• Title/Summary/Keyword: cyber physical systems

Search Result 183, Processing Time 0.032 seconds

A Novel Abnormal Behavior Detection Framework to Maximize the Availability in Smart Grid

  • Shin, Incheol
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.95-102
    • /
    • 2017
  • A large volume of research has been devoted to the development of security tools for protecting the Smart Grid systems, however the most of them have not taken the Availability, Integrity, Confidentiality (AIC) security triad model, not like CIA triad model in traditional Information Technology (IT) systems, into account the security measures for the electricity control systems. Thus, this study would propose a novel security framework, an abnormal behavior detection system, to maximize the availability of the control systems by considering a unique set of characteristics of the systems.

Development of web-based collaborative framework for the simulation of embedded systems

  • Yang, Woong;Lee, Soo-Hong;Jin, Yong Zhu;Hwang, Hyun-Tae
    • Journal of Computational Design and Engineering
    • /
    • v.3 no.4
    • /
    • pp.363-369
    • /
    • 2016
  • Cyber Physical System (CPS) and Internet of Things (IoT) are hot objects of interest as an extension of the embedded system. These interactive products and systems contain Mobile Devices which are most popular and used most frequently. Also these have been widely used from the control of the Nuclear Power Control System (NPCS) to IoT Home Service. Information & Communication Technology (ICT) topics of trend fused-complex current Information Technology (IT) and Communication Technology (CT) are closely linked to real space and virtual space. This immediately means the arrival of the ultra-connected society. It refers to a society in which various objects surrounding the human innovation and change in the social sector are expected through the connection between the data which are to be generated. In addition, studies of Tool-kit for the design of such systems are also actively pursued. However, only increased cooperation and information sharing between the physical object consists of a variety of machinery and equipment. We have taken into consideration a number of design variables of the high barriers to entry about the product. In this study, It has been developed a Web-based collaboration framework which can be a flexible connection between macroscopically virtual environment and the physical environment. This framework is able to verifiy and manage physical environments. Also it can resolve the bottlenecks encountered during the base expansion and development process of IoT (Internet of Things) environment.

A Proposition for Smart Warehouse Management System (SWMS) through IoT (IoT를 채용한 스마트 창고관리 시스템 설계 제안)

  • Kim, Jun Yeong;Jeon, Byeong-Woo;Hong, Dae Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-93
    • /
    • 2015
  • Warehouse Management System (WMS) is a key control for Material Handling System (MHS) and Inventory Control System (ICS). How to design and implement for WMS is crucial factor for achieving the key performance index for Manufacturing Industry. In particular, iron and steel making industry, where the volume and weight is large and hence FIFO (First Input First Out) is not working, how to design WMS is a key factor. In this paper, we systematically define the problem of WMS via developing StR (Stakeholders' Requirements) or ORD (Operational Requirement Documents), SyR (System Requirement), and SA (System Architecture) based on the emerging technologies. In particular, IoT (Internet of Things), CPS (Cyber Physical System) concepts and enabling technologies haves been incorporated in developing Smart WMS. The deliverables of the research can provide a conceptual framework for developing the next generation industrial WMS.

Design and Implement of a Novel Software to Facilitate Customized Cyber-Education (가상교육에서의 맞춤 컨텐츠 제공시스템 설계 및 구현)

  • Lee, Ja-Hee
    • 대한공업교육학회지
    • /
    • v.30 no.1
    • /
    • pp.84-95
    • /
    • 2005
  • With recent advancement in informational sciences, educational systems are undergoing a revolutionary facelift on how students attain their education. These developments have diminished the traditional method of teaching and learning and have improved the overall quality of the educational environment. They have also ignited the birth of cyber-education in which students have the flexibility and responsibility on what and when to study, thus providing a greater freedom to control one's education. Cyber-educational environment not only requires physical hardware but also an organizational structural component and most importantly, a software component that drives and gives the student management power to tailor their studies based upon their educational requirements. Due to the fact that individuals learn and develop at different rates, one of the important features of a cyber-educational program will be its ability to adjust and customized to individual needs and requirements. In this thesis, a novel software which encompasses these ideas was designed and developed. This program allows the individual more flexibility and management of courses based on their ability and needs. Because the software customizes to one's ability and it allows the student to advance at a more comfortable pace, it boosts the student's confidence and desire to learn. In the future, new and improved programs similar to the one developed here will further enhance the cyber-educational environment and will undoubtedly improve the overall quality of student's education.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

Design and Implementation of Green Light Optimal Speed Advisory Based on Reference Mobility Models (GLOSA-RMM) in Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 참조이동모형 기반 녹색신호 최적화 가속도 조언의 설계 및 구현)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.544-554
    • /
    • 2014
  • In this paper, we introduce a cyber-physical intersection systems (CPIS) which intimately interconnects roadside units (RSU) located at intersection, on-board units (OBU) of moving vehicles, and smartphone apps. Based on the architecture of CPIS, we also present a green light optimal speed advisory based on the reference mobility models (GLOSA-RMM) to reduce intersection stopping time (IST) and fuel consumption. Based on several reference mobility models, the GLOSA-RMM determines the appropriate speed advisory by taking into account the current mobility and the intersection traffic light status, and then provides screen/voice GLOSA instructions to minimize the driver's distraction. We show that the GLOSA-RMM can reduce both the IST and the fuel consumption through the numerical results obtained from the prototype of the CPIS consisting of the OBU, the RSU and the smartphone app.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.