• Title/Summary/Keyword: 시스템 식별기술

Search Result 919, Processing Time 0.029 seconds

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

A MVC Framework for Visualizing Text Data (텍스트 데이터 시각화를 위한 MVC 프레임워크)

  • Choi, Kwang Sun;Jeong, Kyo Sung;Kim, Soo Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.39-58
    • /
    • 2014
  • As the importance of big data and related technologies continues to grow in the industry, it has become highlighted to visualize results of processing and analyzing big data. Visualization of data delivers people effectiveness and clarity for understanding the result of analyzing. By the way, visualization has a role as the GUI (Graphical User Interface) that supports communications between people and analysis systems. Usually to make development and maintenance easier, these GUI parts should be loosely coupled from the parts of processing and analyzing data. And also to implement a loosely coupled architecture, it is necessary to adopt design patterns such as MVC (Model-View-Controller) which is designed for minimizing coupling between UI part and data processing part. On the other hand, big data can be classified as structured data and unstructured data. The visualization of structured data is relatively easy to unstructured data. For all that, as it has been spread out that the people utilize and analyze unstructured data, they usually develop the visualization system only for each project to overcome the limitation traditional visualization system for structured data. Furthermore, for text data which covers a huge part of unstructured data, visualization of data is more difficult. It results from the complexity of technology for analyzing text data as like linguistic analysis, text mining, social network analysis, and so on. And also those technologies are not standardized. This situation makes it more difficult to reuse the visualization system of a project to other projects. We assume that the reason is lack of commonality design of visualization system considering to expanse it to other system. In our research, we suggest a common information model for visualizing text data and propose a comprehensive and reusable framework, TexVizu, for visualizing text data. At first, we survey representative researches in text visualization era. And also we identify common elements for text visualization and common patterns among various cases of its. And then we review and analyze elements and patterns with three different viewpoints as structural viewpoint, interactive viewpoint, and semantic viewpoint. And then we design an integrated model of text data which represent elements for visualization. The structural viewpoint is for identifying structural element from various text documents as like title, author, body, and so on. The interactive viewpoint is for identifying the types of relations and interactions between text documents as like post, comment, reply and so on. The semantic viewpoint is for identifying semantic elements which extracted from analyzing text data linguistically and are represented as tags for classifying types of entity as like people, place or location, time, event and so on. After then we extract and choose common requirements for visualizing text data. The requirements are categorized as four types which are structure information, content information, relation information, trend information. Each type of requirements comprised with required visualization techniques, data and goal (what to know). These requirements are common and key requirement for design a framework which keep that a visualization system are loosely coupled from data processing or analyzing system. Finally we designed a common text visualization framework, TexVizu which is reusable and expansible for various visualization projects by collaborating with various Text Data Loader and Analytical Text Data Visualizer via common interfaces as like ITextDataLoader and IATDProvider. And also TexVisu is comprised with Analytical Text Data Model, Analytical Text Data Storage and Analytical Text Data Controller. In this framework, external components are the specifications of required interfaces for collaborating with this framework. As an experiment, we also adopt this framework into two text visualization systems as like a social opinion mining system and an online news analysis system.

Model-based Specification of Non-functional Requirements in the Environment of Real-time Collaboration Among Multiple Cyber Physical Systems (사이버 물리 시스템의 실시간 협업 환경에서 소프트웨어 비기능 요구사항의 모델 기반 명세)

  • Nam, Seungwoo;Hong, Jang-Eui
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.36-44
    • /
    • 2018
  • Due to the advent of the 4th Industrial Revolution, it is imperative that we aggressively continue to develop state-of-the-art, cutting edge ICT technology relative to autonomous vehicles, intelligent robots, and so forth. Especially, systems based on convergence IT are being developed in the form of CPSs (Cyber Physical Systems) that interwork with sensors and actuators. Since conventional CPS specification only expresses behavior of one system, specification for collaboration and diversity of CPS systems with characteristics of hyper-connectivity and hyper-convergence in the 4th Industrial Revolution has been insufficiently presented. Additionally, behavioral modeling of CPSs that considers more collaborative characteristics has been unachieved in real-time application domains. This study defines the non-functional requirements that should be identified in developing embedded software for real-time constrained collaborating CPSs. These requirements are derived from ISO 25010 standard and formally specified based on state-based timed process. Defined non-functional requirements may be reused to develop the requirements for new embedded software for CPS, that may lead to quality improvement of CPS.

Development of Monitoring System for Real Time Maintenance of Road Beacon Light (도로 표시등 실시간 유지관리를 위한 모니터링시스템 개발)

  • Lee, Jong Ho;Kim, Kyou Jeon;Choi, Ju Weon;Ahn, Won Tea;Lee, Seung Ki;Choi, Seok Keun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.3
    • /
    • pp.69-75
    • /
    • 2015
  • Road facilities for safe driving were designed for drivers to distinguish them during day and night, but they cannot play their role when the weather becomes worse. Recently, the road facilities have been designed by using electric and electronic technology so that they can be displayed well at a long distance, but they should be replaced very often due to their frequent breakdown. So, there are many problems in traffic calming and maintenance. In this study, to solve the above problems, semi-permanent LED beacon light was installed in the area where traffic accident are frequent, and monitoring system was developed so that the LED beacon light can be maintenanced by connecting with system. For the above installation and development, system was based on window operating system and it was developed for worker to operate it by using P.C. through connecting with wireless local area network. The result of this study led to analyzing state information on the battery of field-installed LED beacon light in real time, and manegement to effectively by predicting their life cycle.

Development of LiDAR-Based MRM Algorithm for LKS System (LKS 시스템을 위한 라이다 기반 MRM 알고리즘 개발)

  • Son, Weon Il;Oh, Tae Young;Park, Kihong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.174-192
    • /
    • 2021
  • The LIDAR sensor, which provides higher cognitive performance than cameras and radar, is difficult to apply to ADAS or autonomous driving because of its high price. On the other hand, as the price is decreasing rapidly, expectations are rising to improve existing autonomous driving functions by taking advantage of the LIDAR sensor. In level 3 autonomous vehicles, when a dangerous situation in the cognitive module occurs due to a sensor defect or sensor limit, the driver must take control of the vehicle for manual driving. If the driver does not respond to the request, the system must automatically kick in and implement a minimum risk maneuver to maintain the risk within a tolerable level. In this study, based on this background, a LIDAR-based LKS MRM algorithm was developed for the case when the normal operation of LKS was not possible due to troubles in the cognitive system. From point cloud data collected by LIDAR, the algorithm generates the trajectory of the vehicle in front through object clustering and converts it to the target waypoints of its own. Hence, if the camera-based LKS is not operating normally, LIDAR-based path tracking control is performed as MRM. The HAZOP method was used to identify the risk sources in the LKS cognitive systems. B, and based on this, test scenarios were derived and used in the validation process by simulation. The simulation results indicated that the LIDAR-based LKS MRM algorithm of this study prevents lane departure in dangerous situations caused by various problems or difficulties in the LKS cognitive systems and could prevent possible traffic accidents.

Design of Marine IoT Wireless Network for Building Fishing Gear Monitoring System (어구 모니터링 시스템 구축을 위한 해상 IoT 무선망 설계)

  • Kwak, Jae-Min;Kim, Se-Hoon;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.76-83
    • /
    • 2018
  • In order to prevent overusing the fishing gear and to reduce discarded fishing gear, there is a need for a technique that can efficiently transmit the information including the type and location of the fishing gear and the user's real name to the fishing boat and the control center using IoT-based communication. In order to do this, it is necessary to be able to confirm the position information of a plurality of buoys that can be identified by the base stations on the land. In this paper, in order to service the maritime IoT communication system, we calculate the link budget between the land base station and the targets on the sea to derive the service coverage. To design a marine IoT radio network for building a fishing gear monitoring system, we calculate link budget for wireless service optimization at sea for NB-IoT using 1.8 GHz frequency band and LoRa service using 900 MHz frequency band. In addition, the link budget between the land base station and buoy, the link budget between the land base station and fishing boat are calculated and the results are analyzed.

Risk Assessment of Marine LPG Engine Using Fuzzy Multicriteria HAZOP Technique (퍼지 다기준 HAZOP 기법을 이용한 해상용 LPG 엔진의 위험성 평가)

  • Siljung Yeo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.238-247
    • /
    • 2023
  • Liquefied petroleum gas (LPG) is an attractive fuel for ships considering its current technology and economic viability. However, safety guidelines for LPG-fueled ships are still under development, and there have been no cases of applying LPG propulsion systems to small and medium-sized ships in Korea. The purpose of this study was to perform an objective risk assessment for the first marine LPG engine system and propose safe operational standards. First, hazard and operability (HAZOP) analysis was used to divide the engine system into five nodes, and 58 hazards were identified. To compensate for the subjectivity of qualitative evaluation using HAZOP analysis, fuzzy set theory was used, and additional risk factors, such as detectability and sensitivity, were included to compare the relative weights of the risk factors using a fuzzy analytical hierarchy process. As a result, among the five risk factors, those with a major impact on risk were determined to be the frequency and severity. Finally, the fuzzy technique for order of preference by similarity to ideal solution (TOPSIS) was applied to select the risk rank more precisely by considering the weights of the risk factors. The risk level was divided into 47 groups, and the major hazard during the operation of the engine system was found through the analysis to be gas leakage during maintenance of the LPG supply line. The technique proposed can be applied to various facilities, such as LPG supply systems, and can be utilized as a standard procedure for risk assessment in developing safety standards for LPG-powered ships.

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

A Study on improvement of communication error between controllers for K56 ammunition transport vehicle (K56 탄약운반장갑차용 제어기 간 통신 오류 개선에 관한 연구)

  • Park, Joo-Young;Kim, Seong-Hoon;Noh, Sang-Wan;Park, Young-Min;Kim, Kyung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.781-788
    • /
    • 2021
  • This paper is the study of a design to eliminate the communication error that occurs between the main controller and the servo controller of the K56 ammunition-carrying armored vehicle. The K56 assists in the operation of the K-55A1 self-propelled gun by automating the supply and loading of ammunition. The CAN communication board of the ammunition carrier is a key-function product mounted inside the main controller and installed for communication with the servo controller. It was confirmed that an undefined error would occur intermittently in the existing CAN communication board, interrupting the operation of the ammunition supply system during the loading process. In this paper, in order to solve the problem, the cause of the failure is identified through analysis and a functional test of the communication signal between the main controller and the servo controller. The error was resolved by redesigning and improving the Read/Write algorithm. Finally, the proposed cause analysis and design effectiveness were verified through the CAN communication board single item test and a system equipment application test. It is expected that this study will serve as a reference for improving defense capabilities through improving the reliability of CAN communication boards and by improving the reliability of the overall electronic equipment using DPRAM.

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.