• Title/Summary/Keyword: network protection system

Search Result 546, Processing Time 0.031 seconds

Performance Analysis of the GOOSE Transmission of an IED Considering Network Redundancy (네트워크 이중화를 고려한 IED GOOSE 전송에 관한 성능 분석)

  • Lee, Nam-Ho;Jang, Byung-Tae
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.10
    • /
    • pp.75-80
    • /
    • 2009
  • In order to prevent loss of communication packets and drop of transmission speed owing to the network fault occurrence, it should be considered network redundancy. That is why a messages of IED GOOSE is the critical signal in charge of protection and control of the substation. So most of users implement the substation automation system with Hybrid network topology ant IED supporting double ethernet ports. Because IEC 61850 GOOSE conformance test is limited in the functional test, this paper suggests how to test the performance of IED GOOSE transmission considering Network redundancy, and describes the analysis of an example test on real IEDs and how to impact the IED GOOSE performance to the substation automation system.

Comparative Studies of Frequency Estimation Method for Fault Disturbance Recorder (고장 왜란 기록기를 위한 주파수 추정 기법의 비교 연구)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.61 no.2
    • /
    • pp.87-92
    • /
    • 2012
  • Voltage and current phasor estimation has been executed by GPS-based synchronized PMU, which has become an important way of wide-area blackout protection for the prevention of expending faults in a power system. The PMU technique can not easily get the field data and it is impossible to share information, so that there has been used a FNET(Frequency Monitoring Network) method for the wide-area intelligent protection in USA. It consists of FDR(Fault Disturbance Recorder) and IMS(Information Management System). Therefore, FDR must provide an optimal frequency estimation method that is robust to noise and failure. In this paper, we present comparative studies for the frequency estimation method using IRDWT(Improved Recursive Discrete Wavelet Transform), FRDWT(Fast Recursive Discrete Wavelet Transform), and DFT(Discrete Fourier Transform). The Republic of Korea345[kV] power system modeling data by EMTP-RV are used to evaluate the performance of the proposed two kinds of RDWT(Recursive Discrete Wavelet Transform) and DFT. The simulation results show that the proposed frequency estimation technique using FRDWT could be the optimal frequency measurement method, and thus be applied to FDR.

Development of ACL Modul For Agent Communication in Auto-Adaptive OCR Agent (자율적응형 과전류계전기 에이전트의 통신을 위한 ACL모듈 개발)

  • Oh, T.W.;Lee, S.J.;Choi, M.S.;Kim, K.H.;Lim, S.I.;Min, B.W.;Lee, H.W.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07a
    • /
    • pp.193-195
    • /
    • 2002
  • In this paper, a communication module is proposed to be applied to communication between over current relay (OCR) agents in multi agent protection system. A multi agent system can achieve a global goal beyond the ability of each individual agent by working together, in which it is the prerequisite for each agent to be able to exchange or share information or processing status with other agent. The proposed communication module is purposed to enable not only each agent to bring about its own goal, but also the whole protective system to provide much improved coordinated protection. It is applied to a self adaptive protection system for a distribution network using multi agent concept to show its effectiveness.

  • PDF

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Design and Implementation of Ethernet and TDM Convergence System (이더넷/TDM 통합전달 시스템의 설계 및 구현)

  • Youn, Ji-Wook;Yeom, Kyung-Whan;Lee, Jong-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.237-240
    • /
    • 2005
  • We propose a fully converged Ethernet and TDM transport system. Developed Ethernet and TDM convergence system can support not only L2VPN service and premium multimedia service based on MPLS protocol but also TDM leased line service, simultaneously. Developed convergence system can provide high reliability for Ethernet data due to support protection and restoration function of circuit based networks. Evaluation for Ethernet and TDM path was successfully performed to show the typical application of the proposed system in the legacy networks.

  • PDF

Artificial immune network-based cooperative beharior strategies in collective autonomous mobile rotos (인공면역계 기반의 자율이동로봇군의 협조행동전략 결정)

  • 이동욱;심귀보
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.102-109
    • /
    • 1998
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment.For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental codintion changes, a robot select an appropriate beharior stategy. And its behavior stategy is stimulated and suppressed by other robot using communiation. Finally much stimulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idotopic network hypothesis. And it is used for decision making of optimal swarm stragegy.

  • PDF

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

A Study of Storage Device Control Method for File Outflow Protecting (파일유출 방지를 위한 저장장치 제어기법에 대한 연구)

  • Choi, Joo-Ho;Rhew, Sung-Yul
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.1-11
    • /
    • 2006
  • The files of intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Protection System detects file outflow when users not only copy files on client computers into storage devices, but also print them. This Protection system has been designed to Win32 API hooking by I/O Manager in kernel level if files are flowed out by copying. As a result, the monitoring system has exactly detected file outflows, which is proved through testing.

  • PDF