• Title/Summary/Keyword: monitoring and control scheme

Search Result 193, Processing Time 0.028 seconds

Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event (보안관제 위협 이벤트 탐지규칙 표준 명명법 연구)

  • Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2015
  • Recent, Cyber attacks such as hacking and malicious code techniques are evolving very rapidly changing cyber a ttacks are increasing, the number of malicious code techniques vary accordingly become intelligent. In the case of m alware because of the ambiguity in the number of malware have increased rapidly by name or classified as maliciou s code may have difficulty coping with. This paper investigated the naming convention of the vaccine manufacturer s in Korea to solve this problem, the analysis and offers a naming convention for security control event detection r ule analysis to compare the pattern of the detection rule out based on this current.

Multivariate EWMA Charts for Simultaneously Monitoring both Means and Variances

  • Cho, Gyo Young;Chang, Duk Joon
    • Communications for Statistical Applications and Methods
    • /
    • v.4 no.3
    • /
    • pp.715-723
    • /
    • 1997
  • Multivariate control statistics to simultaneously monitor both means and variances for several quality variables under multivariate normal process are proposed. Performances of the proposed multivariate charts are evaluated in terms of average run length(ARL). Multivariate Shewhart chart is also proposed to compare the performances of multivariate exponentially weighted moving average(EWMA) charts. A numerical comparison shows that multivariate EWMA charts are more efficient than multivariate Shewhart chart for small and moderate shifts and multivariate EWMA scheme based on accumulate-combine approach is more efficient than corresponding multivariate EWMA chart based on combine-accumulate approach.

  • PDF

The Development of Power System Automation based on the CAN Communication Protocol (CAN 통신을 기반으로한 전력 시스템 자동화 구축)

  • Park, Jong-Chan;Kim, Beung-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.52 no.3
    • /
    • pp.95-99
    • /
    • 2003
  • In this paper, the power system automation based on CAN communication protocol is introduced. Along with digitalization of electrical device, the various on-line services such as remote control, remote monitoring, remote parameter setting, fault data recording and remote diagnostic have been realized and become available. Therefore, it is necessary for those electrical devices to have real-time and reliable communication protocols. Author proposes DNPC(Distributed Network Protocol with CAN) which is proper to the power system SCADA (Supervisory Control And Data Acquisition) and DCS (Distributed Control System). The physical and datalink layer of DNPC protocol consists of the CAN2.0B which has the real-time characteristics and powerful error control scheme. As the transport and application layer, DNP3.0 is adopted because of its flexibility and compatible feature. Using the DNPC protocol, the power system automation is realized.

Markovian EWMA Control Chart for Several Correlated Quality Characteristics

  • Chang, Duk-Joon;Kwon, Yong-Man;Hong, Yeon-Woong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.4
    • /
    • pp.1045-1053
    • /
    • 2003
  • Markovian EWMA control chart for simultaneously monitoring mean vector of the several correlated quality characteristics is investigated. Properties of multivariate Shewhart chart and EWMA chart are evaluated for matched FSI (fixed sampling interval) and VSI(variable sampling interval) scheme. We obtained VSI EWMA chart is more efficient than Shewhart chart for small or moderate shifts. And, we obtained stablized numerical results with Markov chain method when the number of transient state is greater than 100.

  • PDF

Integrate Processing Scheme of Flow Control Language (흐름 제어 언어의 통합 처리)

  • Kim, Tae-Wan;Chang, Chun-Hyon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.415-422
    • /
    • 2004
  • Automation systems improve the productivity of works which relate to product design, facilities management, fault processing and quality evaluation. In these systems, the description language for monitoring and control process is called new control language. These are five flow control languages : IL, ST, FBD, SFC and LD. IL and ST are based on left form. FBD, SFC and LD are based on graphic form. Generally, a software which monitors and controls a system is allowed to use just one flow control language. It is impossible to use more than two languages for simulation in the same system environment. In this paper, we analyzed the characteristics of flow control languages and the process of programming in the legacy system. In addition, for the Integrated processing of languages, we propose Extended ST based on the high-level ST language. Based on this research, we implement a graphical language editor and EST-IL convertor. The graphical language editor makes sequence rules, and converts graphical language into EST. EST-IL convertor has a function to convert EST into IL which is similar to assembly language. As the result of this paper, we present a scheme which integrates all the flow control language processing based on IL.

Efficient Abnormal Traffic Detection Software Architecture for a Seamless Network

  • Lee, Dong-Cheul;Rhee, Byung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.313-329
    • /
    • 2011
  • To provide a seamless network to customers, Internet service providers must promptly detect and control abnormal traffic. One approach is to shorten the traffic information measurement cycle. However, performance degradation is inevitable if traffic measurement servers merely shorten the cycle and measure all traffic. This paper presents a software architecture that can measure traffic more frequently without degrading performance by estimating the level of abnormal traffic. The algorithm in the architecture estimates the values of the interface group objects in MIB by using the IP group objects thereby reducing the number of measurements and the size of measured data. We evaluated this architecture on part of Internet service provider's IP network. When the traffic was measured 5 times more than before, the CPU usage and TPS of the proposed scheme was 7% and 41% less than that of the original scheme while the false positive rate and false negative rate were 3.2% and 2.7% respectively.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

A Study on Licence Management Model for Contents Circulation which Ubiquitous Environment is Safe (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.366-370
    • /
    • 2011
  • This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Potentially-innovative options in designing suspension bridges with railway crossing

  • F. Casciati;S. Casciati
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.339-347
    • /
    • 2023
  • Both the first author and the company of the second author were involved, directly or indirectly, in the design stage of a permanent link between the bottom of the Italian peninsula and the nearby Sicily island. This ambitious project was left in stand-by from 2013 to 2023. The current political revival originates some thoughts on the updated desired performance of suspension bridges, without any immediate reference to that specific crossing. It is simply regarded as a starting point. After an update on recent worldwide realizations, the authors focus their attention on four basic aspects: the span length, the girder scheme, the foundation technology and the bridge runability. Eventually, structural control and monitoring aspects are discussed as potentially innovative options in designing suspension bridges with railway crossing.

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid

  • Shen, Gang;Su, Yixin;Zhang, Danhong;Zhang, Huajun;Xiong, Binyu;Zhang, Mingwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1553-1571
    • /
    • 2018
  • Currently, many of schemes for smart grid data aggregation are based on a one-level gateway (GW) topology. Since the data aggregation granularity in this topology is too single, the control center (CC) is unable to obtain more fine-grained data aggregation results for better monitoring smart grid. To improve this issue, Shen et al. propose an efficient privacy-preserving cube-data aggregation scheme in which the system model consists of two-level GW. However, a risk exists in their scheme that attacker could forge the signature by using leaked signing keys. In this paper, we propose a secure and fine-grained electricity consumption aggregation scheme for smart grid, which employs the homomorphic encryption to implement privacy-preserving aggregation of users' electricity consumption in the two-level GW smart grid. In our scheme, CC can achieve a flexible electricity regulation by obtaining data aggregation results of various granularities. In addition, our scheme uses the forward-secure signature with backward-secure detection (FSBD) technique to ensure the forward-backward secrecy of the signing keys. Security analysis and experimental results demonstrate that the proposed scheme can achieve forward-backward security of user's electricity consumption signature. Compared with related schemes, our scheme is more secure and efficient.