• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.026 seconds

Model-based Design for Autonomous Defense Systmes (자치적 방어 시스템을 위한 모델베이스기반 설계)

  • 이종근
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.1
    • /
    • pp.89-99
    • /
    • 1999
  • The major objective of this research is to propose a design architecture for autonomous defense systems for supporting highly intelligent behavior by combining decision, perception, and action components. Systems with such high levels of autonomy are critical for advanced battlefield missions. By integrating a plenty of advanced modeling concepts such as system entity structure, endomorphic modeling, engine-based modeling, and hierarchical encapsulation & abstraction principle, we have proposed four layered design methodology for autonomous defense systems that can support an intelligent behavior under the complicated and unstable warfare. Proposed methodology has been successfully applied to a design of autonomous tank systems capable of supporting the autonomous planning, sensing, control, and diagnosis.

  • PDF

A Study on the Integrated Security Monitoring & Control in Financial Investment Industry Computer Networks (금융투자업계 전산망의 통합보안관제에 관한 연구)

  • Jung, Eui-Yeon
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.857-860
    • /
    • 2012
  • 본 논문은 금융투자업계에 대한 보안관제 정책을 기준으로 업계가 공동이용 가능한 통합보안관제시스템이 구축 가능하도록 금융투자회사들이 구축 운용하고 있는 보안인프라를 비롯한 전산망의 보안관제를 위한 적용 기술과 운용체계 등을 조사하고, 이를 토대로 외부로부터 공격에 대비한 모니터링, 침입탐지 및 실시간 방어 등의 기능이 적절하게 수행되고 업계 차원의 종합적이고 체계적인 관리가 가능한 통합보안관제시스템 모델과 운영방안을 제시하고자 한다.

A Direction of Convergence and Security of Smart Grid and Information Communication Network (스마트그리드(Smart Grid) 전력망과 정보통신망 융합 보안 방향)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.477-486
    • /
    • 2010
  • This Study suggests security directions to reconstruct separate network of Smart Grid and information communication network as one communications system and implement Smart Grid integrated information communication network. In addition, it suggests prevention directions to prevent future cyber attacks by reorganizing network as the key three-stage network and separating TCP/IP four layers that consist of existing information communication network from Smart Grid. Moreover, it suggests the foundation for the study and the test by providing current problems of Smart Grid, weak points, and three security models. This study is meaningful to suggest development directions and situations as a technology of future-oriented electric industries, integrate attacks and preventions of TCP/IP Layers with Smart Grid, and seek for a new technology of Smart Grid and future tasks for Smart Grid information security.

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

A Study on the Oceanic Diffusion of Liquid Radioactive Effluents based on the Statistical Method (통계적 방법을 이용한 방사성 물질의 해양 확산 평가)

  • Kim, Soong-Pyung;Lee, Goung-Jin
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.1
    • /
    • pp.1-6
    • /
    • 1998
  • A diffusion model of radioactive liquid effluents is developed and applied for YGN NPP's site, based on the Gaussian plume type model. Due to the complexity of oceanic diffusion characteristics of YGN site, a simple and reliable statistical model based on Reg. Guide 1.113 is developed. Also, a computer code package to calculate dilution factors as a function of plant operation conditions and pathway of radioactive materials. A liquid effluents diffusion model is developed by dividing the diffusion range into two categories, i. e, a near field mixing region and a far field mixing region. In the near field, the initial mixing is affected by a buoyance force, a high initial turbulence and momentum which is characterized by a plant operation condition and environmental conditions. The far field mixing is similar to gaseous effluents diffusion. So, beyond the near field region, wellknown Gaussian plume model was adopted. A different area averages of Gaussian plume equation was taken for each radioactive exposure pathway. As a result, we can get different dilution factors for different pathways. Results shows that present dilution factors used for YGN ODCM is too much overestimated compared with dilution factors calculated with the developed model.

  • PDF

A Study on Characteristics of Groundwater Qualities at the Ulsan Metropolitan City (울산도시지역의 지하수 수질특성에 관한 연구)

  • 김병우;정상용;조병욱;윤욱;성익환;심병완
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.04a
    • /
    • pp.482-486
    • /
    • 2004
  • 울산지역 수질특성에 관하여 연구하기 위해 228개 지점에서 수질성분 25개 항목을 분석하였다. 그 성분중 지하수 음용수 9개 수질성분(pH, EC, TDS, Cl, Mn, NO$_3$, SO$_4$, F, Fe)에 관해 수질분포특성 및 오염도를 나타내기 위해 모수적 통계기법인 정규크리깅과 비모수적 통계기법인 지시크리깅 기법을 적용하였다. OK와 IK의 성분별 베리오그램 분석한 결과 OK의 경우 모든 수질성분은 구상형모델(Spherical model)로 선정되었으며, IK의 경우 pH, TDS, SO$_4$, Cl, Mn, F, Fe 성분은 구상형모델로, EC는 지수형모델로, NO$_3$는 선형모델로 선정되었다. 그 결과 정규크리깅의 경우 연구지역의 수질특성을 정량적 분포특성이 잘 나타났다. 특히 태화강, 인접한 남구일원과 중구일원, 북구의 북서 일원 그리고 동구의 방어동일원에서 수질성분 9개 성분들이 다소 높게 나타났다. 특히 EC, TDS 그리고 Cl$^{-}$ NO$_3$ 성분이 높게 나타났다. 그리고 지시크리깅의 경우 정규크리깅과 비교하여 이상치가 크게 영향을 미칠 수 있는 통계학적인 오류를 보완하여 분석한 결과 울산지역 9개 성분 오염도는 EC>TDS>NO$_3$>pH>Fe>Mn>Cl>SO$_4$>F 순으로 오염특성이 나타났다.

  • PDF

Convergence Performance Evaluation Model for Intrusion Protection System based on CC and ISO Standard (CC와 ISO 표준에 따른 침입방지시스템의 융합 성능평가 모델)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.251-257
    • /
    • 2015
  • Intrusion protection system is a security system that stop abnormal traffics through automatic activity by finding out attack signatures in network. Unlike firewall or intrusion detection system that defends passively, it is a solution that stop the intrusion before intrusion warning. The security performance of intrusion protection system is influenced by security auditability, user data protection, security athentication, etc., and performance is influenced by detection time, throughput, attack prevention performance, etc. In this paper, we constructed a convergence performance evaluation model about software product evaluation to construct the model for security performance evaluation of intrusion protection system based on CC(Common Criteria : ISO/IEC 15408) and ISO international standard about software product evaluation.

Role Based Petri-Net : Role Based Expression Model for an Efficient Design of Attack Scenarios (Role Based Petri Net : 공격 시나리오의 효율적 설계를 위한 역할 기반 표현 모델)

  • Park, Jun-Sik;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.123-128
    • /
    • 2010
  • Graph expression of attack scenarios is a necessary method for analysis of vulnerability in server as well as the design for defence against attack. Although various requirement analysis model are used for this expression, they are restrictive to express combination of complex scenarios. Role Based Petri Net suggested in this paper offer an efficient expression model based role on Petri Net which has the advantage of concurrency and visuality and can create unknown scenarios.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Radioprotective Effect of Propolis on the Blood Corpuscle of a Mouse by SEM after X-irradiation on the Whole Body (전신 X-선 조사 후 마우스의 대동맥 혈구에서 SEM을 이용한 프로폴리스의 방사선방어효과 연구)

  • Ji, Tae-Jeong
    • Journal of radiological science and technology
    • /
    • v.31 no.1
    • /
    • pp.49-54
    • /
    • 2008
  • After x-ray 5Gy radiation on the whole body of a mouse using a linear accelerator, its leucocyte, erythrocyte, and platelet were observed by SEM. Also, after injecting propolis into the abdominal cavity, the radio-protective effect of blood corpuscles was studied. The observation of micromorphology in blood corpuscles revealed that the number of leukocyte, erythrocyte, and thrombocyte decreased in the experimental group and the lump got together in blood corpuscles after 10 and 20 days. In RBC, crack or break on the surface and poikilosperocytes were observed. In the irradiation group, the size of leucocytes was smaller than that in control group and the number of villus at the verge substantially decreased. The blood corpuscles in the propolis group, however, had the similar results to control group.

  • PDF