• 제목/요약/키워드: Network Security Modeling

검색결과 189건 처리시간 0.027초

Modeling and Simulation of the Photocatalytic Treatment of Wastewater using Natural Bauxite and TiO2 doped by Quantum Dots

  • Becheikh, Nidhal;Eladeb, Aboulbaba;Ghazouani, Nejib
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.91-96
    • /
    • 2022
  • The photocatalytic degradation of salicylic acid takes place in several stages involving coupled phenomena, such as the transport of molecules and the chemical reaction. The systems of transport equations and the photocatalytic reaction are numerically solved using COMSOL Mutiphysics (CM) simulation software. CM will make it possible to couple the phenomena of flow, the transport of pollutants (salicylic acid) by convection and diffusion, and the chemical reaction to the catalytic area (bauxite or TiO2 doped by nanoparticles). The simulation of the conversion rate allows to correctly fit the experimental results. The temporal simulation shows that the reaction reaches equilibrium after a transitional stage lasting over one minute. The outcomes of the study highlight the importance of diffusion in the boundary layer and the usefulness of injecting micro-agitation into the microchannel flow. Under such conditions, salicylic acid degrades completely.

A New Methodology for Software Reliability based on Statistical Modeling

  • Avinash S;Y.Srinivas;P.Annan naidu
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.157-161
    • /
    • 2023
  • Reliability is one of the computable quality features of the software. To assess the reliability the software reliability growth models(SRGMS) are used at different test times based on statistical learning models. In all situations, Tradational time-based SRGMS may not be enough, and such models cannot recognize errors in small and medium sized applications.Numerous traditional reliability measures are used to test software errors during application development and testing. In the software testing and maintenance phase, however, new errors are taken into consideration in real time in order to decide the reliability estimate. In this article, we suggest using the Weibull model as a computational approach to eradicate the problem of software reliability modeling. In the suggested model, a new distribution model is suggested to improve the reliability estimation method. We compute the model developed and stabilize its efficiency with other popular software reliability growth models from the research publication. Our assessment results show that the proposed Model is worthier to S-shaped Yamada, Generalized Poisson, NHPP.

네트워크 보안 효율성 제고를 위한 보안 QoS(Quality of Service) 측정방법론 연구 (A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency)

  • 노시춘
    • 융합보안논문지
    • /
    • 제11권1호
    • /
    • pp.39-48
    • /
    • 2011
  • QoS(Quality of Service)는 ITU-T Rec. E.800에 의해 서비스를 사용하는 형태, 특성 그리고 요구 수준에 따라 사용자의 요구에 부응하여 제공할 수 있는 네트워크 서비스의 성능지표로 표현된다. 네트워크를 활용하는 정보시스템에서 최종적인 목표는 요구되는 시간내에 목적하는 성능을 확보하는 것이다. 본 연구에서 제안하는 보안 QoS 프레임워크는 측정 메트릭스, 측정스케쥴, 측정도구, 측정의순서, 측정 결과분석에 관련된 사항으로 구성된다. 보안 QoS에서 네트워크보안의 정보보호기능과 시스템기능을 분리하여 관리하지 않고 연계하여 종합 메커니즘으로 구성 및 적용할 경우 종합적인 정보보호 효율은 시너지효과로 나타난다. 본 연구는 정보보호기능과 제반 시스템기능을 연계하여 정보보호기능을 적용했을 경우의 연동메커니즘 구현방법 개발과 그 성과를 측정하기 위한 것이다. 본 연구에서 제안한 네트워크 보안 효율성 제고를 위한 보안 QoS측정방안 연구 방법론을 통해 체계적인 측정환경을 설계할 경우 운용시스템상에서 보안 효율성 측정이 가능함이 입증되었고 측정 메커니즘을 통해서 개선된 네트워킹기능과 정보시스템 기능을 위한 효율성제고 방법론 개발이 가능함을 보여주고 있다.

State-Based Behavior Modeling in Software and Systems Engineering

  • Sabah Al-Fedaghi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.21-32
    • /
    • 2023
  • The design of complex man-made systems mostly involves a conceptual modeling phase; therefore, it is important to ensure an appropriate analysis method for these models. A key concept for such analysis is the development of a diagramming technique (e.g., UML) because diagrams can describe entities and processes and emphasize important aspects of the systems being described. The analysis also includes an examination of ontological concepts such as states and events, which are used as a basis for the modeling process. Studying fundamental concepts allows us to understand more deeply the relationship between these concepts and modeling frameworks. In this paper, we critically analyze the classic definition of a state utilizing the Thinging machine (TM) model. States in state machine diagrams are considered the appropriate basis for modeling system behavioral aspects. Despite its wide application in hardware design, the integration of a state machine model into a software system's modeling requirements increased the difficulty of graphical representation (e.g., integration between structural and behavioral diagrams). To understand such a problem, in this paper, we project (create an equivalent representation of) states in TM machines. As a case study, we re-modeled a state machine of an assembly line system in a TM. Additionally, we added possible triggers (transitions) of the given states to the TM representation. The outcome is a complicated picture of assembly line behavior. Therefore, as an alternative solution, we re-modeled the assembly line based solely on the TM. This new model presents a clear contrast between state-based modeling of assembly line behavior and the TM approach. The TM modeling seems more systematic than its counterpart, the state machine, and its notions are well defined. In a TM, states are just compound events. A model of a more complex system than the one in the assembly line has strengthened such a conclusion.

SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석 (Simulation-based Network Vulnerability Analysis Using the SIMVA)

  • 유용준;이장세;지승도
    • 한국시뮬레이션학회논문지
    • /
    • 제13권3호
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

  • Mona faraj Nasser alwahabi;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.41-48
    • /
    • 2024
  • Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application's integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows-Abadi-Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully.

계약망 프로토콜과 DEVS 모델링을 통한 센서네트워크 보안 모델의 설계 (Design of Sensor Network Security Model using Contract Net Protocol and DEVS Modeling)

  • 허수만;서희석
    • 디지털산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.41-49
    • /
    • 2008
  • Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In order to reduce damage from these attacks, several security solutions have been proposed. Researchers have also proposed some techniques to increase the energy-efficiency of such security solutions. In this paper, we propose a CH(Cluster Header) selection algorithm to choose low power delivery method in sensor networks. The CNP(Contract Net Protocol), which is an approach to solve distribution problems, is applied to choose CHs for event sensing. As a result of employing CNP, the proposed method can prevent dropping of sensing reports with an insufficient number of message authentication codes during the forwarding process, and is efficient in terms of energy saving.

소셜 네트워크 서비스의 지속적 사용의도에 영향을 미치는 서비스 및 개인 특성에 대한 실증연구 (An Empirical Study on the Influence of Social Network Services(SNS) and Individual Characteristics on Intention to Continuous Use of SNS)

  • 김상현;박현선
    • 한국IT서비스학회지
    • /
    • 제11권3호
    • /
    • pp.17-38
    • /
    • 2012
  • Social network service(SNS), provided by social network sites such as Facebook, Twitter and Cyworld is rapidly growing in online business. Furthermore, many companies have growing interests in finding effective ways to use SNSs for their innovations, marketing and advertisement. In fact, firms have recognized the utility value of the SNS for their business. In this aspect, this study attempts to identify key factors influencing the intention to continuous use of SNSs. Based on the UTAUT(the Unified Theory of Acceptance and Usage of Technology)model, this study proposes the research model, including the effects of social network service characteristics(social relationship support, information sharing, image expression) and individual characteristics(self-disclosure, extroversion, familiarity) on performance expectancy as well as the moderating effect of perceived information security among UTAUT variables. The 412T sets of data collected in a survey were tested against the modeling using SEM using SmartPLS. Results indicated that social network service and individual characteristics had significant effect on performance expectancy with exception of self-disclosure. In addition, the moderating effect of perceived information security had significant effect. The results had important implications for firms providing SNSs hoping to develop a successful business model.

Diagrammatic Formalism for Complex Systems: More than One Way to Eventize a Railcar System

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.130-141
    • /
    • 2021
  • This paper is in the intersection of software engineering and system engineering, two intimately intertwined disciplines. A dominating theme in this paper is the integral conceptualization of systems at large, as well as an underlying concern with software systems. In the software development life cycle, challenges still exist in translating requirements into a design artifact and then into an implementation (e.g., coding), then validating the results. From our perspective, software engineering requires an integrating paradigm toward a unified modeling orientation. Many methodologies, languages, and tools exist for facilitating system development processes. This paper is a venture into project development. To focus the materials, we concentrate on Harel's novel (and classic) development environment, which integrates a scenario-based engineering object orientation and statecharts through developing a railcar system. The railcar system is used as a detailed sample of translating requirements into a design artifact and then into an implementation, then validating the result. The project is re-cased as a single integrated modeling endeavor to be contrasted with the scenario and statecharts' development. The result of this scheme is an enriched understanding through experimenting with and contrasting various development methods of software projects.

Aspects Of Architectural Design Using BIM Technologies

  • Tikhonova, Oleksandra;Selikhova, Yana;Donenko, Vasyl;Kulik, Mykhailo;Frolov, Denys;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.85-92
    • /
    • 2022
  • In this article, we look at the application of BIM (Building Information Modeling) in sustainable infrastructures. In response to global warming, energy shortages, and environmental degradation, people are trying to build eco-friendly, low-carbon cities and promote eco-friendly homes. A "green" building is the entire life cycle of a building that includes maximizing the conservation of resources (energy, water, land, and materials), protecting the environment, reducing pollution, providing people with healthy, comfortable, and efficient use of space, and establishing harmony between nature and architecture. In the field of ecological and sustainable buildings, BIM modeling can be integrated into buildings with analog energy, air flow analysis, and solar building ecosystems. Using BIM technologies, you can reduce the amount of waste and improve the quality of construction. These technologies create "visualization" of digital building models through multidimensional digital design solutions that provide" modeling and analysis "of Scientific Collaboration Platforms for designers, architects, utility engineers, developers, and even end users. Moreover, BIM helps them use three-dimensional digital models in project design and construction and operational management.