• Title/Summary/Keyword: Command and control server

Search Result 48, Processing Time 0.024 seconds

HTTP based remote monitoring and control system using JAVA (HTTP 기반의 자바를 이용한 원격 감시 및 제어 시스템)

  • Yi Kyoung-Woong;Choi Han-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.9
    • /
    • pp.847-854
    • /
    • 2004
  • In this paper, It is studied to control and to monitor the remote system state using HTTP(Hyper Text Transfer Protocol) object communication. The remote control system is controlled by using a web browser or a application program. This system is organized by three different part depending on functionality-server part, client part, controller part. The java technology is used to composite the server part and the client part and C language is used for a controller. The server part is waiting for the request of client part and then the request is reached, the server part saves client data to the database and send a command set to the client part. The administrator can control the remote system just using a web browser. Remote part is worked by timer that is activated per 1 second. It gets the measurement data of the controller part, and then send the request to the server part and get a command set in the command repository of server part using the client ID. After interpreting the command set, the client part transfers the command set to the controller part. Controller part can be activated by the client part. If send command is transmitted by the client part, it sends sensor monitoring data to the client part and command set is transmitted then setting up the value of the controlled system.

Remote Monitoring and Motor Control Based on Multi-Platform (다중플랫폼 기반 영상감시 및 원격지 모터제어시스템 구현)

  • Choi, Seung-Dal;Jang, Gun-Ho;Kim, Seok-Min;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.200-202
    • /
    • 2004
  • This paper deals with the real-time monitoring and control system using PC, PDA(Win CE embedded device) and PCS(based BREW platform). The camera attached to the server captures the moving target, and the captured frame of color image is encoded in JPEG for image compression at the server. The client(PC, PDA, PCS) receives the image data from the remote server and the received image is decoded from decompression. We use the TCP/IP protocol to send the image frames. The client can control the position of the camera by sending the control command to the server. Two DC servo motors for the camera are controlled in any directions, up-down and left-right, by the controller which is communicating with the server via the serial communication to get the control command. In this way, on the client we can monitor the moving images at the server and also control the position of the camera.

  • PDF

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

Remote Fuzzy Logic Control System using SOAP (SOAP를 이용한 원격 퍼지 논리 제어시스템)

  • Yi, Kyoung-Woong;Choi, Han-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.4
    • /
    • pp.329-334
    • /
    • 2007
  • This paper deals with self-tuning of fuzzy control systems. The fuzzy logic controller(FLC) has parameters that an: input and output scaling factors to effect control output. Tuning method is proposed for the scaling factor. In this paper. it is studied to control and to monitor the remote system statues using SOAP for communicate between the server part and the client part. The remote control system is controlled by using a web browser or a application program. The server part is waiting for the request of client part that uses internet network for communication each other and then the request is reached. the server part saves client data to the database and send a command set to the client part and then the client part sends command to controller in a cool chamber. The administrator can control and monitor the remote system just using a web browser. The effects of membership functions, defuzzification methods and scaling factors are investigated in the FLC system.

Intelligent Remote Surveillance System Using Pan/Tilt Camera (Pan/Tilt 카메라를 이용한 목표물 자동추적장치의 구현)

  • Yi, Ui-Bae;Seong, Ki-Bum;Ko, Kwang-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.3031-3033
    • /
    • 2000
  • Surveillance system on the internet has attained lots of interests recently. Computer gives surveillance system various functions like remote control and motion detecting. In this paper. auto target tracking system using Pan/Tilt camera is suggested. It consists of UNIX server and Pan/Tilt camera. When UNIX server detect motions from images it sends Pan/Tilt command to camera and camera moves by command. After finishing movement camera replies to server and server starts detecting motion again. To improve performance of motion detecting and tracking images are divided into 9 sub-regions and camera behaves differently. It is certain that robust tracking is achieved when sub-region is applied.

  • PDF

NAVER : Design and Implementation of Networked Virtual Environments Based on PC Cluster (NAVER : PC 클러스터 기반의 분산가상환경 커널 설계 및 구현)

  • Park, Chang-Hoon;Ko, Hee-Dong;Changseok Cho;Ahn, Hee-Kap;Han, Yo-Sub;Kim, Tai-Yun
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2002.05a
    • /
    • pp.221-228
    • /
    • 2002
  • The NAVER is based on a cluster of low-cost personal computers. The goal of NAVER is to provide flexible, extensible, scalable and re-configurable framework for the diverse virtual environments especially for Gamsung research experiments. Personal computers are divided into three servers are according to their specific functions: Render Server, Device Server and Control Server. While Device Server contains external modules requiring event-based communication for the integration, Control Server contains external modules requiring synchronous communication every frame. And, the Render Server consists of 5 managers: Scenario Manager, Event Manger, Command Manager, Interaction Manager and Sync Manager. In this paper, we discuss NAVER as effective distributed system and its application to Gamsung experiment.

  • PDF

Internal Teleoperation of an Autonomous Mobile Robot (인터넷을 이용한 자율운행로봇의 원격운용)

  • 박태현;강근택;이원창
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.45-45
    • /
    • 2000
  • This paper proposes a remote control system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision via the internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a World Wide Web browser and a computer connected to the internet communication network and so they can command the robot in a remote location through our Home Page. The hardware architecture of this system consists of an autonomous mobile robot, workstation, and local computers. The software architecture of this system includes the server part for communication between user and robot and the client part for the user interface and a robot control system. The server and client parts are developed using Java language which is suitable to internet application and supports multi-platform. Furthermore, this system offers an image compression method using motion JPEG concept which reduces large time delay that occurs in network during image transmission.

  • PDF

A Study of Command & Control Server through Analysis - DNS query log (명령제어서버 탐색 방법 - DNS 분석 중심으로)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1849-1856
    • /
    • 2013
  • DOS attack, the short of Denial of Service attack is an internet intrusion technique which harasses service availability of legitimate users. To respond the DDoS attack, a lot of methods focusing attack source, target and intermediate network, have been proposed, but there have not been a clear solution. In this paper, we purpose the prevention of malicious activity and early detection of DDoS attack by detecting and removing the activity of botnets, or other malicious codes. For the purpose, the proposed method monitors the network traffic, especially DSN traffic, which is originated from botnets or malicious codes.

DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram (N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지)

  • Kim, Donghyeon;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1141-1151
    • /
    • 2018
  • In an APT attack, the communication stage between infected hosts and C&C(Command and Control) server is the key stage for intrusion into the attack target. Attackers can control multiple infected hosts by the C&C Server and direct intrusion and exploitation. If the C&C Server is exposed at this stage, the attack will fail. Therefore, in recent years, the Domain Generation Algorithm (DGA) has replaced DNS in C&C Server with a short time interval for making detection difficult. In particular, it is very difficult to verify and detect all the newly registered DNS more than 5 million times a day. To solve these problems, this paper proposes a model to judge DGA-DNS detection by the morphological similarity analysis of normal DNS and DGA-DNS, and to determine the sign of APT attack through it, then we verify its validity.

LCS(Launch Control System) Prototype Performance Analysis (발사관제시스템 프로토타입 성능 분석)

  • Hong, Ii Hee;Kim, Yang Mo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.1
    • /
    • pp.54-60
    • /
    • 2006
  • LCC(Launch Control Center) in NARO space center performs a data monitoring and control through the interface to the external system of launch vehicle. Launch control function needs high reliability and processing speed. Hence, LCS(Launch Control System) is made up a real time system. An important role of the LCS Prototype is discovering a risk element and minimizing it through developing a launch control system. This paper deals with a real time data processing among the simulator, gateway, data distribution server, command and control server which is involving LCS Prototype.

  • PDF