• Title/Summary/Keyword: Network Isolation

Search Result 241, Processing Time 0.026 seconds

Virtualization Technology Trends in Satellite/Mobile Communication Systems (위성/이동 통신 시스템에서의 가상화 기술 동향)

  • S.Q. Lee;J.H. Lee;M.S. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.1
    • /
    • pp.36-47
    • /
    • 2024
  • Virtualization technology supports the execution of software unrelated to the hardware environment through the decoupling of software and hardware. Additionally, it enables network slicing, allowing one physical device to be divided and used by a function or service by supporting sharing with isolation. Virtualization enables flexible platform use, allowing a variety of services to be launched without changes or additions to the hardware platform. We describe virtualization technology trends in satellite/mobile communication systems. Basic concepts and technical definitions are included, and the current status of research and development by domestic and foreign organizations, including the Electronics and Telecommunications Research Institute, is analyzed. Finally, future prospects and implications are discussed.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Fault Diagnosis for the Nuclear PWR Steam Generator Using Neural Network (신경회로망을 이용한 원전 PWR 증기발생기의 고장진단)

  • Lee, In-Soo;Yoo, Chul-Jong;Kim, Kyung-Youn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.673-681
    • /
    • 2005
  • As it is the most important to make sure security and reliability for nuclear Power Plant, it's considered the most crucial issues to develop a fault detective and diagnostic system in spite of multiple hardware redundancy in itself. To develop an algorithm for a fault diagnosis in the nuclear PWR steam generator, this paper proposes a method based on ART2(adaptive resonance theory 2) neural network that senses and classifies troubles occurred in the system. The fault diagnosis system consists of fault detective part to sense occurred troubles, parameter estimation part to identify changed system parameters and fault classification part to understand types of troubles occurred. The fault classification part Is composed of a fault classifier that uses ART2 neural network. The Performance of the proposed fault diagnosis a18orithm was corroborated by applying in the steam generator.

DNP3 Protocol Security and Attack Detection Method (DNP3 프로토콜 보안 현황 및 공격 탐지 방안)

  • Kwon, Sung-Moon;Yoo, Hyung-Uk;Lee, Sang-Ha;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.353-358
    • /
    • 2014
  • In the past, security on control system was guaranteed by isolation of control system networks from external networks. However as devices of the control systems became more various and interaction between the devices became necessary, effective management system for such network emerged and this triggered connection between control system networks and external system networks. This made management of control system easier but also made control system exposed to various cyber attack threats, Therefore researches on appending security measures on each protocols are in progress. This paper focused on DNP(distributed network protocol)3 protocol which is used for communication between control center and substations. It describes characteristics of DNP3 protocol and research on adding security elements to the protocol. It also analyzed known vulnerabilities of DNP3 protocol and proposed data mining methodology for detecting such vulnerabilities.

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Response Methodology against Spoofed IP Attack using Active Networks Mechanism (액티브 네트워크를 이용한 위조 IP 공격 대응 메커니즘)

  • Park, Sang-Hyun;Ko, Haeng-Seok;Kwon, Oh-Seok
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.69-81
    • /
    • 2008
  • It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

An Algorithm for Searching On-Off Valves to Isolate a Subsystem in a Water Distribution System (상수관망의 부분적 차폐를 위해 필요한 제수밸브 결정 알고리즘)

  • Jun, hwan-don;Park, moo-jong;Lee, jong-seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.771-775
    • /
    • 2008
  • Concerns related to protecting, identifying, and isolating of subsystems of a water distribution network have led to the realization of the increased importance of valves in the system. The most important purpose of valves in water distribution systems is to isolate subsystems due to breakage, maintenance activities, or contamination. A subsystem called segment is isolated by the closure of adjacent valves and an efficient algorithm should identify the adjacent valves to minimize the pipe failure impact. In this paper, an algorithm to identify adjacent valves to be closed to isolate a subsystem from the remainder of a network in case of a pipe failure is presented. An application to the water distribution system in Ottawa, Canada demonstrates the developed algorithm efficiently locates the adjacent valves for the isolation of a broken pipe.

  • PDF

Text Network Analysis and Topic Modeling of News Articles on Lonely Death (고독사에 관한 언론보도기사의 텍스트네트워크 분석 및 토픽모델링)

  • Kim, Chunmi;Choi, Seungbeom;Kim, Eun Man
    • Journal of Korean Academy of Rural Health Nursing
    • /
    • v.18 no.2
    • /
    • pp.113-124
    • /
    • 2023
  • Purpose: The number of households vulnerable to isolation increases rapidly as social ties decrease, raising concerns about the associated increase in lonely deaths. This study aimed to identify issues related to lonely deaths by analyzing South Korean news articles; and to provide evidence for their use in preventing and managing lonely deaths via community nursing. Methods: This exploratory study analyzed the structure and trends of meaning of lonely deaths by identifying the association between keywords in news articles and lonely deaths. In this study, we searched for all news articles on lonely deaths, covering the period from January 1, 2010, to May 31, 2023. Data preprocessing and purification were conducted, followed by top-keyword extraction, keyword network analysis and topic modeling. The retrieved articles were analyzed using R and Python software. Results: Four main topics were identified: "discovering and responding to lonely death cases", "lonely deaths ending in lonely funerals", "supportive policies to prevent lonely deaths among of older adults", and "local government activities to prevent lonely deaths and support vulnerable populations." Conclusion: Based on these findings, it can be concluded that lonely death is a complex social phenomenon that can be prevented if society shows concern and care. Education related to lonely deaths should be included in nursing curricula for concrete action plans and professional development.

Isolation and Characterization of Human scFv Molecules Specific for Recombinant Human Heat Shock Protein (HSP) 70.1

  • Baek, Hyun-jung;Lee, Jae-seon;Seo, Jeong-sun;Cha, Sang-hoon
    • IMMUNE NETWORK
    • /
    • v.4 no.1
    • /
    • pp.7-15
    • /
    • 2004
  • Background: The heat shock proteins (HSPs) play an important role in cellular protection mechanisms against physical or chemical stresses. In this study scFv antibodies specific for human HSP70.1 were isolated from a semi-synthetic human scFv library with the ultimate goal of developing anti-HSP70.1 intracellular antibody (intrabody) that may offer an attractive alternative to gene targeting to study the function of the protein in cells. Methods: A semi-synthetic human scFv display library ($5{\times}10^{8}$ size) was constructed using pCANTAB-5E vector and the selection of the library against bacterially expressed recombinant human HSP70.1 was attempted by panning. Results: Three positive clones specific for recombinant HSP70.1 were identified. All three clones used $V_{H}$ subgroup III. On the other hand, $V_{L}$ of two clones belonged to the kappa light chain subgroup I, but the other utilized $V_{k}$ subgroup IV Interestingly, these scFv molecules specifically reacted to the recombinant HSP70.1, yet failed to recognize native HSP70 induced in U937 human monocytic cells by heat treatment. Conclusion: Our results indicated that affinity selection of an scFv phage display library using recombinant antigens produced in E. coli might not guarantee the isolation of scFv antibody molecules specific for a native form of the antigen. Therefore, the source of target antigens needs to be chosen carefully in order to isolate biofunctional antibody molecules.

Mesenchymal Stem Cell Lines Isolated by Different Isolation Methods Show Variations in the Regulation of Graft-versus-host Disease

  • Yoo, Hyun Seung;Yi, TacGhee;Cho, Yun Kyoung;Kim, Woo Cheol;Song, Sun U.;Jeon, Myung-Shin
    • IMMUNE NETWORK
    • /
    • v.13 no.4
    • /
    • pp.133-140
    • /
    • 2013
  • Since the discovery of the immunomodulation property of mesenchymal stem cells (MSCs) about a decade ago, it has been extensively investigated whether MSCs can be used for the treatment of immune-related diseases, such as graft versus-host disease (GvHD). However, how to evaluate the efficacy of human MSCs for the clinical trial is still unclear. We used an MHC-mismatched model of GvHD (B6 into BALB/c). Surprisingly, the administration of the human MSCs (hMSCs) could reduce the GvHD-related mortality of the mouse recipients and xenogeneically inhibit mouse T-cell proliferation and $IFN-{\gamma}$ production in vitro. We recently established a new protocol for the isolation of a homogeneous population of MSCs called subfractionation culturing methods (SCM), and established a library of clonal MSC lines. Therefore, we also investigated whether MSCs isolated by the conventional gradient centrifugation method (GCM) and SCM show different efficacy in vivo. Intriguingly, clonal hMSCs (hcMSCs) isolated by SCM showed better efficacy than hMSCs isolated by GCM. Based on these results, the MHC-mismatched model of GvHD may be useful for evaluating the efficacy of human MSCs before the clinical trial. The results of this study suggest that different MSC lines may show different efficacy in vivo and in vitro.