• Title/Summary/Keyword: Attack Potential

Search Result 258, Processing Time 0.025 seconds

Risk-based Security Impact Evaluation of Bridges for Terrorism (Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가)

  • Kang, Sang-Hyeok;Choi, Hyun-Ho;Seo, Jong-Won
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF

Significant Reperfusion on $^{99m}Tc-HMPAO$ SPECT in a Case of Subacute MCA Infarction (한의학적 치료로 $^{99m}Tc-HMPAO$ SPECT상 현저한 재관류를 보인 아급성기 중대뇌동맥경색 환자 1례)

  • Park, Jung-Mi;Jung, Woo-Sang;Seo, Al-An
    • The Journal of Internal Korean Medicine
    • /
    • v.22 no.3
    • /
    • pp.437-442
    • /
    • 2001
  • For ischemic cerebrovascular disease, it is well known that early luxury perfusion is related to a good clinical outcome and single photon emission computed tomography(SPECT) has the potential for providing useful information about regional cerebral blood flow. We report one case of Rt. MCA infarction mainly treated by oriental medicine and revealed luxury perfusion without thrombolysis. In acute stage, neurological deficits of the patient were very severe. 99mTc-HMPAO SPECT images obtained 10days after the attack showed large perfusion defect in the Rt. MCA territory. We followed up 99mTc-HMPAO SPECT 40days after the ictus. Despite of the poor early perfusion, we found considerably improved perfusion and neurological improvement.

  • PDF

Detecting A Crypto-mining Malware By Deep Learning Analysis

  • Aljehani, Shahad;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.172-180
    • /
    • 2022
  • Crypto-mining malware (known as crypto-jacking) is a novel cyber-attack that exploits the victim's computing resources such as CPU and GPU to generate illegal cryptocurrency. The attacker get benefit from crypto-jacking by using someone else's mining hardware and their electricity power. This research focused on the possibility of detecting the potential crypto-mining malware in an environment by analyzing both static and dynamic approaches of deep learning. The Program Executable (PE) files were utilized with deep learning methods which are Long Short-Term Memory (LSTM). The finding revealed that LTSM outperformed both SVM and RF in static and dynamic approaches with percentage of 98% and 96%, respectively. Future studies will focus on detecting the malware using larger dataset to have more accurate and realistic results.

Analysis and Aspects of Space Warfare in the Russia-Ukraine War (Russian Invasion of Ukraine) and Considerations for Space Technology Development (러시아-우크라이나 전쟁(러시아의 우크라이나 침공)의 우주전 분석 및 양상 그리고 우주기술 개발시 고려사항)

  • Choi, Seonghwan
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.169-186
    • /
    • 2022
  • In this article, Russia's space threat assessment and space warfare in the Russia-Ukraine war (Russian invasion of Ukraine) were analyzed and summarized. Considering the probability that commercial satellites will also be potential targets of space warfare, it is suggested that not only military satellites but also commercial satellites develop and apply space technology that can be applied equally to space threats when developing space technology. Necessary space technologies is listed.

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

Effect of Chloride Ion-reducing Bacteria on the Chloride ion Concentration in Cement Mortars (염소이온 저감능 박테리아가 모르타르의 염소이온 농도에 미치는 영향)

  • Hwang, Ji-Won;Yoon, Hyun-Sub;Yang, Keun-Hyeok
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.49-50
    • /
    • 2022
  • This study examined the potential of halophilic bacteria in reducing the chloride ion concentration within the cement mortars exposed to chloride attack. As a result of the experiment, the compressive strength of mortar with Halomonas venusta showed an equivalent performance to that of counterpart mortars without bacteria. Also, the chloride ion concentration measured in mortars including Halomonas Venusta was 71% lower than that of the counterpart mortars without bacteria.

  • PDF

A Comprehensive Survey of TPM for Defense Systems

  • Cheol Ryu;Jae-Ho Lee;Do-Hyung Kim;Hyung-Seok Lee;Young-Sae Kim;Jin-Hee Han;Jeong-nyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1953-1967
    • /
    • 2024
  • Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.

A Study on Corrosion Potential of Cracked Concrete Beam According to Corrosion Resistance Assessment (부식 저항성 평가에 따른 균열 콘크리트 보의 부식전위 연구)

  • Song, Ha-Won;Lee, Chang-Hong;Lee, Kewn-Chu
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.13 no.1 s.53
    • /
    • pp.97-105
    • /
    • 2009
  • Development and use of blended cement concrete is gaining more importance in the construction industry with reference to durability mainly due to the pore refinement and reduction in permeability. Cracks play a major role on important parameters like permeability, rate of chloride ingress, compressive strength and thus affect the reinforcement corrosion protection. Furthermore, when a crack occurs in the cover concrete, the corrosion of the steel reinforcement may be accelerated because the deterioration causing factors can pass through the crack. In recent years the effect of cracking on the penetration of concrete has been the subject of numerous investigations. Therefore assessing the service life using blended concrete becomes obviously in considering the durability. In the present study, the corrosion assessment of composite concrete beams with and without crack with of 0.3mm using OPC, 30% PFA, 60% GGBS, 10% SF was performed using half cell potential measurement, galvanic potential measurement, mass loss of steel over a period of 60days under marine environmental conditions and the results were discussed in detail.

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

A Case Study of WRF Simulation for Surface Maximum Wind Speed Estimation When the Typhoon Attack : Typhoons RUSA and MAEMI (태풍 내습 시 지상 최대풍 추정을 위한 WRF 수치모의 사례 연구 : 태풍 RUSA와 MAEMI를 대상으로)

  • Jung, Woo-Sik;Park, Jong-Kil;Kim, Eun-Byul;Lee, Bo-Ram
    • Journal of Environmental Science International
    • /
    • v.21 no.4
    • /
    • pp.517-533
    • /
    • 2012
  • This study calculated wind speed at the height of 10 m using a disaster prediction model(Florida Public Hurricane Loss Model, FPHLM) that was developed and used in the United States. Using its distributions, a usable information of surface wind was produced for the purpose of disaster prevention when the typhoon attack. The advanced research version of the WRF (Weather Research and Forecasting) was used in this study, and two domains focusing on South Korea were determined through two-way nesting. A horizontal time series and vertical profile analysis were carried out to examine whether the model provided a resonable simulation, and the meteorological factors, including potential temperature, generally showed the similar distribution with observational data. We determined through comparison of observations that data taken at 700 hPa and used as input data to calculate wind speed at the height of 10 m for the actual terrain was suitable for the simulation. Using these results, the wind speed at the height of 10 m for the actual terrain was calculated and its distributions were shown. Thus, a stronger wind occurred in coastal areas compared to inland areas showing that coastal areas are more vulnerable to strong winds.