• Title/Summary/Keyword: Deployment Analysis

Search Result 550, Processing Time 0.028 seconds

A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense (DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구)

  • Kim, Ji-Yeon;Lee, Ju-Li;Park, Eun-Ji;Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.39-47
    • /
    • 2009
  • Recently, the threat of DDoS attacks is increasing and many companies are planned to deploy the DDoS defense solutions in their networks. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. Since it is very hard to prevent the DDoS attack beforehand, the strategic plan is very important. In this work, we have conducted modeling and simulation of the DDoS attack by changing the number of servers and estimated the duration that services are available. In this work, the modeling and simulation is conducted using OPNET Modeler. The simulation result can be used as a parameter of trade-off analysis of DDoS defense cost and the service's value. In addition, we have presented a way of estimating the cost effectiveness in deployment of the DDoS defense system.

Diagnosis on Degree of Saturation Model of COSMOS Affected by Geometric and Detection Conditions and Detector Placements (교통조건, 기하구조 조건 및 검지기 설치위치에 따른 실시간신호제어시스템 포화도 산출방식 진단)

  • KIM, Jun-Young;KIM, Jin Tae
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.81-94
    • /
    • 2016
  • The Korean real-time traffic responsive control systems, Cycle Offset Split Model of Seoul (COSMOS), employs a single theoretical model to estimate the degree-of-saturation (DS) on approaches. However, the deployment of the system has been accomplished without practical consideration of its field performance. This paper delivers a diagnosis study performed to find the relationships yet known on the DS values against the operational conditions unproved in theory but ordinarily observed in field practice. Based on the analysis of the historical log data (476,505 cycles) obtained from the COSMOS server, it was found; (1) full coverage of lane detections should perform better than the sample coverage of detection in ordinary conditions, (2) the sample coverage of detection perform better than the other case with an exclusive bus lane, (3) detection in which a shared lane is involved provide poor estimation of DS, (4) poor DS estimation when a detection lane is adjacent to a shared lane, and (5) the DS values obtained during a day can hardly be stable all time. The findings suggest traffic engineers a progressive direction to move forward for the next real-time traffic control systems.

The Effect of Wireless Channel Models on the Performance of Sensor Networks (채널 모델링 방법에 따른 센서 네트워크 성능 변화)

  • 안종석;한상섭;김지훈
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.375-383
    • /
    • 2004
  • As wireless mobile networks have been widely adopted due to their convenience for deployment, the research for improving their performance has been actively conducted. Since their throughput is restrained by the packet corruption rate not by congestion as in wired networks, however, network simulations for performance evaluation need to select the appropriate wireless channel model representing the behavior of propagation errors for the evaluated channel. The selection of the right model should depend on various factors such as the adopted frequency band, the level of signal power, the existence of obstacles against signal propagation, the sensitivity of protocols to bit errors, and etc. This paper analyzes 10-day bit traces collected from real sensor channels exhibiting the high bit error rate to determine a suitable sensor channel model. For selection, it also evaluates the performance of two error recovery algorithms such as a link layer FEC algorithm and three TCPs (Tahoe, Reno, and Vegas) over several channel models. The comparison analysis shows that CM(Chaotic Map) model predicts 3-time less BER variance and 10-time larger PER(Packet Error Rate) than traces while these differences between the other models and traces are larger than 10-time. The simulation experiments, furthermore, prove that CM model evaluates the performance of these algorithms over sensor channels with the precision at least 10-time more accurate than any other models.

A guideline for freeway incident management manual (고속도로 돌발상황관리 매뉴얼 작성지침 개발)

  • Baek Seung-Kirl;Oh Chang-Seok;Kang Jeong-Gyu;Nam Doo-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.3 s.8
    • /
    • pp.61-72
    • /
    • 2005
  • This paper is designed to report the results of response manual development in relation to the freeway Incident Management System(FIMS) development as part of Intelligent Transportation Systems Research and Development program. The central core of the FIMS is an integration of the component parts and the modular, but integrated system for freeway management. The whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first task taken during the process was the selection of the required actions for each step within the Incident Management System. After through review and analysis of existing incident response procedures and manuals, the incident response manual led to the utilization of different technologies and actions in relation to the specific needs and character of the incidents. FIMS also provides Integrated Incident Management according to the verified incident information provided by the each components The deployment of containment and mitigation strategies for incidents will be automatic or manual depending on the configuration of the system. It is anticipated that, over a period of time, operators will be able to response the incident using integrated and organized Procedures and action items.

