• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.031 seconds

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Chemical/Biological/Radiological Protective Facility Entering Time Estimation Simulation with Procedure Analysis (화생방 방호시설의 행동 절차 분석을 통한 진입 소요시간 예측 시뮬레이션)

  • Park, Sun Ho;Lee, Hyun-Soo;Park, Moonseo;Kim, Sooyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.5
    • /
    • pp.40-48
    • /
    • 2014
  • As CBR(Chemical, Biological, and Radiological) attack increases, the importance of CBR protective facilities is being emphasized. When CBR warfare emerges, a task force team, who exist outside of CBR protective facility, should enter the CBR protective facility through neutralizing process in CCA(Contamination Control Area) and TFA(Toxic Free Area). If a bottleneck occurs in the process or zones, the task force team cannot enter the CBR protective facility efficiently and may cause inefficiency in its operation performance or result in casualties. The current design criteria of the CBR protective facility is only limited to ventilation system and it does not consider how much time it takes to enter the facility. Therefore, this research aims to propose the entering time estimation model with discrete event simulation. To make the simulation model, the procedure performed through CCA and TFA is defined and segmented. The actual time of the procedure are measured and adapted for the simulation model. After running the simulation model, variables effecting the entering time are selected for alternatives with adjustments. This entering time estimation model for CBR protective facility is expected to help take time into consideration during the designing phase of CBR protective facility and help CBR protective facility managers to plan facility operation in a more realistic approach.

The Understanding of Depression Subtypes (우울증 아형들의 이해)

  • Han, Chang-Hwan;Ryu, Seong Gon
    • Korean Journal of Biological Psychiatry
    • /
    • v.8 no.1
    • /
    • pp.20-36
    • /
    • 2001
  • The debate about whether depressive disorders should be divided into categories or arrayed along a continuum has gone for decade, without resolution. In our review, there is more evidence consistent with the spectrum concept than there is with the idea that depressive disorders constitute discrete clusters marked by relatively discontinuous boundaries. First, "depression spectrum", "is there a common genetic factors in bipolar and unipolar affective disorder", "threshold model of depression" and "bipolar spectrum disorder" are reviewed. And, a new subtype of depression is so called SeCA depression that is a stressor-precipitated, cortisol-induced, serotonin-related, anxiety/aggression-driven depression. SeCA depression is discussed. But, there is with the idea that depressive disorders constitute discrete subtypes marked by relatively discontinuous boundaries. This subtypes of depressive disorder were reviewed from a variety of theoretical frames of reference. The following issues are discussed ; Dexamethasone suppression test(DST), TRH stimulation test, MHPG, Temperament Character Inventory(TCI), and heart rate variability(HRV).

  • PDF

A Survivability Model of an Intrusion Tolerance System (침입감내시스템의 생존성 모델)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.395-404
    • /
    • 2005
  • There have been large concerns about survivability defined as the capability of a system to perform a mission-critical role, in a timely manner, in the presence of attacks, failures. In particular, One of the most important core technologies required for the design of the ITS(Intrusion Tolerance System) that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions is the survivability one of In included the dependability analysis of a reliability and availability etc. quantitative dependability analysis of the In. In this Paper, we applied self-healing mechanism utilizing two factors of self-healing mechanism (fault model and system response), the core technology of autonomic computing to secure the protection power of the ITS and consisted of a state transition diagram of the ITS composed of a primary server and a backup server. We also defined the survivability, availability, and downtime cost of the ITS, and then performed studies on simulation experiments and two cases of vulnerability attack. Simulation results show that intrusion tolerance capability at the initial state is more important than coping capability at the attack state in terms of the dependability enhancement.

A Method of Detecting the Aggressive Driving of Elderly Driver (노인 운전자의 공격적인 운전 상태 검출 기법)

  • Koh, Dong-Woo;Kang, Hang-Bong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.11
    • /
    • pp.537-542
    • /
    • 2017
  • Aggressive driving is a major cause of car accidents. Previous studies have mainly analyzed young driver's aggressive driving tendency, yet they were only done through pure clustering or classification technique of machine learning. However, since elderly people have different driving habits due to their fragile physical conditions, it is necessary to develop a new method such as enhancing the characteristics of driving data to properly analyze aggressive driving of elderly drivers. In this study, acceleration data collected from a smartphone of a driving vehicle is analyzed by a newly proposed ECA(Enhanced Clustering method for Acceleration data) technique, coupled with a conventional clustering technique (K-means Clustering, Expectation-maximization algorithm). ECA selects high-intensity data among the data of the cluster group detected through K-means and EM in all of the subjects' data and models the characteristic data through the scaled value. Using this method, the aggressive driving data of all youth and elderly experiment participants were collected, unlike the pure clustering method. We further found that the K-means clustering has higher detection efficiency than EM method. Also, the results of K-means clustering demonstrate that a young driver has a driving strength 1.29 times higher than that of an elderly driver. In conclusion, the proposed method of our research is able to detect aggressive driving maneuvers from data of the elderly having low operating intensity. The proposed method is able to construct a customized safe driving system for the elderly driver. In the future, it will be possible to detect abnormal driving conditions and to use the collected data for early warning to drivers.

