• Title/Summary/Keyword: evolved control systems

Search Result 70, Processing Time 0.033 seconds

Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack (DDoS 공격 가능성 완화를 위한 효율적인 버퍼 관리 기술)

  • Noh, Hee-Kyeong;Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2012
  • DDoS attack is a malicious attempt to exhaust resources of target system and network capacities using lots of distributed zombi systems. DDoS attack introduced in early 2000 has being evolved over time and presented in a various form of attacks. This paper proposes a scheme to detect DDoS attacks and to reduce possibility of such attacks that are especially based on vulnerabilities presented by using control packets of existing network protocols. To cope with DDoS attacks, the proposed scheme utilizes a buffer management techniques commonly used for congestion control in Internet. Our scheme is not intended to detect DDoS attacks perfectly but to minimize possibility of overloading of internal system and to mitigate possibility of attacks by discarding control packets at the time of detecting DDoS attacks. In addition, the detection module of our scheme can adapt dynamically to instantly increasing traffic unlike previously proposed schemes.

Feasibility Study of Improved Train Control System Using On-board Controller for Intelligent Control of Trackside Facilities (선로변 시설물의 지능적 제어를 위한 차상중심 열차제어시스템 시뮬레이션 기반 성능 평가)

  • Baek, Jong-Hyen;Jo, Hyun-Jeong;Chae, Eun-Kyung;Choi, Hyun-Young;Kim, Yong-Gyu
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.6
    • /
    • pp.528-533
    • /
    • 2013
  • To improve the efficiency and safety of railway systems, the train control system has considerably evolved from the ground-equipment-based control system (e.g. track circuit, interlocking system, etc.) into the on-board-equipment-based control system. In addition, this train control system enables the rolling stock to intelligently control the trackside facilities by introducing information and communication technologies (ICT). Accordingly, since the ICT-based train control system simplifies the railway system (i.e. the heavy ground-equipment can be removed), an efficient and cost-effective railway system can be realized. In this paper, we perform a feasibility test of the ICT-based train control system using a simulation. To this end, we implement a test-bed consisting of prototype machines of on-board/ground equipment and introduce an integrated operation scenario for the train control. The simulation results satisfy all the requirements of train operation according to the scenario and show the effectiveness of the proposed train control system.

An Experimental Analysis of Linux TCP Variants for Video Streaming in LTE-based Mobile DaaS Environments (LTE 기반 모바일 DaaS 환경에서 비디오 스트리밍을 위한 Linux TCP 구현물의 실험적 성능 분석)

  • Seong, Chaemin;Hong, Seongjun;Lim, Kyungshik;Kim, Dae Won;Kim, Seongwoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.241-255
    • /
    • 2015
  • Recent network environment has been rapidly evolved to cloud computing environment based on the development of the Internet technologies. Furthermore there is an increasing demand on mobile cloud computing due to explosive growth of smart devices and wide deployment of LTE-based cellular networks. Thus mobile Desktop-as-a-Service(DaaS) could be a pervasive service for nomadic users. In addition, video streaming traffic is currently more than two-thirds of mobile traffic and ever increasing. All such trends enable that video streaming in mobile DaaS could be an important concern for mobile cloud computing. It should be noted that the performance of the Transmission Control Protocol(TCP) on cloud host servers greatly affects Quality of Service(QoS) of video streams for mobile users. With widely deployed Linux server platforms for cloud computing, in this paper, we conduct an experimental analysis of the twelve Linux TCP variants in mobile DaaS environments. The results of our experiments show that the TCP Illinois outperforms the other TCP variants in terms of wide range of packet loss rate and propagation delay over LTE-based wireless links between cloud servers and mobile devices, even though TCP CUBIC is usually used in default in the current Linux systems.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Storm-Water CSOs for Reservoir System Designs in Urban Area (도시유역 저류형 시스템 설계를 위한 CSOs 산정)

  • Jo, Deok-Jun;Kim, Myoung-Su;Lee, Jung-Ho;Park, Moo-Jong;Kim, Joong-Hoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1199-1203
    • /
    • 2005
  • Combined sewer overflows(CSOs) are themselves a significant source of water pollution. Therefore, the control of urban drainage for CSOs reduction and receiving water quality protection is needed. Examples in combined sewer systems include downstream storage facilities that detain runoff during periods of high flow and allow the detained water to be conveyed by an interceptor sewer to a centralized treatment plant during periods of low flow. The design of such facilities as stormwater detention storage is highly dependant on the temporal variability of storage capacity available(which is influenced by the duration of interevent dry periods) as well as the infiltration capacity of soil and recovery of depression storage. As a result, a contiunous approach is required to adequately size such facilities. This study for the continuous long-term analysis of urban dranage system used analytical Probabilistic model based on derived probability distribution theory. As an alternative to the modeling of urban drainage system for planning or screening level analysis of runoff control alternatives, this model have evolved that offer much ease and flexibility in terms of computation while considering long-term meteorology. This study presented rainfall and runoff characteristics or the subject area using analytical Probabilistic model. Runoff characteristics manifasted the unique characteristics of the subject area with the infiltration capacity of soil and recovery of depression storage and was examined appropriately by sensitivity analysis. This study presented the average annual COSs and number of COSs when the interceptor capacity is in the range 3xDWF(dry weather flow). Also, calculated the average annual mass of pollutant lost in CSOs using Event Mean Concentration. Finally, this study presented a dicision of storage volume for CSOs reduction and water quality protection.