  • PDF

Road Networks and Crime Occurrence Multi-Agent Simulation for Smart Safe City (스마트 안전도시 조성을 위한 도로망 특성과 범죄발생 멀티에이전트(Multi-Agent) 시뮬레이션)

  • MOON, Tae-Heon;CHO, Jung-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.120-134
    • /
    • 2015
  • Under the hypothesis that the form of road network could affect crime occurrence, this study demonstrates to prove them using Space Syntax with real crime data. We calculated integration, control, connection index by means of Space Syntax and analyzed the relationship between the three indexes and the number of crime occurrence on the each road. Next, in order to generalize the analysis results we adopted Multi-Agent Model and simulated several scenarios on the computer virtual space. The results revealed that integration index has the strongest relationship with crime occurrence both in the case of real study area and virtual space simulations. Though this study has several limitations on the extent of virtual space and realistic computer programming of agents' behavior, the results are meaningful to verify the relationship between the form of read network and crime occurrence. Moreover the simulation platform that this study developed has promising possibilities to find realistic solutions on the effective police deployment or facility layout to improve smart safe city development.

A Study on the Scope and Determinants of Electronic Collaboration based on IT in Interorganizational Relationships (기업간 거래에서 정보기술을 활용한 전자적 협력의 범위와 선행요인에 관한 연구)

  • Choi, Su-Jeong
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.159-188
    • /
    • 2008
  • This study suggests strategies which can enable to creation of new opportunities of competitive advantages while operating a long lasting and consistent business with major trading partners, based on interorganizational information systems (IOISs) specially established and installed for interorganizational transactions. Nowadays, IOISs based mechanism having been widely expanded as a conventional business infrastructure for the interorganizational transactions and/or exchanges, it is customary difficult to obtain any strongly sound advantage over the competitors who have adopted even the simplest deployment of the IOIS mechanisms. In this connection, this study intends to investigate the interorganizational collaborative activities conducted by under the auspicious of IOISs, focused on the prospect of the exploitation of IOISs rather than the implementation of the IOISs. In this study, we, firstly, suggest the concept of Electronic Collaboration which can be defined by the collaborative activities conducted by IOISs, compared to the ones conducted on off-line. In addition, we suggest the Electronic Collaboration as a multi-dimensional concept, constituted by three sub-constructs, the Electronic Information Sharing (EIS), the Electronic Joint Activity (EJA), and the construction of the Electronic Relational Knowledge Store (ERKS). Secondly, we empirically verify the effects of relational and environmental determinants on the Electronic Collaboration. In this study, the relational determinants relate to the variables created in interorganizational relationship like Trust, Influence, Relational Specific Asset-asset invested for the transaction-, and Continuity of the relationship. On the other hand, the environmental determinants relate to the variables surrounding the relationship which are difficult to control. We consider Product Complexity, Technological Uncertainty, and Market Variability as the domain of the environmental determinants. To test our hypotheses, we conducted both paper-based survey and online-based survey. After refining the data with missing responses, a total of 150 data was used for analysis. The results were as follows : Firstly, it is statistically significant that the Electronic Collaboration is composed of EIS, EJA, and ERKS. In particular, the results imply that the firms are able to accumulate relational knowledge base as well as to exchange information or knowledge, and to conduct joint activities through effort to further expand the Electronic Collaboration. Secondly, we have verified the individual effects of the relational and the environmental determinants on the Electronic Collaboration. Product Complexity has been revealed as the most influential variable affecting the Electronic Collaboration. Next, Interorganizational Trust and Technological Uncertainty, in that order, have been seen to have significant effects on the Electronic Collaboration. In other words, when products or services seem to be difficult to standardize, and the core technologies seem to rapidly change, the need for the Electronic Collaboration increase. In addition, the observation dictates that the interorganizational trust turns out to be a critical variable in building a relationship and in seeking further collaboration. The results, further, illustrate that the environmental determinants are relatively more effective than the relational determinants, which is not consistent with a few prior researches relational determinants emphasized. It is because this study doesn't consider the size of the firm. A few researchers have given an emphasis on the relational determinants like trust and influence, especially from the perspective of small firms in interorganizational relationship. However, in our study, where all the sizes of the firms are contained, electronic collaboration is considerably affected by the environmental determinants.

  • PDF

An Analysis of the Patterns of Using History in Textbook Developed under the 2015-Revised Curriculum (2015 개정 교육과정에 따른 <수학 II> 교과서에 나타난 수학사 활용 유형 분석)

  • Kim, Eun Suk;Cho, Wan Young
    • Communications of Mathematical Education
    • /
    • v.33 no.4
    • /
    • pp.471-488
    • /
    • 2019
  • This paper aims to examine how mathematical history is used in textbooks according to the 2015-Revised Curriculum. We analyze the distribution and characteristics of making use of the mathematical history in the nine textbooks, using the framework suggested by Jankvist (2009) on the whys and hows of using historical tasks. First, the tasks related to mathematical history in the textbooks are mostly used as an affective tool, while few tasks are used as a cognitive tool. Second, most of the historical tasks of the type of an affective tool are introducing the anecdotes of mathematicians or in the history of mathematics, and only one case is trying to show human nature of mathematics by illuminating the difficulties mathematicians were faced with. Third, all the mathematical history tasks used as affective tools and goals are illumination materials, while only two out of the ten tasks in the category of a cognitive tool are illumination materials, yet eight others are modular ones. Considering the importance and value of using mathematical history in the math education, this paper recommends that more modular materials on mathematical history tasks in the category of cognitive tools and goals should be developed and their deployment in the textbooks or courses should be promoted.

Traffic Flooding Attack Detection on SNMP MIB Using SVM (SVM을 이용한 SNMP MIB에서의 트래픽 폭주 공격 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.351-358
    • /
    • 2008
  • Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems(IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network environment. In this paper we propose a lightweight and fast detection mechanism for traffic flooding attacks. Firstly, we use SNMP MIB statistical data gathered from SNMP agents, instead of raw packet data from network links. Secondly, we use a machine learning approach based on a Support Vector Machine(SVM) for attack classification. Using MIB and SVM, we achieved fast detection with high accuracy, the minimization of the system burden, and extendibility for system deployment. The proposed mechanism is constructed in a hierarchical structure, which first distinguishes attack traffic from normal traffic and then determines the type of attacks in detail. Using MIB data sets collected from real experiments involving a DDoS attack, we validate the possibility of our approaches. It is shown that network attacks are detected with high efficiency, and classified with low false alarms.

Quantitative Evaluation of the Semi-Actuated Signal Control Systems (반감응 신호제어의 정량적 효과 평가에 관한 연구)

  • Kim, Seung-Jin;Lee, Sang-Soo;Lee, Choul-Ki;Park, Sung-Kyun;Lee, Ho-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.19-28
    • /
    • 2013
  • This study evaluated the quantitative effects of the deployment of semi-actuated signal systems using field data. For this, a semi-actuted signal system was deployed in the regional roadway network extensively. This paper investigated an operating strategy of semi-actuated signal systems for field application, and implemented the functional strategy into the standard signal controller. The performance was evaluated using three measures of effectiveness such as traffic volume, travel time, and the number of delayed vehicle. From the analysis results, traffic volume increased about 9.4% and 11.3% for morning and evening peak periods, respectively. The average travel time was reduced about 6.3% and 7.8% during morning and evening peak periods, respectively because of the expansion of bandwidths for major streets. In addition, the number of delayed vehicles was reduced about 36.4% and 23.9% for morning and evening peak periods, respectively. It is expected that the effectiveness of signal control system can be improved by incorporating a properly designed semi-actuated signal system in regional roadways with directional demand variation.

Classification of Fire Causes in Warehouses Using the TRIZ Technique and Analysis of Preventive Measures Accordingto 4M (TRIZ기법에 의한 물류창고의 화재원인 및 4M에 따른 예방대책 분석)

  • Han, Sang-Hun;Kong, Ha-Sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.401-412
    • /
    • 2020
  • This study analyzed the causes of warehouse fires using a creative problem-solving technique called TRIZ. It identified preventive measures by applying 4M. The results are as follows. First, this study examined the inconsistency among the causes of warehouse fires using TRIZ. Second, it analyzed human factors and fire prevention measures in warehouses such as safety standards for managers, and methods for the promotion of safety consciousness among workers, and for the reinforcement of construction technology for sandwich panel workers. Third, it identified the mechanical and facility factors and fire prevention measures in warehouses such as safety facilities, the expanded installation of safety devices, the adoption and development of fire suppression equipment, and the deployment of methods to improve the fire resistance of sandwich panels. Fourth, it presented working and environmental factors and fire prevention measures in warehouses such as the tightening of safety precautions and the supervision of working methods, and setting fire partitions both in loading places and based on performance-based design. Finally, it proposed managerial factors and fire prevention measures in warehouses such as specific targeting for firefighting with low fire hazards, reviewing the material quality regulations of non-combustible or higher for sandwich panels in the specific target of firefighting that cannot apply fire safety standards, installing sprinklers in cold storage, and mandating the installation of automated facilities with retroactive application regardless of the floor area in the warehouse with a sandwich panel structure.