connectivity structure. HC had a stable state of the brain network.

A Study on the Methodology for Application Traffic Management using RMON (RMON 기반의 응용 서비스 트래픽 관리를 위한 방법론 연구)

  • Han, Jeong-Su;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.413-420
    • /
    • 2002
  • With the rapid development of computer networks, how to speed up network services and to guarantee QoS (Quality-of-Service) for users has drawn much attention from computer scientists. So has the need to manage network application services in order to manage network resources more effectively and meet the users' demands. In this paper, we present methodology of determining the traffic of application services on the network, so as to manage network resources effectively and thus to make application services more user-oriented. On the basis of this methodology and by using RMON MIB we develop analysis parameters and their algorithm to manage the traffic of application services on the network, thus realizing Web-based Application Management System which allows network managers to extract and analyze the Internet application service traffic beyond the limitation of time and space.

Runoff Analysis and Application of Runoff Model of Urban Storm Drainage Network (도시하수도망에 대한 유출모형의 남용과 유출해석)

  • 박성천;이관수
    • Journal of Environmental Health Sciences
    • /
    • v.22 no.4
    • /
    • pp.33-42
    • /
    • 1996
  • This research is to show the application of runoff model and runoff analysis of urban storm drainage network. the runoff models that were used for this research were RRL, ILLUDAS, and SWMM applicative object basin were Geucknak-chun and Sangmu drainage basin located in Seo-Gu, Kwangju. The runoff analysis employed the design storm that distributed the rainfall intensity according to the return period after the huff's method. The result from the comparative analysis of the three runoff models was as follows The difference of peak runoff by return period was 20-30% at Sangmu drainage area of $3.17 Km^2$, while less than 10% at Geucknak-chun drainage area of $12.7 Km^2$. The peak runoff were similar to all models. At the runoff hydrograph the times between rising and descending points were in the sequence of RRL, ILLUDAS and SWMM, but the peak times were similar to all models. The conveyance coefficient to examine the conveyance of the existing drainage network was 0.94-1.37, which means insecure, in Geucknak-chun drainage basin and 0.69-1.16, which means secure, in sangmu drainage basin.

  • PDF

Analysis of Articles Related STEAM Education using Network Text Analysis Method (네트워크 텍스트 분석법을 활용한 STEAM 교육의 연구 논문 분석)

  • Kim, Bang-Hee;Kim, Jinsoo
    • Journal of Korean Elementary Science Education
    • /
    • v.33 no.4
    • /
    • pp.674-682
    • /
    • 2014
  • This study aims to analyze STEAM-related articles and to look into the trend of research to present implications for research directions in the future. To achieve the research purpose, the researcher searched by key words, 'STEAM' and 'Convergence Education' through the RISS. Subjects of analysis were titles of 181 articles in journal articles and conference papers published from 2011 through 2013. Through an analysis of the frequency of the texts that appeared in the titles of the papers, key words were selected, the co-occurrence matrix of the key words was established, and using network maps, degree centrality and betweenness centrality, and structural equivalence, a network text analysis was carried out. For the analysis, KrKwic, KrTitle, UCINET and NetMiner Program were used, and the results were as follows: in the result of the text frequency analysis, the key words appeared in order of 'program', 'development', 'base' and 'application'. Through the network among the texts, a network built up with core hubs such as 'program', 'development', 'elementary' and 'application' was found, and in the degree centrality analysis, 'program', 'elementary', 'development' and 'science' comprised key issues at a relatively high value, which constituted the pivot of the network. As a result of the structural equivalence analysis, regarding the types of their respective relations, it was analyzed that there was a similarity in four clusters such as the development of a program (1), analysis of effects (2) and the establishment of a theoretical base (1).

Electrical Engineering Design Method Based on Neural Network and Application of Automatic Control System

  • Zhe, Zhang;Yongchang, Zhang
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.755-762
    • /
    • 2022
  • The existing electrical engineering design method and the dynamic objective function in the application process of automatic control system fail to meet the unbounded condition, which affects the control tracking accuracy. In order to improve the tracking control accuracy, this paper studies the electrical engineering design method based on neural network and the application of automatic control system. This paper analyzes the structure and working mechanism of electrical engineering automation control system by an automation control model with main control objectives. Following the analysis, an optimal solution of controllability design and fault-tolerant control is figured out. The automatic control power coefficient is distributed based on an ideal control effect of system. According to the distribution results, an automatic control algorithm is based on neural network for accurate control. The experimental results show that the electrical automation control method based on neural network can significantly reduce the control following error to 3.62%, improve the accuracy of the electrical automation tracking control, thus meeting the actual production needs of electrical engineering automation control system.

Social Network Analysis and Its Applications for Authors and Keywords in the JKSS

  • Kim, Jong-Goen;Choi, Soon-Kuek;Choi, Yong-Seok
    • Communications for Statistical Applications and Methods
    • /
    • v.19 no.4
    • /
    • pp.547-558
    • /
    • 2012
  • Social network analysis is a graphical technique to search the relationships and characteristics of nodes (people, companies, and organizations) and an important node for positioning a visualized social network figure; however, it is difficult to characterize nodes in a social network figure. Therefore, their relationships and characteristics could be presented through an application of correspondence analysis to an affiliation matrix that is a type of similarity matrix between nodes. In this study, we provide the relationships and characteristics around authors and keywords in the JKSS(Journal of the Korean Statistical Society) of the Korean Statistical Society through the use of social network analysis and correspondence analysis.

Application of artificial neural networks to the response prediction of geometrically nonlinear truss structures

  • Cheng, Jin;Cai, C.S.;Xiao, Ru-Cheng
    • Structural Engineering and Mechanics
    • /
    • v.26 no.3
    • /
    • pp.251-262
    • /
    • 2007
  • This paper examines the application of artificial neural networks (ANN) to the response prediction of geometrically nonlinear truss structures. Two types of analysis (deterministic and probabilistic analyses) are considered. A three-layer feed-forward backpropagation network with three input nodes, five hidden layer nodes and two output nodes is firstly developed for the deterministic response analysis. Then a back propagation training algorithm with Bayesian regularization is used to train the network. The trained network is then successfully combined with a direct Monte Carlo Simulation (MCS) to perform a probabilistic response analysis of geometrically nonlinear truss structures. Finally, the proposed ANN is applied to predict the response of a geometrically nonlinear truss structure. It is found that the proposed ANN is very efficient and reasonable in predicting the response of geometrically nonlinear truss structures.

Analysis of Indeterminate Truss Structures by Element-Focused Network Approach (요소 중심의 네트워크 접근법을 이용한 부정정 트러스 구조 해석)

  • Han, Yicheol
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • Element-focused network analysis method for truss structure is proposed. The propagation process of loads from external loads to connected other elements is similar to that of connections between nodes in accordance with attachment rule in a network. Here nodes indicate elements in a truss structure and edges represent propagated loads. Therefore, the flows of loads in a truss structure can be calculated using the network analysis method, and consequently the structure can also be analyzed. As a first step to analyze a truss structure as a network, we propose a local load transfer rule in accordance with the topology of elements, and then analyze the loads of the truss elements. Application of this method reveal that the internal loads and reactions caused by external loads can be accurately estimated. Consequently, truss structures can be considered as networks and network analysis method can be applied to further complex truss structures.