  • PDF

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

Endoplasmic Reticulum Signaling for Recombinant-protein Production (재조합 단백질 생산을 위한 소포체 신호전달)

  • Goo, Tae-Won;Yun, Eun-Young;Kang, Seok-Woo;Kwon, Ki-Sang;Kwon, O-Yu
    • Journal of Life Science
    • /
    • v.17 no.6 s.86
    • /
    • pp.847-858
    • /
    • 2007
  • The endoplasmic reticulum (ER) is an important intracellular organelle for folding and maturation of newly synthesized transmembrane and secretory proteins. The ER provides stringent quality control systems to ensure that only correctly folded proteins exit the ER and unfolded or misfolded proteins are retained and ultimately degraded. The ER has evolved stress response both signaling pathways the unfolded protein response (UPR) to cope with the accmulation of unfolded or misfolded proteins and ER overload response (EOR). Accumulating evidence suggests that, in addition to responsibility for protein processing, ER is also an important signaling compartment and a sensor of cellular stress. In this respect, production of bio-functional recombinant-proteins requires efficient functioning of the ER secretory pathway in host cells. This review briefly summarizes our understanding of the ER signaling developed in the recent years to help of the secretion capacities of recombinant cells.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

Estimation of Storage Capacity for CSOs Storage System in Urban Area (도시유역 CSOs 처리를 위한 저류형시스템 설계용량 산정)

  • Jo, Deok Jun;Lee, Jung Ho;Kim, Myoung Su;Kim, Joong Hoon;Park, Moo Jong
    • Journal of Korean Society on Water Environment
    • /
    • v.23 no.4
    • /
    • pp.490-497
    • /
    • 2007
  • A Combined sewer overflows (CSOs) are themselves a significant source of water pollution. Therefore, the control of urban drainage for CSOs reduction and receiving water quality protection is needed. Examples in combined sewer systems include downstream storage facilities that detain runoff during periods of high flow and allow the detained water to be conveyed by an interceptor sewer to a centralized treatment plant during periods of low flow. The design of such facilities as stormwater detention storage is highly dependant on the temporal variability of storage capacity available (which is influenced by the duration of interevent dry periods) as well as the infiltration capacity of soil and recovery of depression storage. As a result, a continuous approach is required to adequately size such facilities. This study for the continuous long-term analysis of urban drainage system used analytical probabilistic model based on derived probability distribution theory. As an alternative to the modeling of urban drainage system for planning or screening level analysis of runoff control alternatives, this model have evolved that offer much ease and flexibility in terms of computation while considering long-term meteorology. This study presented rainfall and runoff characteristics of the subject area using analytical probabilistic model. This study presented the average annual COSs and number of COSs when the interceptor capacity is in the range $3{\times}DWF$ (dry weather flow). Also, calculated the average annual mass of pollutant lost in CSOs using Event Mean Concentration. Finally, this study presented a decision of storage volume for CSOs reduction and water quality protection.

The Effect of Users' Individual characteristics and Social Influence on Cyberethics and Usage in Web 2.0 - Comparing South Korea and U.S.A. - (웹 2.0 환경에서 사용자의 개인특성과 사회적 영향이 사이버윤리성과 사용성에 미치는 영향 - 한국과 미국의 비교연구 -)

  • Moon, Yun-Ji
    • Management & Information Systems Review
    • /
    • v.33 no.2
    • /
    • pp.101-118
    • /
    • 2014
  • In the mid-2000s, Web 2.0 appears and is becoming a general cultural code with the keyword of participation, sharing, and openness. Web 2.0, in which consumption is being transformed by the participatory web culture, has evolved. However, associated with the evolution of Web 2.0, several significant concerns appears in a society. Among them, this study will focuses on the cyber-ethics issues. There are limitations to solve the cyber-ethics problems only in the technical and legal approaches. Therefore, the current article intends to consider comprehensively the antecedents of cyber-ethics such as individual characteristics, social influence, and cultural characteristics. Specifically, (1) Do individual characteristics(i.e., self-efficacy, locus of control) affect cyber-ethics in the Web 2.0 environment?, (2) Do social influence(i.e., subjective norm) have an effect on cyber-ethics?, (3) Do cyber -ethics have an impact on user participation in the Web 2.0 services(i.e., retrieval and creation)?, finally (4) Do international cultural difference have a moderation effect on the relationship between cyber-ethics and user participation? For testing empirically the hypothesized research model, this study collected questionnaires in South Korea as well as U.S.A. The results showed that individual characteristics and social influence affect cyber-ethics toward user's creative activities in Web 2.0 sites.

  • PDF