• Title/Summary/Keyword: 네트워크 운용

Search Result 994, Processing Time 0.032 seconds

ANP-based Decision Support System Design for Selecting Function of Weapon Systems (무기체계의 기능 선정을 위한 ANP 기반의 의사결정 지원시스템 설계)

  • Oh, Seongryeong;Seo, Yoonho
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.3
    • /
    • pp.85-95
    • /
    • 2016
  • In National Defense field, the importance of M&S and T&E has been increased due to complexity of modern Weapon System. And research reducing time and cost is being conducted continually on using limited resources efficiently. In the existing research, Weapon System's Performance Evaluation System using the Process-based method has been in progress. But, Objective basis or scientific method is insufficient in selecting appropriate function of a target to performance evaluation. Due to this, it's difficult to select functions suitable to the situation in same type. Also, Requirements of user and interrelation of evaluation factors can't be reflected systematically. In this research, it proposes the method to reflecting requirements of user, interrelation of elements in realistic situation for selecting evaluation object in Performance Evaluation Simulation. First, Evaluation Objects is selected using ANP which is multi-criterion decision making method. Second, decision support system is constructed using Programming Language(C#) based on the research result.

A Reverse Simulation for Developing Defense Systems based on Simulation Models (시뮬레이션 모델기반 국방체계 설계를 위한 역방향 시뮬레이션)

  • Choi, Seon Han;Kim, Tag Gon;Jin, Ki Byung;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.27-40
    • /
    • 2020
  • When analyzing the effectiveness of a defense system in a virtual battlefield with a simulation model is referred to as forward simulation, reverse simulation is required to design a good defense system with high effectiveness. That is, using the simulation model, it is necessary to find the engineering factors, measures of performance, and operational tactics that are demanded to achieve high effectiveness of the system. However, the efficiency of reverse simulation is still a concern since many replications of forward simulation are required for conducting reverse simulation. In this paper, we introduce various efficient algorithms to reduce the number of replications and a reverse simulation tool for utilizing these algorithms easily. The tool allows practitioners to easily and efficiently conduct reverse simulation for design a good defense system based on simulation models. This is demonstrated with the case studies on the design of warship's defense system and the design of military network system.

Reporting the Results of Monitoring Nine High Risk Insect Pests of South Korea in 2020 (한국의 침입우려 고위험 해충 9종에 대한 2020년 예찰조사 보고)

  • Lee, Hyobin;Kim, Hyojoong;Lee, Seunghwan;Hong, Ki-Jeong;Jung, Chuleui;Kim, Dong-soon;Park, Jong-Seok;Lee, Wonhoon
    • Korean journal of applied entomology
    • /
    • v.60 no.4
    • /
    • pp.357-361
    • /
    • 2021
  • Monitoring about nine high risk insect pests, Aceria diospyri, Bactrocera dorsalis, Bactrocera minax, Bactrocera tsuneonis, Cydia pomonella, Lobesia botrana, Proeulia sp., Solenopsis invicta and Stephanitis takeyai, were carried out in seven regions from April to October in 2020. A total of 12,045 traps/visual scouting were investigated in 222 points of 78 local sites of seven regions, resulting the nine species, A. diospyri, B. dorsalis, B. minax, B. tsuneonis, C. pomonella, L. botrana, Proeulia sp., S. invicta, and S. takeyai, were not detected. This study has been conducted from 2018 to 2020, and we established the nationwide monitoring system and secured a bridgehead for monitoring invasive insect pests passing the border including seven universities.

A Convergence Implementation of Realtime Traffic Shaping and IPS on Small Integrated Security Router for IDC (IDC용 소형 통합보안라우터의 실시간 트래픽쉐이핑과 IPS의 융합 구현)

  • Yang, SeungEui;Park, Kiyoung;Jung, HoeKyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.861-868
    • /
    • 2019
  • Various server-based services such as big data, IoT and artificial intelligence have been made online. As a result, the demand for IDC to support stable server operation is increasing. IDC is a server-based facility with a stable line and power supply facility that manages 20 to 30 servers in an efficiently separated rack-level subnetwork. Here, we need a way to efficiently manage servers security, firewall, and traffic on a rack-by-rack basis. Including traffic shaping capabilities that control routers, firewalls, IPS, and line speeds, as well as VPN technology, a recent interest. If three or five kinds of commercial equipment are adopted to support this, it may be a great burden to the management cost as well as the introduction cost. Therefore, in this paper, we propose a method to implement the five functions in one rack-unit small integrated security router. In particular, IDC intends to integrate traffic shaping and IPS, which are essential technologies, and to propose the utility accordingly.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Design of Autonomous Independent Power System for USN Sensor Node Using Power CT (Power CT를 이용한 USN 센서노드용 자율독립전원 시스템 설계)

  • Son, Won-Kuk;Jeong, Jae-Kee
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.101-107
    • /
    • 2018
  • In wireless sensor network technology, which has been applied to various fields, the power supply and the power management of sensors are the most important issues. For this reason, a new concept of power supply and power management device is required. In this paper, we developed an autonomous independent power supply system that supplies the stable power to a sensor node without an additional external input by applying the energy harvesting technology using the electromagnetic induction principle by utilizing the current flowing in the transmission line. The proposed autonomous independent power supply system consists of a power supply using Power CT and a power management system including a charging circuit. The power management device uses a voltage limiter circuit and a monitoring circuit of charging voltage and current to ensure the safety of charging of the battery. In order to verify the performance of the proposed system, we applied it to the SVL diagnostic system and confirmed that it operates stably.

A Study on the Pattern and Efficiency of Patron-Driven Acquisition in Academic Libraries (대학도서관 희망도서의 신청 패턴과 이용효과 분석에 관한 연구)

  • Kwon, Sodam;Nam, Young Joon
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.4
    • /
    • pp.263-284
    • /
    • 2018
  • Academic libraries need to select and purchase essential collections to support students and faculty in education and research. Therefore, libraries reflect patrons' information needs on collection development through patron purchase requests. This study analyzed the pattern and efficiency of patron purchase requests in a longer-term perspective; for over a decade. Patron purchase requests show different tendencies depending on academic characteristics, which enabled libraries to identify the users' information needs in various subjects. Typically users contributed to collection development by expressing information needs in their fields of study through purchase requests. In the meantime, users in certain fields showed interest in other subject areas besides their own to select general books on various topics. Through this study, it became evident that a major portion of library collections were affected by active purchase requests from a small number of users. However those books were proven to be in demand in terms of effectiveness. Patron-driven acquisition is being implemented as an effective collection development policy.

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

Smart Monitoring System to Improve Solar Power System Efficiency (태양광 발전시스템 효율향상을 위한 스마트 모니터링 시스템)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.219-224
    • /
    • 2019
  • The number of solar power installation companies including domestic small scale (50kW or less) is increasing rapidly, but the efficient operation system and management are insufficient. Therefore, a new type of operating system is needed as a maintenance management aspect to maximize the generation amount in the current state rather than the additional function which causes the increase of the generation cost. In this paper, we utilize Big Data and sensor network to maximize the operating efficiency of solar power plant and analyze the expert system to develop power generation prediction technology, module unit fault detection technology, life prediction of inverter components and report technology, maintenance optimization And to develop a smart monitoring system that enables optimal operation of photovoltaic power plants such as development of algorithms and economic analysis.