• Title/Summary/Keyword: network protection system

Search Result 553, Processing Time 0.03 seconds

Improvement of Security Management Model for a High Speed Information Network (초고속 정보망의 보안관리모델 개선방안)

  • Seo Jeong-Eun;Kim Yoon-Ho;Choi Se-Ha
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.4
    • /
    • pp.71-77
    • /
    • 2003
  • Security system in internet as well as the performance in information network became more important as the internet environment is getting popular and complicate. In this study, the security system (Firewall and IDS) was installed in high speed information network and analyzed for a change in the speed of data transfer and the possibility of invasion. The selection of appropriate system, efficient detection and protection and surveillance method were suggested and analyzed In order to do experiments, an experimental model was com prized to analyze the parameters that was affected by the detection and protection system in network. This will give a standard how much we can pull up the security system maintaining the network speed.

  • PDF

A Method for Zoning the Parcel-based Protecting Area of the Ecological Network in Forest (지적 기반 산림생태네트워크 보호구역 설정방안)

  • Jang, Rai-Ik;Jang, Gab-Sue;Jung, Ok-Sik;Ra, Jung-Hwa
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.12 no.6
    • /
    • pp.131-142
    • /
    • 2009
  • The purpose of this study is to detect the protection area around the Geum-buk and Geum-nam Mountains for making a sustainable ecological network. The protection area in the Geum-buk and Geum-nam Mountains was analyzed by using spatial data and a field survey for landscape conservation purposes. A survey scope was fixed using digital elevation model, and the protection area was finally determined based on the parcel map called as the Korea Land Information System (KLIS). Here we have several conclusions in this study. First, spatial data used in this study were a map of ecological and natural degree (MEND), forest distribution map, elevation map, slope map, and several maps for the protection area assigned by laws regarding to the natural resources. Second, we used 4 alternatives to determine the best choice for showing the ecological network in the study area. One alternative (alt. 3) of 4 ones was finally chosen as the best condition for making the ecological network. The condition in elevation and slope was a little modified to a lower level in alt, 3. The result derived from alt, 3 reflected the continuity and connectivity in the ecological network and we estimate that the protection area can protect the core area using the buffer zone around the ecological network. Finally the parcel-based protection area in the Geum-buk and Geum-nam Mountains had $493.92km^2$ of the core area, and $233.99km^2$ of the buffer zone, which means the parcel-based protection area increased by $97.76km^2$ in the core area, but decreased by $76.61km^2$ as of in the topographical map.

Design of Integrated Smart Fire Protection System for Rack Storage (랙크식 창고 통합 스마트 화재대응 시스템 설계)

  • Kim, Jong-Hoon
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.26-36
    • /
    • 2020
  • It is very difficult to suppress fire by rapid flame spread through flue space between flammable commodities on the rack when a fire occurs in the rack storage. At present, the fire protection system for rack storage in Korea has many issues, and the new fire protection system was designed and developed by it. A smart system using the sensor network and artificial intelligence was designed to detect fire very rapidly and track the location of a fire. In the very early stages, the system was constructed using vertical open sprinkler pipes, wet pipes, and solenoid valves to allow water to spray near fire locations. Based on the design results, the system was installed and tested, and the full-scale test was successfully completed.

Parametric Evaluation Method of Protectability in a Distribution System (파라메터 관점에서의 배전계통 보호도 평가방법)

  • Cho, P.S.;Hyun, S.H.;Lim, S.I.;Lee, S.J.;Lee, D.S.;Waldemar, Waldemar
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.241-243
    • /
    • 2002
  • Recently, great efforts are concentrated on the autonomous, adaptive protection schemes with advanced artificial intelligence and digital technology. It is highly required for a next generation protective system not only to detect and to clear a fault, but also to fit itself to the changing environment. In this paper it is suggested an evaluation method for the protection ability of a protective system in a distributed system. The suggested method is of bottom-up scheme, in other words, protection ability is estimated from the lowest level of parameters in each protective devices to the highest level of the whole protective system. This feature makes it possible to evaluate the protection ability either for the protective device(or a system), or for a protected system. And, in addition, it is enabled that the protectability concept can be applied in the design stage of a protective system for a distribution network. The proposed method is applied to a simple distributed network to show its effectiveness.

  • PDF

Transformer Differential Relay by Using Neural-Fuzzy System

  • Kim, Byung Whan;Masatoshi, Nakamura
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.157.2-157
    • /
    • 2001
  • This paper describes the synergism of Artificial Neural Network and Fuzzy Logic based approach to improve the reliability of transformer differential protection, the conventional transformer differential protection commonly used a harmonic restraint principle to prevent a tripping from inrush current during initial transformer´s energization but such a principle can not performs the best optimization on tripping time. Furthermore, in some cases there may be false operation such as during CT saturation, high DC offset or harmonic containing in the line. Therefore an artificial neural network and fuzzy logic has been proposed to improve reliability of the transformer protection relay. By using EMTP-ATP the power transformer is modeled, all currents flowing ...

  • PDF

Consumer Protection in E-commerce: Synthesis Review of Related Books

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.413-419
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce.

An Improved Detection Performance for the Intrusion Detection System based on Windows Kernel (윈도우즈 커널 기반 침입탐지시스템의 탐지 성능 개선)

  • Kim, Eui-Tak;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.711-717
    • /
    • 2018
  • The breakthrough in computer and network has facilitated a variety of information exchange. However, at the same time, malicious users and groups are attacking vulnerable systems. Intrusion Detection System(IDS) detects malicious behaviors through network packet analysis. However, it has a burden of processing a large amount of packets in a short time. Therefore, in order to solve these problem, we propose a network intrusion detection system that operates at kernel level to improve detection performance at user level. In fact, we confirmed that the network intrusion detection system implemented at kernel level improves packet analysis and detection performance.

Realization of Protection IED for Distributed Power System (분산 전원 계통 연계용 보호 IED의 설계 및 구현)

  • Han, Chul-Wan;Oh, Sung-Nam;Kim, Kab-Il;Son, Young-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.517-519
    • /
    • 2005
  • In this paper, we consider a digital protection IED(Intelligent Electric Device) for a distributed power system. The IED can measure various elements for protection and communicate with another devices through network. The protection IED is composed of specific function modules: signal process module which converts analog signal from PT and CT handle algorithm to digital one; communication module for connection with another IEDs; input/output module for user-interfaces. A general purpose DSP board with TMS320C2812 is used in the IED. In order to verify the proposed IED, experimental researches with the power system simulator DOBLE has been carried out for a phase earth fault. The results show an under-voltage relaying algorithm has been realized sucessfully in the hardware system.

  • PDF

Fire Protection system using CAN (CAN을 이용한 소방 시스템)

  • Choi S. I.;Kim Y. D.;Kang W. C.;Kim Y. H.;Oh G. G.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07a
    • /
    • pp.167-171
    • /
    • 2004
  • In this Paper, We are going to propose the fire protection system with using CAN(Controller Area Network). The larger, higher and deeper buildings are, the more dangerous people are when fire happens. We are aware of the problems of prior Fire protection system. Therefore, we construct embedded system based on CAN communication that is capable of N:N communication, and build independent Fire protection system.

  • PDF

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF