• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.031 seconds

A Study on Interface Security Enhancement (조직의 실시간 보안관리 체계 확립을 위한 '인터페이스 보안' 강화에 대한 연구)

  • Park, Joon-Jeong;Kim, Sora;Ahn, SooHyun;Lim, Chae-Ho;Kim, Kwangjo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.171-176
    • /
    • 2015
  • Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.

Experimental Study of Leaching Phenomena of Cs-137 From a Cement Matrix Generated at PWR Plant (가압 경수로에서 생성된 시멘트 고화체로부터 Cs-137의 용출 현상의 실험적 연구)

  • Doh, Jeong-Yeul;Lee, Kun-Jai
    • Journal of Radiation Protection and Research
    • /
    • v.11 no.2
    • /
    • pp.91-103
    • /
    • 1986
  • Experimental study for the leaching behavior of Cs-137 was carried out using the simulated evaporator bottom product of PWR plant. The method of leach test proposed by the IAEA was partially modified using ANS method. The effect of various factors, i.e., sampling method, curing temperature, curing time, leachant temperature, vermiculite addition and volume-to-surface ratio, was considered in this experiment. Diffusion model in semi-infinite slab was in a good agreement with the data obtained from 4-weeks cured specimens. The effective diffusion coefficient of the specimens which were cured at the temperature of $24^{\circ}C$ for 4 weeks was found to be $1.20{\sim}1.47{\times}10^{-11}cm^2/sec$. With the experimentally obtained diffusion coefficient ($1.47{\times}10^{-11}cm^2/sec$), long-term prediction for the leaching of Cs-137 was carried out using finite-slab approximation. The estimated fraction of Cs-137 which remains in the environment is found to be less than 0.25 percent of initial amount after 100 years. About 25 years after the beginning of leaching, its fractional amount in the environment reachs the maximum value, 0.66 percent of initial amount.

  • PDF

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF

Analysis of the Flight Trajectory Characteristics of North Korea SLBM (북한 SLBM의 비행특성 해석)

  • Lee, Kyoung-Haing;Seo, Hyeong-Pil;Kwon, Yong-Soo;Kim, Jiwon
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.9-16
    • /
    • 2015
  • This research focuses on analysis of the flight trajectory characteristics of SLBM (Submarine Launched Ballistic Missile) of North Korea. Recently, North Korea tested launching of SLBM which is threatening international security. Also it is known that North Korea had possessed the technologies about SLBM since they disassembled submarines out of commission of the former Soviet Union. If the development of the SLBM of North Korea is completed, it should be affected as asymmetric threat to South Korea. Therefore, for active respondence to these threat, it is essential to analyze the SLBM systematically. In this point of view, this work made a SLBM flight model and simulated. In addition, we controled flight trajectories according to adjusting loft angle and described their characteristics. The sea-based ballistic missile defense system is required for an effective response to the flight trajectory of the SLBM from mid-course to terminal phase.

A Study on the Development of Crime Prediction Program(CPP) (범죄발생 예측프로그램 설계에 관한 연구)

  • Kim Young-Hwan;Mun Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.221-230
    • /
    • 2006
  • Changing drastically, the life in a modern city has forced citizens to gradually shorten their average period of settlement, which has weakened the identity of city habitation, thus causing serious crimes and damaging the security of city greatly. Haying a highly composite structure with not only macro, but micro characteristics, city is grasped as a very composite phenomenon shown in the social, economic and spatial constitution relationships, including the personal motives of criminals. Accordingly, this study puts stress on the necessity of any crime prediction program to predict the occurrence of crimes by analyzing the occurrence patterns of sharply increasing intra-city crimes of violence on a typical, time and spatial basis and clarifying their structural dynamic relationships in a both macro and micro manner. Moreover, the deduction of various factors closely related to crime occurrence will contribute to elucidating the occurrence structure of city crimes.

