Abstract:
In a charging demand verification method of an eco-friendly vehicle (EV), an eco-friendly vehicle supply equipment (EVSE) receives a charging request from a communication controller of eco-friendly vehicle (EVCC). The EVSE receives an identification code value (PEVID), a moving distance value, and a request charging value from the EVCC. The EVSE transmits the received identification code value to a secondary actor (SA). The EVSE receives vehicle type information, a basic maximum charging value, an accumulated moving distance value, and a charging amount at a previous charging time. The EVSE compares the request charging value and denies the charging request of the EV when the request charging value is greater than the basic maximum charging value. The EVSE calculates a prediction value of power consumed by the EV, and charges the EV when the difference between the prediction value and the actual power value actually is within a predetermined error range.
Abstract:
Provided is a method for generating a one class model based on a data frequency. The method for generating a one class model based on a data frequency includes: generating, by a machine learning apparatus, a plurality of spatial coordinates by arranging a plurality of learning data in corresponding coordinates in a feature space; classifying, by the machine learning apparatus, the plurality of spatial coordinates into a plurality of internal coordinates PI and a plurality of external coordinates PO based on a frequency of the learning data arranged in the respective spatial coordinates which belong to the plurality of spatial coordinates; and generating, by the machine learning apparatus, a one class model based on the plurality of internal coordinates PI based on mutual spatial distances of the plurality of external coordinates PO and the plurality of internal coordinates PI.
Abstract:
According to an aspect of the inventive concept, there is provided a system for detecting vulnerabilities of communication protocol software, including: a field selection module selecting message fields of a communication protocol of an industrial control system; a value set configuration module configuring first value sets with respect to the respective message fields selected by the field selection module; a test case generation module generating first test cases by Cartesian product of the first value sets; a test module generating first code coverage data by testing the communication protocol software of the industrial control system based on the first test cases; and a code coverage analysis module analyzing the first code coverage data, wherein the field selection module selects concentration message fields which influence the first code coverage data among the message fields according to an analysis result of the code coverage analysis module.
Abstract:
An operating method of a computing device operated by at least one processor includes collecting traffic packets; extracting particular field data from the traffic packets, transforming the extracted particular field data to a vector with a reduced dimension for each traffic packet, and creating training data with the vector for each traffic packet; training a traffic prediction model with the training data, the traffic prediction model predicting from an input traffic packet a next input traffic packet and whether the next input traffic packet is abnormal; and predicting with the trained traffic prediction model a frequency of abnormal traffic packets to be input, and outputting an abnormal traffic warning by comparing the predicted frequency and a threshold.
Abstract:
Provided are a method of monitoring a network driving apparatus provided in a network and a system thereof.The present invention provides a network monitoring method that performs monitoring which does not hinder existing network availability through a means for detouring a path of a packet transferred to a monitoring target apparatus by using one or more servers and clients connected to a network and further, provides extensibility which can be applied to the network using various communication protocols through a protocol converting means that detours the path of the packet after converting the existing protocol into a TCP/IP protocol.
Abstract:
The electronic device for performing digital forensics on an in-vehicle infotainment environment according to an exemplary embodiment of the present invention includes a processor which identifies each specification information of an in-vehicle infotainment (IVI) system installed in a vehicle and a user terminal communicating with the IVI system, collects communication section data generated in a communication section between the IVI system and the user terminal, first device data of the IVI system and second device data of the user terminal through collection methods prepared in response to the specification information, extracts artifacts associated with the in-vehicle infotainment environment by analyzing the communication section data, the first device data and the second device data through analysis methods prepared in response to the specification information, and verifies the artifacts through mutual comparison between the communication section data, the first device data and the second device data.
Abstract:
The present application relates to a method and apparatus for digital forensic corresponding to an IoT (Internet of Things) terminal, the method including: performing, by an electronic device, an analysis of an Internet of Things (IoT) terminal to which digital forensics is to be performed; selecting an injection method of injecting, by the electronic device, a certificate into the IoT terminal; injecting, by the electronic device, a certificate into at least one of the IoT terminal, the electronic device, and a portable device communicating with the IoT terminal using the selected injection method; and verifying, by the electronic device, data stored in a cloud server communicating with the IoT terminal based on the injected certificate, and can also be applied to other embodiment.
Abstract:
A method of managing data of a file system includes: obtaining information of an unallocated inode that is not currently used because a corresponding file has been deleted based on status of use of inodes stored in an inode bitmap and deletion information of the inodes stored in an inode table; retrieving a backup inode corresponding to the unallocated inode in a journal log area using the obtained information of the unallocated inode; and requesting selection of whether to permanently delete files corresponding to the retrieved backup inode.