Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 13, Issue 4 - Dec 2004
Volume 13, Issue 3 - Sep 2004
Volume 13, Issue 2 - Jun 2004
Volume 13, Issue 1 - Mar 2004
Selecting the target year
An Efficient Simulation of Discrete Time Queueing Systems with Markov-modulated Arrival Processes
Kook Kwang-Ho ; Kang Sungyeol ;
Journal of the Korea Society for Simulation, volume 13, issue 3, 2004, Pages 1~10
The cell loss probability required in the ATM network is in the range of 10
. If Monte Carlo simulation is used to analyze the performance of the ATM node, an enormous amount of computer time is required. To obtain large speed-up factors, importance sampling may be used. Since the Markov-modulated processes have been used to model various high-speed network traffic sources, we consider discrete time single server queueing systems with Markov-modulated arrival processes which can be used to model an ATM node. We apply importance sampling based on the Large Deviation Theory for the performance evaluation of, MMBP/D/1/K, ∑MMBP/D/1/K, and two stage tandem queueing networks with Markov-modulated arrival processes and deterministic service times. The simulation results show that the buffer overflow probabilities obtained by the importance sampling are very close to those obtained by the Monte Carlo simulation and the computer time can be reduced drastically.
Cyber Attack and Defense Modeling Using Vulnerability Metrics
Lee Jang-Se ; Chi Sung-Do ; Choi Gyoo-Seok ;
Journal of the Korea Society for Simulation, volume 13, issue 3, 2004, Pages 11~20
The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.
Simulation-based Network Vulnerability Analysis Using the SIMVA
You Yong-Jun ; Lee Jang-Se ; Chi Sung-Do ;
Journal of the Korea Society for Simulation, volume 13, issue 3, 2004, Pages 21~29
The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.
A Handover Scheme in MAP based B3G Networks
Park Sangjoon ; Lee Jongchan ; Kim Hyungjong ;
Journal of the Korea Society for Simulation, volume 13, issue 3, 2004, Pages 31~41
In this paper, we consider the strategy of Universal Mobile Telecommunication System (UMTS) and Wireless Local Area Network (WLAN) internetworking that provide the seamless vertical handover for mobile nodes. We propose Mobility Anchor Points (MAP) based UMTS/WLAN internetworking architecture to support the vertical handover. Also, on integrated UMTS/WLAN networks, we propose a vertical handover scheme that avoids the call blocking caused by the network resource shortage. We provide the numerical analysis to investigate the performance evaluation to the proposed scheme and compare the proposed scheme with the existing scheme.
An Internet Topology Generator Applying DEVS Modeling
Sohn Juhang ; Park Sangjoon ; Han Jungahn ; Kim Hyungjong ; ; Kim Byunggi ;
Journal of the Korea Society for Simulation, volume 13, issue 3, 2004, Pages 43~54
Studies of Internet algorithms or policies require experiments on the real large-scale networks. But practical problems with large real networks make them difficult. Instead many researchers use simulations on the Internet topology models. So, It is Important that study about topology model that reflect characteristic of the internet exactly. We propose new topology model which reflect of hierarchical network and addition, removal of nodes and accompanied change of topologies. In the modeling scheme for network generation, we applied DEVS formalism and analyzed the topologies generated by our algorithms.