  • PDF

Analysis of vortex generation tendency around the pump suction using three dimentional numerical model (3차원 수치모형을 이용한 펌프 흡입부 주변의 와류 발생 경향 분석)

  • Byun, Hyun Hyuk;Yang, Jae Hoon;Yoon, Byung Man
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.103-103
    • /
    • 2016
  • 최근 기후변화에 따른 집중호우로 도시홍수의 피해가 급격히 증가하고 있다. 특히 인구가 밀집하고 교통량이 많은 대도시의 경우 동일한 호우에 대하여 녹지나 농경지 등에 비해 그 피해가 더 심각하다. 일반적으로 홍수 피해의 직접원인은 외수로 인한 피해와 내수로 인한 피해로 크게 구분할 수 있다. 외수피해는 주로 소하천 및 지천의 범람, 제방의 붕괴 등으로 발생한 것이며 내수피해는 배수로, 하수도 및 펌프장의 내수배제능력 부족이 주된 원인이다. 따라서 도시홍수를 효과적으로 방어하기 위해서는 우선적으로 내배수시설의 성능개선이 선행되어야 할 필요가 있다. 이러한 내배수 시설의 성능 개선을 위해서는 현재 기 설치되어 있는 빗물펌프장의 설계 및 내배수 효율에 대한 성능평가가 필요하다. 하지만 현재 국내 펌프설계기준에는 빗물펌프장의 설계 및 운영에 대한 구체적인 성능 평가 방법이 제시되어 있지 않은 실정이다. 만약, 펌프 흡입수조 및 흡입파이프의 형상이 적절하게 설계되지 못한다면 물이 파이프 입구로 부드럽게 흡입되지 못하고 볼텍스 및 스월이 발생하게 된다. 이러한 볼텍스 및 스월은 펌프 입구 쪽으로 물 뿐 아니라 공기를 함께 흡입시킴으로써 펌프의 효율저하, 소음, 진동을 발생시키며 펌프 파손의 원인이 될 수 있다. 따라서 펌프를 설치하기 전 펌프 설치 후에 발생되는 펌프 흡입부 주변의 흐름특성 변화 및 흐름특성이 구조물에 미치는 영향 등을 고려하기 위하여 수리모형실험이 필요한데, 수리모형실험은 많은 시간과 비용이 들어가기 때문에 이를 대체할 수 있는 방안이 요구된다. 그런 이유로 최근에는 수리모형실험 대신 수치모의를 이용하는 경우가 많다. 수치모의의 결과는 수리실험의 결과와 비교, 검증을 거쳐 신뢰성을 얻는다. 본 연구에서는, 3차원 수치모형의 다양한 난류모델을 이용하여 흡입파이프로 물이 유입될 때 흡입부 내, 외의 수심 별 유속 변화를 분석하고, 그 결과를 이용하여 FLOW 3D 모형의 검증을 수행하였다.

  • PDF

Vibration-Based Signal-Injection Attack Detection on MEMS Sensor (진동 신호를 사용한 MEMS 센서 대상 신호오류 주입공격 탐지 방법)

  • Cho, Hyunsu;Oh, Heeseok;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.411-422
    • /
    • 2021
  • The autonomous driving system mounted on the unmanned vehicle recognizes the external environment through several sensors and derives the optimum control value through it. Recently, studies on physical level attacks that maliciously manipulate sensor data by performing signal-injection attacks have been published. signal-injection attacks are performed at the physical level and are difficult to detect at the software level because the sensor measures erroneous data by applying physical manipulations to the surrounding environment. In order to detect a signal-injection attack, it is necessary to verify the dependability of the data measured by the sensor. As so far, various methods have been proposed to attempt physical level attacks against sensors mounted on autonomous driving systems. However, it is still insufficient that methods for defending and detecting the physical level attacks. In this paper, we demonstrate signal-injection attacks targeting MEMS sensors that are widely used in unmanned vehicles, and propose a method to detect the attack. We present a signal-injection detection model to analyze the accuracy of the proposed method, and verify its effectiveness in a laboratory environment.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

Protective Effect of Gatrodiae Rhizoma Extracts on the LPS-Induced Cognitive Impairment Model (LPS에 의해 유도된 인지기능 손상모델에 대한 천마 추출물의 방어효과)

