• Title/Summary/Keyword: Blocking Monitoring System

Search Result 27, Processing Time 0.027 seconds

A Study on Electric Power Monitoring System per Appliance (기기별 전력 모니터링 시스템 개발에 관한 연구)

  • Park, Sung-Wook;Kim, Jong-Shick;Lim, Su-Jin;HwangBo, Sea-Hee;Son, Joon-Ik;Lee, In-Yong;Wang, Bo-Hyeun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.638-644
    • /
    • 2010
  • This paper presents ideas of service scenarios for home residents using electric power monitoring system per appliance, the implementation of the monitoring system, and analysis of acquired electric power usage pattern. By acquiring and analyzing electric power usage pattern, home residents can get information of power usage pattern of every legacy (non-Demand Response-ready) appliance. Further they can get pieces of recommendation how to reduce energy consumption, intelligent standby power blocking service, and alarming service to abnormality of appliances. In order to check the feasibility of the ideas, a system that can acquire electric power pattern per appliance is implemented, and electric power pattern of some appliances are stored to a database and it was analyzed to show if auto-identification of a type of a device is possible, which is a basic required function for the scenarios presented.

Implementation of the automatic standby power blocking socket outlet having a blocking power threshold per electronic device by the smart machine (스마트 기기에 의해 전자기기별 차단전력문턱치 설정기능이 장착된 자동대기전력 차단콘센트 구현)

  • Oh, Chang-Sun;Park, Chan-Young;Kim, Dong-Hoi;Kim, Gi-Taek
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.481-489
    • /
    • 2014
  • In this paper, the automatic standby power blocking socket outlet to reduce standby power by blocking power threshold is implemented. Where, the standby power means a flowing power when a disused power electronic is plugged into the socket outlet. The proposed socket outlet can cut off the standby power by establishing a proper block power threshold electronic device according to each electronic device because it can monitor the amount of power through the smart machines such as the real-time PC or mobile phone and directly control the blocking power threshold. The software is implemented by using Visual Studio software, code vision and SN8 C studio, and the hardware is embodied in ATmega128, SN8F27E93S, USB to UART, and relay etc. Through the simulation, we find that the standby power of the proposed method is similar to that of the conventional method in case of the cellular phone but the standby power of the proposed method is much less than that of the conventional method in case of the computer, air conditioning, and set-top box. Therefore, it is proved that the proposed socket outlet has a superior performance in terms of the standby power.

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

Synoptic Climatic Patterns for Winter Extreme Low Temperature Events in the Republic of Korea (우리나라 겨울철 극한저온현상 발생 시 종관 기후 패턴)

  • Choi, Gwangyong;Kim, Junsu
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.1
    • /
    • pp.1-21
    • /
    • 2015
  • The present study aims to characterize the synoptic climatic patterns of winter extreme low temperature events occurred in different regions of Korea based on daily temperature data observed at 61 weather stations under the supervision of the Korea Meteorological Administation and NCEP/NCAR reanalysis I data for the recent 40 years (1973~2012) period. Analyses of daily maximum and minimum temperatures below 10th percentile thresholds show that high frequencies of winter extreme low temperature events appear across the entire regions of Korea or in either the western or eastern half region divided by major mountain ridges at the 2~7 dayintervals particularly in the first half of the winter period (before mid-January). Composite analyses of surface synoptic climatic data including sea level pressure and wind vector reveal that 13 regional types of winter extreme low temperature events in Korea are closely associated with the relative location and intensity of both the Siberian high pressure and the Aleutian low pressure systems as well as major mountain ridges. Investigations of mid-troposphere (500 hPa) synoptic climatic charts demonstrate that the blocking-like upper troposphere low pressure system advecting the cold air from the Arctic toward the Korean Peninsula may provide favorable synoptic conditions for the outbreaks of winter extreme low temperature events in Korea. These results indicate that the monitoring of synoptic scale climatic systems in East Asia including the Siberian high pressure system, the Aleutian low pressure system and upper level blocking system is critical to the improvement of the predictability of winter extreme low temperature events in Korea.

  • PDF

Analysis of abnormal traffic controller based on prediction to improve network service survivability (네트워크 서비스의 생존성을 높이기 위한 예측기반 이상 트래픽 제어 방식 분석)

  • Kim Kwang sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.296-304
    • /
    • 2005
  • ATCoP(Abnormal traffic controller based on prediction) is presented to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. ATCoP is a method to control abnormal traffic that is entering into the network When unknown attack generates excessive traffic, service survivability is guaranteed by giving the priority to normal traffic than abnormal traffic, that is reserving some channels for normal traffic. If the reserved channel number increases, abnormal traffic has lower quality service by ATCoP system and then its service survivability becomes worse. As an analytic result, the proposed scheme maintains the blocking probability of normal traffic on the predefined level in the specific interval of input traffic.

Blocking Diode Monitoring System of Redundancy DC Power Supply (직류전원공급 이중화용 블로킹 다이오드 감시 장치)

  • Lim, Ick-Heon;Song, Seong-Il;Lee, Ju-Hyun;Ryu, Ho-Seon;Shin, Man-Su;Kang, Sung-Su
    • Proceedings of the KIEE Conference
    • /
    • 2006.07b
    • /
    • pp.1016-1017
    • /
    • 2006
  • 프로세스 제어기에서 전원장치의 건전성과 신뢰성은 아무리 강조해도 지나치지 않을 것이다. 본 논문은 전원장치의 고장 감시장치에 관한 것으로, 직류 전원공급 시스템의 신뢰도 향상을 위하여 사용하는 이중화 전원 구성용 블로킹다이오드의 고장 감시 장치에 관한 것이다. 이중화 전원 공급장치에 있어서 2개의 공급전원 중 어느 한쪽의 공급전원이 상실되더라도 나머지 한쪽의 공급전원이 건전하면 정상적으로 부하에 전원을 공급하게 하기 위하여 블로킹다이오드를 사용한다. 그러나 블로킹다이오드에 고장이 발생한 경우, 전원공급장치 자체는 정상이더라도 이중화 기능을 하지 못하므로, 블로킹다이오드의 정상 여부를 상시 감시하여 이상이 발생시 경보처리 한다면 예기치 않은 전원공급 중단을 피할 수 있을 것이다. 블로킹다이오드에 흐르는 전류와 다이오드의 양단 전압을 상시 감시/계측하여 정상운전특성곡선과 비교하여, 이상이 있을 경우 이를 경보하여 전원중단을 예방할 수 있는 이중화 전원용 블로킹다이오드의 고장 감시 장치에 관한 것이다.

  • PDF

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Design and Implementation of a Cloud-Based Recovery System against Ransomware Attacks (클라우드 기반 랜섬웨어 복구 시스템 설계 및 구현)

  • Ha, Sagnmin;Kim, Taehoon;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.521-530
    • /
    • 2017
  • In this paper, we propose a protection solution against intelligent Ransomware attacks by encrypting not only source files but also backup files of external storage. The system is designed to automatically back up to the cloud server at the time of file creation to perform monitoring and blocking in case a specific process affects the original file. When client creates or saves a file, both process identifiers, parent process identifiers, and executable file hash values are compared and protected by the whitelist. The file format that is changed by another process is monitored and blocked to prevent from suspicious behavior. By applying the system proposed in this paper, it is possible to protect against damage caused by the modification or deletion of files by Ransomware.

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.