• Title/Summary/Keyword: 침입모델

Search Result 374, Processing Time 0.025 seconds

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Predicting Habitat Suitability of Carnivorous Alert Alien Freshwater Fish (포식성 유입주의 어류에 대한 서식처 적합도 평가)

  • Taeyong, Shim;Zhonghyun, Kim;Jinho, Jung
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.1
    • /
    • pp.11-19
    • /
    • 2023
  • Alien species are known to threaten regional biodiversity globally, which has increased global interest regarding introduction of alien species. The Ministry of Environment of Korea designated species that have not yet been introduced into the country with potential threat as alert alien species to prevent damage to the ecosystem. In this study, potential habitats of Esox lucius and Maccullochella peelii, which are predatory and designated as alert alien fish, were predicted on a national basis. Habitat suitability was evaluated using EHSM (Ecological Habitat Suitability Model), and water temperature data were input to calculate Physiological Habitat Suitability (PHS). The prediction results have shown that PHS of the two fishes were mainly controlled by heat or cold stress, which resulted in biased habitat distribution. E. lucius was predicted to prefer the basins at high latitudes (Han and Geum River), while M. peelii preferred metropolitan areas. Through these differences, it was expected that the invasion pattern of each alien fish can be different due to thermal preference. Further studies are required to enhance the model's predictive power, and future predictions under climate change scenarios are required to aid establishing sustainable management plans.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Modeling the Effects of Periodic Intrusions of Outer Water on the Variation in the Phytoplankton Biomass and Productivity in a Small Embayment (작은 만에서 식물플랑크톤 생체량과 생산력 변화에 대한 외부 물의 정기적인 침입 효과의 모델링)

  • Ougiyama, Shu;Koizumi, Tsuneyoshi;Takeoka, Hidetaka;Yuichi, Hayami
    • Korean Journal of Ecology and Environment
    • /
    • v.37 no.4 s.109
    • /
    • pp.455-461
    • /
    • 2004
  • Effects of the different strengths and intervals of the periodic outer water intrusions (kyuchos and bottom intrusions) on the dynamics of phytoplankton biomass in a small embayment were examined with a simple numerical model. Environmental conditions of Kitanada Bay in the Bungo Channel were applied to the model. As the interval of the intrusion became longer and the amplitude became smaller, phytoplankton biomass In the bay became higher. On the other hand, as the interval became shorter and the amplitude became larger, the growth rate of the phytoplankton became higher. It suggested that when the intrusion was weaker, water exchange of the bay decreased and the phytoplankton in the bay accumulated at a high density, When water exchange was improved by active intrusions, availability of light would become more efficient and the growth rate of the phytoplankton was enhanced.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Effects of Oscillating Flow on the Dynamic Behavior of an Artificial Sensory Hair (인공 감각모의 동적 거동에 미치는 진동유동의 영향)

  • Park, Byung-Kyu;Lee, Joon-Sik
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.8
    • /
    • pp.847-853
    • /
    • 2011
  • Filiform hairs that respond to movements of the surrounding medium are the mechanoreceptors commonly found in arthropods and vertebrates. The hairs function as a sensory system for perceiving information produced by prey, predators, or conspecifics. A mathematical model is proposed, and the parametric analyses for the response of artificial filiform hair are conducted to design and predict the performance of a microfabricated device. The results for the Cytop hair, one of the most popular polymer optical fibers (POFs), show that the fundamental mode has a dominant effect on the hair behavior in an oscillating medium flow. The dynamic behavior of sensory hair is also dependent on the physical dimensions such as length and diameter. It is found that the artificial hair with a high elastic modulus does not show a resonance in the biologically important frequency range.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

Invasive Pests and the Establishment in Jeju Area: Anoplophora horsfieldii true, Bactrocera dorsalis false (침입해충과 제주지역 정착: 노랑비취알락하늘소(가칭) 사실, 오리엔탈과실파리 거짓)

  • Dong-Soon Kim
    • Korean journal of applied entomology
    • /
    • v.62 no.3
    • /
    • pp.213-214
    • /
    • 2023
  • In a paper reporting the introduction and settlement of Anoplophora horsfieldii (Hope) into Jeju, it was found that Bactrocera dorsalis (Hendel) was misquoted as "it was introduced into the Jeju area and is currently being discovered." Fortunately, the sentence was quickly discovered and corrected to "it has the potential to be introduced to Jeju Island". Taking this as an opportunity, we would like to emphasize to researchers that it is necessary to verify very carefully when describing the domestic distribution of prohibited quarantine pests. Estimating by the cold stress index of the CLIMEX model, B. dorsalis was predicted to be unable to survive in Jeju in the winter of 2022-2023. However, in the winter of 2023, it was confirmed that the occurrence of A. horsfieldii was found to occur in the summer after overwintering at sub-zero temperatures, and it was judged to have succeeded in settling.

The Influence of Information Security Policy, Technology, and Communication Uncertainties: The Role of Information Security Role Identity (정보보안 정책, 기술, 그리고 커뮤니케이션 불확실성의 영향: 정보보안 역할 정체성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.241-248
    • /
    • 2024
  • Socially, organizations are required to effectively manage their information resources, both in terms of acquiring information from external sources and safeguarding against potential breaches by insiders. While information security policies and technologies implemented by organizations contribute to achieving internal security, an overly complex or disorganized security structure can create uncertainty among employees. In this study, we identify factors of structural information security (IS)-related uncertainty within organizations and propose that they contribute to non-compliance. We develop a research model and hypotheses based on previous studies on the information security environment and test these hypotheses using structural equation modeling. Our findings indicate that uncertainties related to IS policy, technology, and communication decrease employees' IS role identity and their intention to comply with IS measures. By addressing these uncertainties, organizations can improve their IS environment and work towards achieving there is goals.

Non-invasive Skin Barrier Lipid Packing Analysis Using FT-IR and Study of Cosmetic Formulation for Damaged Barrier (FT-IR을 활용한 비 침습적 피부 장벽 지질 패킹 분석과 손상된 장벽의 개선 제형 연구)

  • Kim, Hye Jin;Kim, Sunyoung;Lee, Seol-Hoon
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.46 no.3
    • /
    • pp.307-317
    • /
    • 2020
  • The barrier structure of the skin's epidermis is a key structure to prevent the loss of water inside the body and the invasion of foreign substances, and is composed of keratinocytes and intercellular lipids. At this time, the intercellular lipids of the skin barrier has the strongest structure when packed in an orthorhombic structure. However, it is damaged by various external causes and changes to a hexagonal structure. This change in physical structure can be analyzed non-invasively by analyzing the signal of the CH2-CH2 scissoring band of lipids using FT-IR. In this study, SDS was treated on porcine skin to construct a skin barrier damage model, and the degree of change in packing structure was quantified by analyzing FT-IR signals. We then judged whether the barrier of the damage model was recovered according to the treatment of the cosmetic formulation. From these results, an indirect method of measuring the water evaporation of the skin barrier to date can be supplemented. In addition, physical changes in the structure of the skin barrier can be utilized in a direct and efficient manner to identify the function and verify the formulation of various materials.