  • Kwon, Kang-Beom;Kim, Ha-Rim;Kim, Ye-Seul;Park, Eun-Hee;Kang, Hyung-Won;Ryu, Do-Gon
    • Journal of Oriental Neuropsychiatry
    • /
    • v.33 no.3
    • /
    • pp.277-285
    • /
    • 2022
  • Objectives: Gastrodia elata (GE) has been used to treat cognition impairment, including Alzheimer's disease (AD) in Korea. The purpose of this study was to investigate the effects of GE water extracts (GEE) on the lipopolysaccharide (LPS)-induced AD model in mice. (Aβ). Methods: We classified six groups as follow; group 1: control (CON), group 2: LPS (0.5 mg/kg/day, four times), group 3: 4 mg/kg donepezil (DP), group 4: 100 mg/kg GEE+LPS, group 5: 200 mg/kg GEE+LPS, group 6: 500 mg/kg GEE+LPS. Results: We found that GEE has an effect that inhibits decrease of discrimination index in object recognition test, as well as spontaneous alteration in the Y-maze test by LPS. Treatment with LPS increased amlyloid-β (Aβ) concentration, and decreased brain-derived neurotrophic factor (BDNF) in cerebral cortex of mice. However, GEE significantly protected against LPS-induced Aβ and BDNF changes. Our findings also showed that the inflammatory cytokines [tumor necrosis factor-alpha (TNF-α), interleukin-6 (IL-6) and interleukin-1β (IL-1β)] mRNA and protein were up-regulated by the LPS injection. But GEE significantly suppressed LPS-induced inflammatory cytokines increase in a dose-dependent manner. Conclusions: This study suggests that the GEE may be an effective AD therapeutic agent, in treating neurodegenerative diseases including AD.

The Quantification of Flood Damage Using K-FRM (K-FRM을 이용한 홍수피해액 정량화)

  • Yeong Uk Yu;In Gyu Hwang;Yeon Jeong Seong;Young Hun Jung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.405-405
    • /
    • 2023
  • 최근 기후변화로 인한 극심한 홍수와 가뭄, 폭염 등 이상 기온 및 기후에 따른 피해가 급격히 증가하는 추세이다. 특히, 집중호우로 인해 도심지에서 발생한 홍수피해는 재산피해뿐만 아닌 수 많은 인명피해가 발생하고 있다. 국내에서는 수재해로부터 인명과 재산을 보호하기 위해 용수공급과 체계적인 치수 사업이 행한 바 있다. 이러한 치수 사업에서 경제성 분석은 사업 전·후 의 편익추정이 완벽히 검증되기 쉽지 않으며, 기존의 치수 계획은 유역 전반에 걸쳐 다양한 홍수 방어시설의 종합적인 고려 없이 제방 중심으로만 수립되어 홍수 발생 시 하천에 과도한 부담을 줄 뿐만 아니라, 사업의 경제성이 낮게 평가되고 있다. 이렇게 국내에서 행해진 하천설계기준에서 제안되었던 경제성 분석 방법은 여러 가지 문제점들을 내포하고 있으며 지속적인 홍수피해가 발생하였다. 이와 같은 문제점들을 개선하고자 개발된 K-FRM(Forean-Flood-Risk Model)은 능동형 하천정보 운영을 통한 다차원 하천관리체계 구축 및 활용을 위한 정량적 위험도 평가 툴로 위험지역에 노출된 자산의 정보(인벤토리), 평가기준, 손상함수, 계량화 원단위 등 홍수피해를 추정하는데 활용이 가능하며, 손실 또는 피해액으로 표현되는 재해손실은 경제적인 관점에서의 위험이며 금전적인 형태로 표현된다. 본 연구에서는 홍수피해액 정량화 모델인 K-FRM을 활용하여 굴포천 유역과 영강 유역을 대상으로 항목별 피해액 산정 후, 정량적 피해액 산정 방법인 EAD(Expected Annual Damage) 분석을 통해 홍수피해위험지도를 작성하여 표준유역별, 행정구역별 홍수피해액을 산정하는 것을 목적으로 한다.

  • PDF