• Title/Summary/Keyword: Network Security Modeling

Search Result 190, Processing Time 0.025 seconds

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Methods for Assessing the Innovative Capacity of Agri-food Enterprises

  • Orlova-Kurilova, Olga;Liubimov, Ivan;Yaremovich, Petr;Safronska, Iryna;Voron'ko-Nevidnycha, Tetiana;Dziuba, Mykola;Serhiienko, Serhii;Tkachenko, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.503-512
    • /
    • 2021
  • The article proposes a methodical approach to assessing the innovative capacity of agri-food enterprises. This approach is based on the calculation of personnel, investment, technical and technological, information components of the ability of agri-food enterprises to innovate. The algorithm of search of production, intellectual, financial, information resources reserves, which are necessary for functioning of the enterprises of agro-food sphere, is defined. The approach developed by the authors, in contrast to the existing ones in the scientific world, allows the tools of mathematical modeling to identify shortcomings in the development of agri-food enterprises, to forecast the development of these enterprises and on this basis to form different models of market stakeholders. The method proposed by the authors to assess the innovative capacity of agri-food enterprises allows market participants to assess the current state of agri-food enterprises and form the necessary management levers to influence its activities to eliminate market failures and pitfalls.

Simulation of Dynamic Characteristics of a Trigenerative Climate Control System Based On Peltier Thermoelectric Modules

  • Vasilyev, G.S.;Kuzichkin, O.R.;Surzhik, D.I.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.252-257
    • /
    • 2021
  • The application of the principle of trigeneration allows to simultaneously provide electricity to power electronic devices, as well as heat and cold to create the necessary microclimate of the premises and increase efficiency compared to separate cooling and heating systems. The use of Peltier thermoelectric modules (TEM) as part of trigenerative systems allows for smooth and precise control of the temperature regime, high manufacturability and reliability due to the absence of moving parts, resistance to shock and vibration, and small weight and size parameters of the system. One of the promising areas of improvement of trigenerative systems is their modeling and optimization based on the automatic control theory. A block diagram and functional model of an energy-saving trigenerative climate control system based on Peltier modules are developed, and the transfer functions of an open and closed system are obtained. The simulation of the transient characteristics of the system with varying parameters of the components is performed. The directions for improving the quality of transients in the climate control system are determined, as well as the prospects of the proposed methodology for modeling and analyzing control systems operating in substantially nonlinear modes.

Results Of Mathematical Modeling Of Organizational And Technological Solutions Of Effective Use Of Available Resource Of Modern Roofs

  • Arutiunian, Iryna;Mishuk, Katerina;Dankevych, Natalia;Yukhymenko, Artem;Anin, Victor;Poltavets, Maryna;Sharapova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.49-54
    • /
    • 2021
  • Relative to the outer surface of the mastic coating, the reliability of the available waterproofing resource is determined by the ability to stabilize the structural characteristics in difficult climatic conditions. Organic components of mastic as a result of solar radiation, elevated temperatures and their alternating change, atmospheric oxidants, especially in industrial areas, have a tendency to self-polymerization and loss of low molecular weight components. This is the gradual loss of deformability and the transition to brittleness with its tendency to crack as the reasons for the gradual transition from normal to emergency operating condition.The presented mechanism of functioning of the coating surface indicates the expediency of increasing its components, able to stabilize the structure and prevent changes in deformability.Durability, hydrophobicity, water displacement, water absorption are accepted as estimating indicators. The main dependences of the influence of the lost additional components of mastic on the operational properties of the formed coating characterize the ability to provide successful resistance to environmental influences and longer stability. As a result, mastic acquires additional service life.

Text Mining in Online Social Networks: A Systematic Review

  • Alhazmi, Huda N
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.396-404
    • /
    • 2022
  • Online social networks contain a large amount of data that can be converted into valuable and insightful information. Text mining approaches allow exploring large-scale data efficiently. Therefore, this study reviews the recent literature on text mining in online social networks in a way that produces valid and valuable knowledge for further research. The review identifies text mining techniques used in social networking, the data used, tools, and the challenges. Research questions were formulated, then search strategy and selection criteria were defined, followed by the analysis of each paper to extract the data relevant to the research questions. The result shows that the most social media platforms used as a source of the data are Twitter and Facebook. The most common text mining technique were sentiment analysis and topic modeling. Classification and clustering were the most common approaches applied by the studies. The challenges include the need for processing with huge volumes of data, the noise, and the dynamic of the data. The study explores the recent development in text mining approaches in social networking by providing state and general view of work done in this research area.

Phrase-Chunk Level Hierarchical Attention Networks for Arabic Sentiment Analysis

  • Abdelmawgoud M. Meabed;Sherif Mahdy Abdou;Mervat Hassan Gheith
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.120-128
    • /
    • 2023
  • In this work, we have presented ATSA, a hierarchical attention deep learning model for Arabic sentiment analysis. ATSA was proposed by addressing several challenges and limitations that arise when applying the classical models to perform opinion mining in Arabic. Arabic-specific challenges including the morphological complexity and language sparsity were addressed by modeling semantic composition at the Arabic morphological analysis after performing tokenization. ATSA proposed to perform phrase-chunks sentiment embedding to provide a broader set of features that cover syntactic, semantic, and sentiment information. We used phrase structure parser to generate syntactic parse trees that are used as a reference for ATSA. This allowed modeling semantic and sentiment composition following the natural order in which words and phrase-chunks are combined in a sentence. The proposed model was evaluated on three Arabic corpora that correspond to different genres (newswire, online comments, and tweets) and different writing styles (MSA and dialectal Arabic). Experiments showed that each of the proposed contributions in ATSA was able to achieve significant improvement. The combination of all contributions, which makes up for the complete ATSA model, was able to improve the classification accuracy by 3% and 2% on Tweets and Hotel reviews datasets, respectively, compared to the existing models.

Digital Twin based Household Water Consumption Forecasting using Agent Based Modeling

  • Sultan Alamri;Muhammad Saad Qaisar Alvi;Imran Usman;Adnan Idris
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.147-154
    • /
    • 2024
  • The continuous increase in urban population due to migration of mases from rural areas to big cities has set urban water supply under serious stress. Urban water resources face scarcity of available water quantity, which ultimately effects the water supply. It is high time to address this challenging problem by taking appropriate measures for the improvement of water utility services linked with better understanding of demand side management (DSM), which leads to an effective state of water supply governance. We propose a dynamic framework for preventive DSM that results in optimization of water resource management. This paper uses Agent Based Modeling (ABM) with Digital Twin (DT) to model water consumption behavior of a population and consequently forecast water demand. DT creates a digital clone of the system using physical model, sensors, and data analytics to integrate multi-physical quantities. By doing so, the proposed model replicates the physical settings to perform the remote monitoring and controlling jobs on the digital format, whilst offering support in decision making to the relevant authorities.

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.

A Hybrid Modeling Method for RCS Worm Simulation (RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법)

  • Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.43-53
    • /
    • 2007
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.

Exploring trends in U.N. Peacekeeping Activities in Korea through Topic Modeling and Social Network Analysis (토픽모델링과 사회연결망 분석을 통한 우리나라 유엔 평화유지활동 동향 탐색)

  • Donghyeon Jung;Chansong Kim;Kangmin Lee;Soeun Bae;Yeon Seo;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.246-262
    • /
    • 2023
  • The purpose of this study is to identify the major peacekeeping activities that the Korean armed forces has performed from the past to the present. To do this, we collected 692 press releases from the National Defense Daily over the past 20 years and performed topic modeling and social network analysis. As a result of topic modeling analysis, 112 major keywords and 8 topics were derived, and as a result of examining the Korean armed forces's peacekeeping activities based on the topics, 6 major activities and 2 related matters were identified. The six major activities were 'Northeast Asian defense cooperation', 'multinational force activities', 'civil operations', 'defense diplomacy', 'ceasefire monitoring group', and 'pro-Korean activities', and 'general troop deployment' related to troop deployment in general. Next, social network analysis was performed to examine the relationship between keywords and major keywords related to topic decision, and the keywords 'overseas', 'dispatch', and 'high level' were derived as key words in the network. This study is meaningful in that it first examined the topic of the Korean armed forces's peacekeeping activities over the past 20 years by applying big data techniques based on the National Defense Daily, an unstructured document. In addition, it is expected that the derived topics can be used as a basis for exploring the direction of development of Korea's peacekeeping activities in the future.