• Title/Summary/Keyword: Sector 관제

Search Result 30, Processing Time 0.024 seconds

A Study On Automatic Control Sector Hand-off Algorithm For Air Traffic Control System Automation (항공관제 시스템 자동화를 위한 자동 관제권 이양 알고리즘 연구)

  • Kim, Yong-Kyun;Won, In-Su;Yun, Jun-Chol;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.489-494
    • /
    • 2010
  • According to the recent increase in air traffic more efficient air traffic control automation is required. Aeronautical traffic environment is different from the common traffic environment since it exist controller for control of aircraft And controller have to control jurisdiction hand-off by manual when aircraft move to the other sector. This paper proposes the automatic control jurisdiction hand-off algorithm for efficient air traffic flow management. It is sector distinction algorithm that aircraft move sector to the other sector it recognized sector and then give permission to authorized controller. As a simulation result, so unlilke simply manual control sector hand-off of existing algorithm. we confirmed that proposed algorithm in this paper can do air traffic control more efficiently by performing automatic aircraft. control sector hand-off.

남동부해역의 통항량 및 사고사례 분석을 통한 관제 방안

  • Jo, Gi-Jeong;No, Jeong-Su;Park, Jin-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.188-190
    • /
    • 2013
  • 국제 해상물동량(해상화물 수송량은 10년 사이에 매년 평균 4.3%씩)의 증가에 따라 해양사고의 발생 빈도도 높아지고 있으며, 사고의 규모도 대형화 되고 있는 추세이다. 이에 따라 해상에서의 선박 위험도 저감을 위한 많은 시스템들이 개발/운영되고 있지만, 대부분 실시간 위치정보를 기반으로 충돌위험 등을 분석하고 있고, 선박간의 충돌 외의 선박의 주변 환경에 대한 고려는 미비한 실정이다. 실제 해상에서의 통항량 및 10년간 사고를 분석하여, 충돌등 사고가 많은 남동부 해역(여수/통영/진해)의 통항패턴, 교차구역 및 해양사고 특성을 분석해보고, 이에 따라 Sector별 특징적 집중 관제 방안을 마련하여, 선제적 안전 서비스 방안을 연구하고자 한다.

  • PDF

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

Security Operation Dashboard Design by Blockade-Detection-Response (봉쇄-탐지-대응 기반 보안관제 대시보드 설계)

  • Han, Choong-Hee
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.39-47
    • /
    • 2021
  • Standardization of the security operation dashboard is essential for efficient operation of security operation center. The security operation dashboard should be configured so that it is widely used by security operation workers who have to live together 24 hours a day, 365 days a year. In addition, it must be able to comprehensively express the business activities of the security operation center. In addition, it should be possible to easily explain the business activities of the security operation center. Therefore, in this paper, we would like to explain the design of a security control dashboard based on blockade, detection, and response that is actually applied to case organizations in the power sector. Through this, it is intended to reduce the effort and time required for configuring a custom dashboard for VIPs, and contribute to the efficient operation of the security operation center.

A Basic Study on Vessel Traffic Service Area and the Marine Traffic Dangerous Degree of Korean Ports (우리나라 항만의 해상교통 위험도와 해상교통관제구역 기초 조사에 대한 연구)

  • Park, Youngsoo;Seo, Hongyong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.354-356
    • /
    • 2013
  • This research analysed the marine traffic dangerous degree of korean ports by using the number of passing ships, the passing ratio of large ships and the occurrence number of marine accident. Also, it investigated the basic parameters as the number of sector or area of vessel traffic service area, and it examined the proper design compared the traffic dangerous parameters with the present area number of VTS.

  • PDF

VTS Task Assessment using AHP (AHP를 활용한 VTS업무 중요도 평가)

  • Kim, Joo-Sung;Jung, Cho-Young;Kim, Kwang-il
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.11a
    • /
    • pp.261-262
    • /
    • 2018
  • The tasks of Vessel Traffic Services are classified according to the content of the information provided. Since the establishment of the first Vessel Traffic Service center in 1993 at Phohang harbour, it has been steadily developed and its work domain and scope have been expanded. In this paper, the importance and workload of Vessel Traffic Service operators were analyzed according to classification of the tasks. In order to measure the importance and workload, questionnaires were conducted for the operators nationwide, and conclusions were drawn using the multi-criteria decision making process. The relationship between the importance of tasks and the workload might be used as the weights for setting the service areas in the future. Furthermore, it is expected to be used as the data of changable sector operation based on the relationship between importance and workload.

  • PDF

Response plan against cyber terror on Korean electricity sector (우리나라 전력계통의 사이버테러 대응방안 고찰)

  • Kang, Sun-Hee;Sohn, Yoon-Tae;Kim, Sung-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.124-126
    • /
    • 2007
  • 전력계통 보안관제센터는 전력IT의 사이버테러 위험을 줄이고 보안을 강화하는 것이다. 이를 위해 전력산업 관계기관은 해킹 바이러스와 같은 사이버공격에 대한 대응을 고도화하기 위해 전력거래소 내 전력계통보안관제센터(ES-ISAC)에 실시간 관제 대응센터를 만들고 시스템 성능의 지속적인 업그레이드 작업과 다른 시스템과의 연동을 확대함으로써 사이버침해 사고에 대한 예측력을 향상시키는 작업을 추진해야 한다. 침입기술, 웜 바이러스 샘플 분석과 같이 침해사고 정보수집을 보다 능동적으로 하고 모든 정보에 대한 백업시스템을 구축함으로써 안정적인 센터운영을 기해야 한다.

  • PDF

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

A Case Study on the Interior design characteristics of Integrated CCTV Control Center - Focused at Human Factor Design aspect (CCTV 통합관제센터의 실내공간특성에 대한 사례분석연구 - 인간공학디자인(HFD)의 관점에서)

  • Han, Ji Eun;Kwon, Gyu Hyun
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.103-118
    • /
    • 2017
  • It is expected that the integrated control service of the public sector will be increased for the safety of citizens in the future. Therefore, In this study, we analyzed the classification of CCTV control center and the characteristics of interior design. The survey was conducted at eight control centers in Seoul that were constructed since 2007 and analyzed according to the criteria of general matters, services, spatial basic information, spatial structure, and internal structure. The results of the survey are summarized as follows. Based on the results of the study, the Integrated Control Center is a space where the ratio of the physical environment is not high but performs important tasks for the citizens of the city, which are operated 24 hours a day, and security and security. It is characterized by the efficient space allocation for the treatment, the design of the moving line, and the connection according to the urgent work flow. The results of this study are expected to be used as basic data for other integrated control center environment.

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.99-107
    • /
    • 2019
  • The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying 'security control' using the pattern of 'control charts'. The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.