The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To maintain the high level of security, many organizations use Deep Packet Inspection (DPI) firewalls to filter anomaly traffic coming into their networks. However, a DPI firewall with a large volume of traffic can lead to a high packet drop rate, high delay, and the poor network throughput. One possible way to relieve the firewall workload is to deploy multiple firewalls and select only suspicious...
This paper introduces SONA (Spatiotemporal system Organized for Natural Analysis), a tabletop and tangible controller system for exploring geotagged information, and more specifically, CCTV. SONA's goal is to support a more natural method of interacting with data. Our new interactions are placed in the context of a physical security environment, closed circuit television (CCTV). We present a three-layered...
IoT / Cloud / Big data / Mobile (ICBM) is a new technology paradigm that merges IoT, cloud, big data, and mobile technologies. In this study, we designed and implemented a smart farm environment management system that can collect and monitor information on crop growth utilizing ICBM technology. The wireless system proposed in this paper not only collects environmental data from the inside of a vast...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
In this paper, we propose two simple and practically feasible countermeasures to address the Route Spoofing and Resource Exhaustion attacks in Software Defined Networking (SDN) scenarios. For Route Spoofing attack, we introduce a new technique called “selective blocking” which blocks an adversary node to use a genuine user's active routes, and for Resource Exhaustion attack, we propose a “periodic...
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center complexity. By separating the control plane from the data plane, SDN introduces a new abstraction layer. This new abstraction layer is typically implemented by means of a so-called SDN controller. SDN applications can interact with the controller to ensure network functionality....
Indonesia is a big country which has many isolated power system networks. Sumatera power system is one of the main power system networks in Indonesia that supplies electricity for more than 45 million inhabitants in Sumatera Island. For the transmission topology and load characteristic, there are some dynamic stability problems in Sumatera power system such as voltage and small signal stability. To...
The new generation intelligent park is demanded for the flexible utilization mode of distributed renewable energy, energy storage equipment and the various characteristic load access. However, the energy router is correspondingly responsible for energy routing and dynamic control. Its uniform interface supports the plug and play of distributed power, energy storage and load of the intelligent park...
On the information security of ACS TP negatively influenced by increasing their integration with enterprise systems management, as well as the wide spread of remote access technologies. Additional information security risks arise on the background of the smooth transition analogue of technology on hardware platform based x86, and active implementation of IP technology in the ACS environment. The combination...
This article presents a real-time control system for an experimental model of a water distribution system. The hardware and software implementation follows the latest trends in IoT and proves that such an architecture can be used for real-time process control in distributed systems. The control of flow is implemented using a multiple-model control algorithm for the pumping station. A method which...
In this paper, we report on a method of finding lot defects and the results of a verification related to the maintenance of power-supply and air-conditioning equipment for ICT. We built a logic and models to automatically detect equipment that may be included in a defective lot. An equipment anomaly analysis system was constructed. For verification, actual past lot failure equipment was applied to...
Cyber-physical systems (CPS) are interconnections of heterogeneous hardware and software components (e.g., sensors, actuators, physical systems/processes, computational nodes and controllers, and communication subsystems). Increasing network connectivity of CPS computational nodes facilitates maintenance and on-demand reprogrammability and reduces operator workload. However, such increasing connectivity...
In this paper, we consider the output consensus problem of linear multi-agent systems subject to different agent dynamics by utilizing event-triggered control strategies. Both the dynamics and output of the agents are affected by non-identical disturbances, which are not measurable. The proposed event-triggered control scheme has a desirable feature that each individual agent independently decides...
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security challenge to be addressed. In this paper, we propose a DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) to block the network traffic for DDoS attacks. With some features provided...
While being critical to the network management, the current state of the art in network measurement is inadequate, providing surprisingly little visibility into detailed network behaviors and often requiring high level of manual intervention to operate. Such a practice becomes increasingly ineffective as the networks grow both in size and complexity. In this paper, we propose vPROM, a vSwitch enhanced...
An imitating model for monitoring the work of a workshop that executes several technological processes was developed. Model was developed with usage of probability theory methods, mathematical statistics, and the theory of random processes. The model visualizes a certain set of states of the executed operations belonging to the technological process and allows user to track the percentage of failure...
Using automatic instead of automated tools is assumed to significantly reduce timing budgets needed for the actualization. However, it seems to be not always the case, especially if we consider the complete actualization cycle. The article presents an investigation of the time needed for the information base actualization when using separate automated or automatic tools, as well as the time needed...
The power grid is a complex, interconnected system that requires the coordination of multiple entities to ensure the reliability of the system. System operators must be aware of the impacts of various natural and man-made contingencies through telemetry from their control systems, and they must also be aware of the integrity and availability of the cyber assets on their systems. A team of researchers...
In this paper, we consider sensor spoofing attacks such as the replay attack. We define three types of the repeated replay attack as the open-loop repeated replay attack using stored data, the bias injection-type repeated replay attack, and the closed-loop repeated reply attack. Using the adaptive cruise controller model, we show the LQI controller stabilizes the system in the face of the bias injection-type...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.