• Title/Summary/Keyword: Priority Traffic

Search Result 534, Processing Time 0.029 seconds

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Analysis of Daily Internet·Gaming·Smartphone Habit and Preference Factors of Moral Machine (인터넷·게임·스마트폰생활 습관과 모랄머신 선호도 요인 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.21-28
    • /
    • 2020
  • Technological advancements such as artificial intelligence, robots, and big data are revolutionizing the entire society. In this paper, we analyzed preliminary teachers' daily internet/gaming/smartphone habit and the difference between preference factors in gender and diagnosis group in the situation of ethical dilemma in driverless cars. The result shows most of the male students are in high risk group of daily internet/gaming usage, and male students tend to be more immersed in games compared to female students, which negatively affects their daily lives. Students who have at least one of the daily internet/gaming/smartphone habits are more likely to be classified as high-risk group in all three of daily internet/gaming/smartphone habit. Fortunately, the students perceived themselves addicted and wanted change their habits. An analysis by a moral machine of these students tells that there is no significant difference in preference between male and female students and among diagnosis groups. However, specifically in the ethical dilemma of driverless cars, all the groups of male, female, normal, high-risk showed they have priority in pedestrians over drivers, a large number of people over small, and people who obey traffic rules over who do not. The tendency was pronounced in female group and high-risk students prioritized people who are older and in lower social status.

Service Differentiation in Ad Hoc Networks by a Modified Backoff Algorithm (애드혹 네트워크 상에서 backoff 알고리즘 수정에 의한 서비스 차별화)

  • Seoung-Seok Kang;Jin Kim
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.414-428
    • /
    • 2004
  • Many portable devices are coming to be commercially successful and provide useful services to mobile users. Mobile devices may request a variety of data types, including text and multimedia data, thanks to the rich content of the Internet. Different types of data and/or different classes of users may need to be treated with different qualities of service. The implementation of service differentiation in wireless networks is very difficult because of device mobility and wireless channel contention when the backoff algorithm is used to resolve contention. Modification of the t)mary exponential backoff algorithm is one possibility to allow the design of several classes of data traffic flows. We present a study of modifications to the backoff algorithm to support three classes of flows: sold, silver, and bronze. For example, the gold c]ass flows are the highest priority and should satisfy their required target bandwidth, whereas the silver class flows should receive reasonably high bandwidth compared to the bronze class flows. The mixture of the two different transport protocols, UDP and TCP, in ad hoc networks raises significant challenges when defining backoff algorithm modifications. Due to the different characteristics of UDP and TCP, different backoff algorithm modifications are applied to each class of packets from the two transport protocols. Nevertheless, we show by means of simulation that our approach of backoff algorithm modification clearly differentiates service between different flows of classes regardless of the type of transport protocol.

Collaboration and Node Migration Method of Multi-Agent Using Metadata of Naming-Agent (네이밍 에이전트의 메타데이터를 이용한 멀티 에이전트의 협력 및 노드 이주 기법)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.105-114
    • /
    • 2004
  • In this paper, we propose a collaboration method of diverse agents each others in multi-agent model and describe a node migration algorithm of Mobile-Agent (MA) using by the metadata of Naming-Agent (NA). Collaboration work of multi-agent assures stability of agent system and provides reliability of information retrieval on the distributed environment. NA, an important part of multi-agent, identifies each agents and series the unique name of each agents, and each agent references the specified object using by its name. Also, NA integrates and manages naming service by agents classification such as Client-Push-Agent (CPA), Server-Push-Agent (SPA), and System-Monitoring-Agent (SMA) based on its characteristic. And, NA provides the location list of mobile nodes to specified MA. Therefore, when MA does move through the nodes, it is needed to improve the efficiency of node migration by specified priority according to hit_count, hit_ratio, node processing and network traffic time. Therefore, in this paper, for the integrated naming service, we design Naming Agent and show the structure of metadata which constructed with fields such as hit_count, hit_ratio, total_count of documents, and so on. And, this paper presents the flow of creation and updating of metadata and the method of node migration with hit_count through the collaboration of multi-agent.

Sewer CCTV Inspection Prioritization Based on Risk Assessment (위험도 기반의 하수관로 CCTV 조사 우선순위 결정 연구)

  • Son, Jooyoung;Lee, Jaehyun;Oh, Jeill
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.3
    • /
    • pp.585-592
    • /
    • 2017
  • Most sewer lines buried in the city are likely to be collapsed due to serious aging. Also, due to the high concentration of development and high population density and traffic, the collapse of the sewer will cause enormous social and economic damage. Therefore, proactive maintenance is required to prevent accidents caused by deteriorated sewer pipe. In order to utilize limited budget effectively, risk-based prioritization methods should be proposed that simultaneously consider the consequence of failure and the probability of failure. In this study, the method of risk-based prioritization of sewer was examined by reviewing various cases of overseas studies and applied to the urban sub-catchment. First, the impact factors that can be secured through the sewer GIS DB in Seoul were derived, and the weight, sub-criteria, and impact score of each impact factor were determined and the consequence of failure was calculated by weight sum method. In addition, the probability of failure was calculated by dividing the service life by the estimated useful life, and the consequence of failure and the probability of failure were classified into five grades by the Jenks natural breaks classification method. The prioritization method was applied to sub-catchment in the Seoul to derive a risk matrix and a risk grade. As a result, 26% of all subjects were selected as the inspection priority subjects with 4-5 risk grade. Therefore, using the risk-based CCTV prioritization methodology, it will be possible to systematically determine the objects that need investigation first.

Development of Seocho Borough Pavement Condition Evaluation Model based on Seoul Metropolitan SPI (서울시도 SPI를 활용한 서초구 도로포장상태 평가모형 개발)

  • Lee, Sang-Yum;Park, Mi-Youn;Kim, Kyoon-Tai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.314-321
    • /
    • 2016
  • Adapting the maintenance criteria of Seoul City pavement is not applicable for borough pavement due to differences between the pavement of Seoul city and the borough, such as priority of maintenance, traffic volume, thickness of pavement, and pavement deterioration rate by distresses. To develop an efficient and reasonable evaluation method of the Seocho borough pavement condition within a limited budget, this study suggested the borough pavement condition evaluation model based on the PMS (Pavement Management System) of Seoul Metropolitan SPI (Seoul Pavement Index). The SPI was modified to predict the remaining life and determine the proper maintenance method for the pavement in Seocho borough. This was suggested to reflect the rate of the designed performance life and field performance life of pavement as well as the pavement condition at the stage of the completion of construction. Primary variables, such as crack, rutting and IRI in the final model affect the overall performance life due to their even composition. Therefore, the suggested model considering the lowered criteria, design performance factor, and construction factor can be used for the more efficient maintenance of Seocho borough pavement.

Application of Critical Pathway in Trauma Patients (외상 환자 관리에서 Critical Pathway의 적용)

  • Shim, Hongjin;Jang, Ji Yong;Lee, Jae Gil;Kim, Seonghwan;Kim, Min Joung;Park, You Seok;Park, Inchel;Kim, Seung Ho
    • Journal of Trauma and Injury
    • /
    • v.25 no.4
    • /
    • pp.159-165
    • /
    • 2012
  • Purpose: For trauma patients, an early-transport and an organized process which are not delayed in hospital stage are necessary. Our hospital developed a procedure, the trauma Critical Pathway (CP), through which a traumatic patient has the priority over other patients, which makes the diagnostic and the therapeutic processes faster than they are for other patients. Methods: The records of patients to whom Trauma CP were applied from January 1, 2011 through April 15. 2012. were reviewed. We checked several time intervals from ER visiting to decision of admission-department, to performing first CT, to applying angio-embolization, to starting emergency operation and to discharging from ER. In addition, outcomes such as duration of ICU stay, hospital stay and mortality were checked and analyzed. Results: The trauma CP was applied to a total of 143 patients, of whom, 48 patients were excluded due to pre-hospital death, ER death, transferring to other hospital and not severe injury. Thus 95 patients (male 64, 67.3%) were enrolled in this study. Fifty-nine patients(62.1%) were injured by the traffic accident. The mortality rate was 10.5% and the mean Revised Trauma Score (RTS) of the patients was $6.4{\pm}2.0$. After visiting ER, decision making for admission was completed, on average, in 3 hours 10 seconds. The mean time intervals for the first CT, angio-embolization, surgery and discharge were 1 hour 20 minutes, 5 hours 16 minutes, 7 hours 26 minutes and 6 hours 13 minutes, respectively. Conclusion: The trauma CP did not show the improvement of time interval outcome, as well as mortality rate. However, this test did show that the trauma CP might be able to reduce delays in procedures for managing trauma patients at the university-based hospitals. To find out the benefit of CP protocol, a large scaled data is required.

