• Title/Summary/Keyword: cyber infrastructure

Search Result 218, Processing Time 0.029 seconds

Establishing a stability switch criterion for effective implementation of real-time hybrid simulation

  • Maghareh, Amin;Dyke, Shirley J.;Prakash, Arun;Rhoads, Jeffrey F.
    • Smart Structures and Systems
    • /
    • v.14 no.6
    • /
    • pp.1221-1245
    • /
    • 2014
  • Real-time hybrid simulation (RTHS) is a promising cyber-physical technique used in the experimental evaluation of civil infrastructure systems subject to dynamic loading. In RTHS, the response of a structural system is simulated by partitioning it into physical and numerical substructures, and coupling at the interface is achieved by enforcing equilibrium and compatibility in real-time. The choice of partitioning parameters will influence the overall success of the experiment. In addition, due to the dynamics of the transfer system, communication and computation delays, the feedback force signals are dependent on the system state subject to delay. Thus, the transfer system dynamics must be accommodated by appropriate actuator controllers. In light of this, guidelines should be established to facilitate successful RTHS and clearly specify: (i) the minimum requirements of the transfer system control, (ii) the minimum required sampling frequency, and (iii) the most effective ways to stabilize an unstable simulation due to the limitations of the available transfer system. The objective of this paper is to establish a stability switch criterion due to systematic experimental errors. The RTHS stability switch criterion will provide a basis for the partitioning and design of successful RTHS.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

Trend and Prospect of Security System Technology for Network (네트워크를 위한 보안 시스템의 기술 개발 동향 및 전망)

  • Yang, Kyung-Ah;Shin, Dong-Woo;Kim, Jong-Kyu;Bae, Byung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2018
  • The latest cyber attack utilizing advanced technologies is more rapidly advancing than developing speed of defense technology, thereby escalates the security risk. In responding to this recent threat, academia and industries are developing some sophisticated security technologies applying various methods. Based on these technologies, security systems are used in many fields. This article aims to select noticeable network security related technologies for the security systems. In particular, we compared and analyzed the trend, performance, and functions of both foreign and domestic technologies in regard to UTM having the largest portions among network security systems so far. We will also discuss the prospect for the change in network infrastructure due to the emergence of the next-generation network technology.

The Case of Novel Attack Detection using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지 사례)

  • Kim, Chun-Suk;Kang, Dae-Kwon;Euom, Ieck-Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.279-285
    • /
    • 2012
  • Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.

A Study on Using of Biodiversity Database for Learning of Biodiversity (생물다양성 학습을 위한 생물다양성 DB 활용에 관한 연구)

  • Ahn Bu-Young;Cho Hee-Hyung;Park Jae-Hong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.428-432
    • /
    • 2005
  • This paper has studied the concept and technical factors of e-Learning system to which we intend to apply domestic biodiversity information. This article describes how we analyzed and designed the e-learning system to serve biodiversity information as e-Learning contents. It would be useful for the public and students if this information are organized and provided as e-learning contents especially in our country which has well-established network infrastructure considering the limited land space. It is expected that the establishment of e-Learning system based on this proposed design will help students and public to access and team biodiversity on cyber space.

  • PDF

Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement (국가 사이버보안 전략 수립과 개선을 위한 참조 모델 개발)

  • YUN, Jaesuk
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.53-61
    • /
    • 2016
  • A number of countries have been developing and implementing national cybersecurity strategy to prevent damages caused by cyber threats and to minimize damages when they happened. However, there are a lot of differences and disparities in respective strategies with their own background and needs. A vulnerability in some places can be a global problem, so various guidelines have been developed by relevant organizations including international organizations to support the establishment of national cybersecurity strategies and improvement of them. In this paper, with analysis on the guidelines for the establishment of national cybersecurity strategies, reference model consisting of common elements of strategies was suggested. And several recommendations for the improvement measures for Korean national cybersecurity strategies were explained with a comparison of the reference model.

Advances in Cyber Trade and E-Commerce: Thier Impacts on Ex-Im Logistics Services (전자무역과 전자상거래에 따른 수출입물류서비스 발전방안 연구)

  • 안승범
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.1
    • /
    • pp.107-134
    • /
    • 2002
  • Globalization of the industry induces the internationalization of any given manufacturing company's supply chain. Development of e-Commerce and Information Technology (IT) changes the logistics structure, making logistics information systems essential. Web-based connectivity and supply chains based on new technologies are becoming essential in the logistics industry. Customers are driving the implementation of systems to ensure timely, thorough, and accurate information, often with immediate access; in response, the Internet has propagated tracking and tracing systems. Value-added services are the key to successful intermediary activities. The nationwide Integrated Logistics Information System (ILIS) aimed to utilize existing and future information infrastructure and knowledge bases to build an integrated logistics information network that would provide comprehensive logistics information services for shippers and carriers in order to improve the efficiency of both inventory and information flows in their supply chains. The ILIS, as one of the seven national information networks, has provided various services, particularly services related to import/export and clearance. Though a survey concerning logistics information services shows rather positive results, shippers and carriers still require better services and reductions in EDI prices. Therefore, the role of the ILIS needs to be re-defined. Short-term plans for the ILIS contain ICD services and XML/EDI services, which are described in detail.

  • PDF

Development of Korean Cybersecurity Goods Menu (Korean Cybersecurity Goods Menu 개발)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.266-267
    • /
    • 2015
  • The information security (information security knowledge) industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. In order to export it is necessary to develop for the Korean Cybersecurity Goods Menu for products, services and technologies of the domestic information security industry. Buyer Menu as well as foreign and domestic Seller, companies and governments know the details of the assets and product information security industry and is a prerequisite to sell. In this paper, I study the Korean Cybersecurity Goods Menu development.

  • PDF

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF