• Title/Summary/Keyword: 침입자

Search Result 544, Processing Time 0.033 seconds

The Study of Water Availability Increments by Estuary Lake in YoungSan River (영산강하구둑에 의한 수리권 가용수량 증가에 관한 고찰 고찰)

  • Park, Hee-Seong;Choi, Hyun-Gun;Kim, Chang-Shik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.2079-2083
    • /
    • 2007
  • 하구둑은 해수의 역류에 의한 염수침입을 방지하고 유역에 필요한 담수를 확보하기위하여 건설되며, 하구둑에 의하여 하천의 하구에 담수호가 생성된다. 하구담수호에 의해 기존에 염해로 취수할 수 없었던 하천구간에서의 취수가 가능하게 되며, 하구담수호를 일정한 수위로 관리함으로써 상당량의 농업용수를 확보할 수 있다. 이와 관련하여 하구담수호에 의하여 확보되는 수자원량에 대해 설계 당시의 분석 자료들이 있기는 하지만, 대부분 연 총량의 형태로 나타나 있으며, 수리권과 관련하여 하구둑에 의하여 추가적으로 확보되는 수리권 가용수량이 얼마인지에 대한 분석은 거의 없다. 그것은 하구둑의 방류량이 댐의 방류량과는 달라서 조석의 영향을 매우 크게 받기 때문에 단순한 물수지 분석으로 이를 모의하기 힘들기 때문이다. 게다가 1일 2회의 조석이 발생하므로 1일단위의 물수지 분석은 어려운 현실이다. 그럼에도 불구하고 하구둑에서 많은 양의 농업용수 취수가 이루어지고 있다. 과연 얼마정도의 양이 수리권으로서의 역할을 할 수 있는지 모르고 임의적인 허가가 계속 부여될 경우, 갈수 시 용수공급의 안정성을 확보할 수 없게 될 것이다. 따라서 안정적인 용수의 공급을 위한 적절한 수리권 가용수량에 대한 추정 필요하다. 이에 본 연구에서는 영산강하구둑의 실시간 운영을 위하여 고 등(2004)이 개발한 "영산강하구 둑 물관리 프로그램"의 기본적인 조위의 예측과 배수갑문의 방류량 산정기법 등과 수자원장기종 합계획(2006) 수립 시에 사용된 장기간의 일자연유량을 이용하여 하구둑의 수리권 가용수량 추정 모형을 개발하고, 이를 영산강 하구둑에 의해 생성된 영산호에 적용함으로써 영산호에 의해 증가되는 수리권 가용수량에 대해 고찰하여 보았다., 그리고 T-P $77.7{\sim}96.6%$(평균 94.3%)로 산정되었다. 이러한 결과는 대청호로 유입하는 유기물과 영양염류 연간 부하량의 80% 이상이 강우-유출과 함께 유입하는 것을 의미하며, 저수지 수질관리를 위해서는 유역차원의 비점오염원 관리가 시급함을 시사한다.하기 위해, 수렴흐름 추적자시험에 의한 종분산지수와 시험대수층의 평균선형유속을 이용하여 종분산계수를 구하였다. 현장에서 수행된 양수시험에 의한 평균선형유속 22.44 m/day와 평균 종분산지수 0.4155 m를 적용하여 산정된 종분산계수는 $9.32\;m^2/day$이었다. 따라서, 시험부지 내 충적층에서 일정한 양수율$(2,500\;m^3/day)$로 지하수를 개발할 시에 양수정 주변지역으로 유입되는 염소이온의 확산면적은 1일 $9.32\;m^2$ 정도일 것으로 나타났다.적인 $OH{\cdot}$ 의 생성은 ascorbate가 조직손상에 관여할 가능성을 시사하였다.었다. 정확한 예측치를 얻기 위하여 불균질 조직이 조사야에 포함되는 경우 보정이 요구되며, 골반의 경우 골 조직의 보정이 중요한 요인임을 알 수 있었다. 이를 위하여 불균질 조직에 대한 정확한 정보가 요구되며, 이는 CT 영상을 이용하는 것이 크게 도움이 되리라 생각된다.전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(

  • PDF

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.

Generation of Efficient Fuzzy Classification Rules Using Evolutionary Algorithm with Data Partition Evaluation (데이터 분할 평가 진화알고리즘을 이용한 효율적인 퍼지 분류규칙의 생성)