Crime-Prevention in the Community and the Security Activity (환경설계를 통한 범죄예방과 민간경비의 역할)

  • Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.301-316
    • /
    • 2008
  • The occurrence of complicating, multilateral social condition demands the strategy for facing many social state and consolidating public security against criminal loss. The lacking ability of local police for preventing crime can't satisfy the demand of security and can't get rid of fear of crime. At last, it brings a distrust of public confidence and became a factor of serious social crisis. We have problems - not only making an alternative plan for preventing crime, but also introducing CPTED(Crime Prevention Through Environmental Design) by environmental design, to expect crime prevention and to select systemic crime prevention system and the most suitable model. And we have a goal - to recognize the importance of guard activity for local crime, analyse public safety activity in community & focusing guard activity as a strategy for them, apply CPTED in police and private security company as a local crime prevention & setting effective model, and, make it as an index for preventing & dealing with intellectual, brutal crime. The rapid growth in the guarding-activity field lighten the burden of police for crime-prevention. But the misjudgement of some people blocks it to be settled institutionally. It needs to reconsider what is the effective crime-prevention method, at this point of time when the all parts of a nation changing into unlimited competitive, private self-control system.

  • PDF

Effects of Kalopanax Pictus Extracts and Their Related Origin on Gastric Lesions (해동피 및 유사생약 추출물의 위 손상에 대한 효과)

  • Hwang, In Young;Hwang, Seon A;Jeong, Choon Sik
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.4
    • /
    • pp.367-375
    • /
    • 2013
  • Kalopanax pictus has pharmacologically anti-inflammatory and analgesic effect and is known to respond to treatment of backache, knee pain and etc. In this study, we investigated the effects on gastric lesions of Kalopanax pictus both from Korea (KPK) and China (KPC) compared with their related origin, Znthoxylum ailanthoide both from Korea (ZAK) and China (ZAC), and Korean Bombax malabaricum (BMK). In preliminary screening, KPK and KPC shown effective inhibition of HCI EtOH-induced gastritis in rats. To elucidate their protective effects on gastric lesions, we assessed inhibition of H. pylori colonization, 2,2-diphenyl-1-picrylhydrazyl(DPPH) radical scavenging activities, reducing power test, and inhibition of lipid peroxidation. KPK was the most effective from antioxidant assays. KPK also shown the inhibition of indomethacin-induced gastric ulcer in rats. Gastric secretion in rats, KPK reduced the secretion of gastric juice and total acidity and raised pH. Therefore, it is possible that KPK can be developed as health functional food and natural medicine. In addition, it can contribute to the standardization with objectivity and reliability for KPK through the criteria establishment of the precise origin of medicine, the prevention of indiscriminate distribution of imitation, and the rising rate of dependence on imports of medicinal herbs, and mixing prevention of low-quality goods.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

The Study of Statistical Optimization of MTBE Removal by Photolysis(UV/H2O2) (광분해반응을 통한 MTBE 제거에 대한 통계적 최적화 연구)

  • Chun, Sukyoung;Chang, Soonwoong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.9
    • /
    • pp.55-61
    • /
    • 2011
  • This study investigate the use of ultraviolet(UV) light with hydrogen peroxide($H_2O_2$) for Methyl Tert Butyl Ether(MTBE) degradation in photolysis reactor. The process in general demands the generation of OH radicals in solution at the presence of UV light. These radicals can then attack the MTBE molecule and it is finally destroyed or converted into a simple harmless compound. The MTBE removal by photolysis were mathematically described as the independent variables such as irradiation intensity, initial concentration of MTBE and $H_2O_2$/MTBE ratio, and these were modeled by the use of response surface methodology(RSM). These experiments were carried out as a Box-Behnken Design(BBD) consisting of 15 experiments. Regression analysis term of Analysis of Variance(ANOVA) shows significantly p-value(p<0.05) and high coefficients for determination values($R^2$=94.60%) that allow satisfactory prediction of second-order regression model. And Canonical analysis yields the stationery point for response, with the estimate ridge of maximum responses and optimal conditions for Y(MTBE removal efficiency, %) are $x_1$=25.75 W of irradiation intensity, $x_2$=7.69 mg/L of MTBE concentration and $x_3$=11.04 of $H_2O_2$/MTBE molecular ratio, respectively. This study clearly shows that RSM is available tool for optimizing the operating conditions to maximize MTBE removal.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.