The Study on the Risk Response of Security Cyber Physical System (Focusing on Analysis of Security Access Log and Unstructured Data)

  • Authors

    • JangMook KANG
    • Cheol Hee YOON
    • Tae Hyeong KWON
    2018-08-29
    https://doi.org/10.14419/ijet.v7i3.33.18600
  • Malicious hacking, Cyber Physical System. Digital Twin
  • Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.

     

     
  • References

    1. [1] Ju Hun-sik (2018). “A Study on ICT Security Change and CPS Security System in the 4th Industry Ageâ€, Journal of Digital Contents Society, 19(2), p.294.

      [2] Han Ki-hyoung, Jung Hyung-jong (2014). “A Study on implementation model for security log analysis system using Big Data Platformâ€, Journal of Digital Convergence 2014 Aug, 12(8), p352

      [3] Kim Dong-kun, Han Ki-hyoung(2016). “ A case study of Physical security police proposals through the Security equipment log analysis in Public Educational Institutionâ€, Korean Internet Information Society 17(1), p145,146

      [4] Park Jung-min, Kang Sung- ku, Jeon In- chul, Kim Won-tae (2013). “Network-based autonomous control CPSâ€, The Journal of The Korean Institute of Communication Sciences 30(10), p86

      [5] Kim Ji-yeon, Kim Hyung-jung, Kang Sung-ju (2014). “Development of a Real-time Simulation Technique for Cyber-physical Systemâ€, Journal of the Korea Society for Simulation, 23(4), p181-188

      [6] Choi Jin-chul, Jang In-gook(2017). “System Design for Configuration Digital Twins in a Virtual environmentâ€, Korea Information Science Society, 2017.12, p480,481

      [7] Won Myung-gyu, Park Tae-joon, and Son Sang- hyuk (2013), “Present and Future of Cyber Physical Systemâ€, The Journal of The Korean Institute of Communication Sciences, 30(10), p66

  • Downloads

  • How to Cite

    KANG, J., Hee YOON, C., & Hyeong KWON, T. (2018). The Study on the Risk Response of Security Cyber Physical System (Focusing on Analysis of Security Access Log and Unstructured Data). International Journal of Engineering & Technology, 7(3.33), 165-167. https://doi.org/10.14419/ijet.v7i3.33.18600