  • Ryu, Joung-Woo;Kim, Sung-Eun;Kim, Myung-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.1
    • /
    • pp.32-40
    • /
    • 2008
  • Fuzzy rules are very useful and efficient to describe classification rules especially when the attribute values are continuous and fuzzy in nature. However, it is generally difficult to determine membership functions for generating efficient fuzzy classification rules. In this paper, we propose a method of automatic generation of efficient fuzzy classification rules using evolutionary algorithm. In our method we generate a set of initial membership functions for evolutionary algorithm by supervised clustering the training data set and we evolve the set of initial membership functions in order to generate fuzzy classification rules taking into consideration both classification accuracy and rule comprehensibility. To reduce time to evaluate an individual we also propose an evolutionary algorithm with data partition evaluation in which the training data set is partitioned into a number of subsets and individuals are evaluated using a randomly selected subset of data at a time instead of the whole training data set. We experimented our algorithm with the UCI learning data sets, the experiment results showed that our method was more efficient at average compared with the existing algorithms. For the evolutionary algorithm with data partition evaluation, we experimented with our method over the intrusion detection data of KDD'99 Cup, and confirmed that evaluation time was reduced by about 70%. Compared with the KDD'99 Cup winner, the accuracy was increased by 1.54% while the cost was reduced by 20.8%.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Pyriproxyfen Inhibits Hemocytic Phagocytosis of the Beet Armyworm, Spodoptera exigua (파밤나방(Spodoptera exigua)의 혈구세포 식균반응에 대한 피리프록시펜의 억제효과 Nalini Madanagopal)

  • Madanagopal, Nalini;Lee, Yong-Joon;Kim, Yong-Gyun
    • The Korean Journal of Pesticide Science
    • /
    • v.11 no.3
    • /
    • pp.164-170
    • /
    • 2007
  • The concept of innate immunity in insects which refers to the first line of host defense constitutes the humoral and cellular components which are involved in recognition and actively participate in the elimination of the intruding foreign micro- or macro-organisms. Several recent studies suggest that juvenile hormone (JH) modulates the cellular immune reactions in response to pathogen. In this study, pyriproxyfen (a JH agonist as an insect growth regulator) was tested in its any inhibitory effect on the immune reactions of the beet armyworm, Spodoptera exigua. To this end, five different hemocyte morphotypes of final instar S. exigua were identified by phase contrast microscopy. Plasmatocytes and granular cells, which constitute about 90% of the total hemocyte count, were prominently distinguished based on their basophilic/acidophilic nature using Giemsa stain. The role of pyriproxyfen on the functional ability of hemocytes was analyzed using FITC-labeled Providencia vermicola for the phagocytic potential of the hemocytes. Both granular cells and plasmatocytes exhibited phagocytosis behavior. Pyriproxyfen significantly inhibited the phagocytosis of both cell types, proposing its novel action as an immunosuppressant.

A Study of the foundations of culture established the Sosu Seowon (소수서원(紹修書院) 건립의 문화적 토대 연구 - 회헌(晦軒) 안향(安珦)의 선비정신을 중심으로 -)

  • Lee, Jeong-Hwa
    • (The)Study of the Eastern Classic
    • /
    • no.48
    • /
    • pp.41-63
    • /
    • 2012
  • This research paper is aims to study the Zhu Xi school of Neo-Confucianism culture based on the Sosu seowon. Also This research paper is to discuss study and scholars correlation the Sosu seowon. The Sosu seowon is mainly made up of the Zhu Xi school of Neo-Confucianism development. The Sosu seowon was the cradle of scholars and bureaucrats. Scholars who study of orthodox Neo-Confucianism in the our country was respected academic spirit of An Whyang in the study of orthodox Neo-Confucianism. An Whyang is symbolic existence of the Sosu seowon. He knew well the importance of learning. He was the person to represent the Sosu seowon. Toegye and Sinje are handed down to the fundamental principle brought in on the orthodox Neo-Confucianism caused by An Whyang. This research paper is to based upon on academic spirit of An Whyang in the study of orthodox Neo-Confucianism. Scholars who study of orthodox Neo-Confucianism thought that the nation's happiness made appointment to a competent person learned the orthodox Neo-Confucianism caused by An Whyang related to the Humanism education.

A study on Keup-ahm Min Sah-pyeong's Realization of Reality (급암(及庵) 민사평(閔思平)의 현실인식)

  • Jeong, Seong-sik
    • (The)Study of the Eastern Classic
    • /
    • no.69
    • /
    • pp.509-530
    • /
    • 2017
  • The purpose f this thesis is to examine the reality of Min Sha-pyeong, which led to life in the end of the Koryo Dynasty. Min Sha-pyeong was able to conduct academic exchanges through active negotiations with various scholars at the time. After passing the civil service exam at the age of 21, Min Sha-pyeong acted in various positions and remained loyal to the government. Min Sha-pyeong, who frequently met with Lee Je-hyun, Baek Mun-bo and Lee-saek, exchanged opinions. Sometimes Baek Mun-bo gathered together and always joined him when drinking. Lee-saek was convinced that his poetry would continue to inspire. The time when Min Sha-pyeong was active very confusing at home and abroad. In the end of the Koryo Dynasty, the national operating system was unstable due to the poor land and the suffering of the afflicted people, who suffered from frequent in vasions of Japan. At the time, the corruption and the suffering of the people were serious. Min Sha-pyeong refers to the reality of the people who love the people, reflecting the lives of the people living in poverty. Min Sha-pyeong thinks life without loyality is not a normal life. If I had a desire, I realized that the riches of wealth would wane someday. Min Sha-pyeong hoped that he would be relieved of his sympathy and would be relieved of their position in sympathy ith the people. Here, youy can see the reality of the people in Min Sha-pyeong is clearly revealed.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.