Economic Effects of Changes in Spatial Accessibility on Regional Tourism Expenditure Structure (공간적 접근성 변화가 지역관광지출구조에 미치는 경제적 효과 분석)

  • Kwon, Young-Hyun;Shin, Hye-Won
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.2
    • /
    • pp.135-149
    • /
    • 2019
  • This article analyzed economic effects of changes in spatial accessibility on regional touruism expenditure structure resulting from highway investments on Gangwon province, Korea. The Seemingly Unrelated Regress(SUR) model is applied to analyze the structure of change in tourism expenditure of Gangwon Province, and the competition and complementary relationship of tourist demand were analyzed among 18 counties in Gangwon by Dendrinos-Sonis method. The spatial accessibility has a significant effect on the increase in amount of tourist expenditure, but by 1% increase in the accessibility resulted in a reduction of length of stay -0.18% and travel costs -0.34% by respectively. The most powerful variable for improving the on-site economy is the tourist service establishment, which increases one unit, the amount of tourist expenditure increased by 3.6%. Moreover, the competition and supplemental relationship of tourism demands in Gangwon was decided by the conditions under which traffic flow with passing occurred, such as inland or ocean-typed travel attractions, adjacent or remote regions to the highway. The limitations of this study were not able to use raw data of tourism expenditures before and after the opening the highway due to the restriction of priority data, and further research on the appropriate level of spatial accessibility for the regional economy is needed.

Comparison and Analysis on Risk Assessment Models of Coastal Waters considering Human Factors (인적요인을 고려한 연안해역 위험도 평가모델 비교·분석)

  • Kim, In-Chul;An, Kwang
    • Journal of Navigation and Port Research
    • /
    • v.40 no.1
    • /
    • pp.27-34
    • /
    • 2016
  • For the prevention of marine casualties, international bodies have mainly focused on strengthening ship's stability and design, maritime education and training, and improving maritime traffic environment. Statistics analysis on marine casualties showed that most of casualties occurred in coastal waters, especially by human elements. In order to review the conformity of existing prevention measures with the result of the statistics analysis, the IMO's SHELL model was applied to the established measures. As a result, ergonomic approaches were needed for the prevention of human errors in coastal waters, so that the priority should be given to the interface between ship's operator and navigational environment. For this study, Rasmussen's SRK pyramid, which showed decision making mechanism of human, and the US Coast Guard's investigation manual on marine casualties concerning the collapse of safe maritime transportation system were reviewed, and the merits and demerits within the risk assessment tools such as IWRAP, PAWSA, ES model, PARK model, and NURI model were also studied. Although the effectiveness of the existing risk assessment models was proved in ports and approaching channels, it is concluded that the need of new models for converting Korean seafarers' qualitative risk to quantitative risk was proposed so as to print hazard maps which make seafarers instinctively recognize comparative hazard levels of coastal waters.

A Fairness Control Scheme in Multicast ATM Switches (멀티캐스트 ATM 스위치에서의 공정성 제어 방법)

  • 손동욱;손유익
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.134-142
    • /
    • 2003
  • We present an ATM switch architectures based on the multistage interconnection network(MIN) for the efficient multicast traffic control. Many of these applications require multicast connections as well as point-to-point connections. Muiticast connection in which the same message is delivered from a source to arbitrary number of destinations is fundamental in the areas such as teleconferencing, VOD(video on demand), distributed data processing, etc. In designing the multicast ATM switches to support those services, we should consider the fairness(impartiality) and priority control, in addition to the overflow problem, cell processing with large number of copies, and the blocking problem. In particular, the fairness problem which is to distribute the incoming cells to input ports smoothly is occurred when a cell with the large copy number enters upper input port. In this case, the upper input port sends before the lower input port because of the calculating method of running sum, and therefore cell arrived into lower input port Is delayed to next cycle to be sent and transmission delay time becomes longer. In this paper, we propose the cell splitting and group splitting algorithm, and also the fairness scheme on the basis of the nonblocking characteristics for issuing appropriate copy number depending on the number of Input cell in demand. We evaluate the performance of the proposed schemes in terms of the throughput, cell loss rate and cell delay.