• 제목/요약/키워드: Human intrusion

검색결과 63건 처리시간 0.02초

Development of a reference framework to assess stylized human intrusion scenarios using GENII Version 2 considering design features of planned near-surface disposal facility in Korea

  • Kwon, Ki Nam;Cheong, Jae Hak
    • Nuclear Engineering and Technology
    • /
    • 제51권6호
    • /
    • pp.1561-1574
    • /
    • 2019
  • A standard form of six stylized human intrusion scenarios for a near-surface disposal facility (e.g. the planned Korean repository, Gyeongju Phase II) is proposed through re-categorization of totally thirty-one past cases reported in public literature. A reference assessment framework for inadvertent human intrusion is newly developed using GENII Version 2 conforming to the ICRP Publication 60 and thereafter. Calculated dose from the assessment framework is verified by comparing with hand calculation results for simplified model equations independently derived. Results from GENII Version 2 and 1.485 show inevitable differences, which is mainly attributed to the difference in the external dose assessment model. If intake dose coefficients in GENII Version 1.485 are modified, the difference can be reduced but still exist to an extent. Through deterministic and probabilistic sensitivity analysis, most affecting four parameters are derived and uncertainties of the parameters are quantified. It is expected that the reference assessment framework together with representative stylized scenarios can be used to do a human intrusion impact assessment for a specific repository using site-specific information. Especially, the past practice of human intrusion impact assessment using GENII Version 1.485 with or without modification may be replaced with the new assessment framework developed in this study.

인간 면역 체계를 이용한 네트워크 탐지기술 연구 (A Study on Network detection technique using Human Immune System)

  • 김정원;;정길호;최종욱
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 1999년도 춘계공동학술대회: 지식경영과 지식공학
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a novel network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

인간 면역 체계를 이용한 네트워크 탐지기술 연구 (A Study on Network detection technique using Human Immune System)

  • 김정원;;정길호;최종욱
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 1999년도 춘계공동학술대회-지식경영과 지식공학
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

방사성폐기물 처분장 인간침입 평가 방법론에 관한 고찰 (Review on Assessment Methodology for Human Intrusion Into a Repository for Radioactive Waste)

  • 조동건;김정우;정종태;백민훈
    • 방사성폐기물학회지
    • /
    • 제14권3호
    • /
    • pp.297-305
    • /
    • 2016
  • 본 연구에서는 방사성폐기물 처분장이 건설 운영되고, 폐쇄 후 제도적 관리기간이 끝나게 되어 그 곳에 처분장이 존재한다는 사실과 위해(hazard)의 정도가 잊혀 지면서 무의식적인(inadvertent) 처분장 인간침입이 일어날 경우 이를 어떻게 평가할 것인지에 대해 기술하였다. 처분장 인간침입을 평가하기 위한 전제조건을 국내 또는 국제적으로 권고한 사항에 근거하여 설정하고 처분장 인간침입 평가방법론에 대해 기술하였다. 처분장 인간침입 평가 방법론에서는 사회적요인, 인간침입 시나리오, 방지대책 도출시 상호 관계에 대해 언급하였으며, 시나리오 도출절차에 대해서도 언급하였다. 인간침입 방지대책을 도출하기 위한 절차를 네 단계로 구분하여, 기본 정보를 도출하는 방법, 일반방지대책을 도출하는 방법, 후보방지대책을 도출하는 방법, 정형화된 시나리오를 고려하여 최종적으로 인간침입 방지대책을 도출하는 방법 등에 대해 체계적으로 기술하였다. 본 연구에서 도출된 인간침입 평가 방법론은 향후 인간침입의 가능성을 감소시키고 인간침입 발생 시 위해를 줄이기 위한 방지대책 마련 시 유용하게 활용될 것으로 판단된다.

저준위 및 극저준위 방사성폐기물 표층처분시설의 인간침입 시나리오 안전평가에 대한 고찰 (Safety Assessment on the Human Intrusion Scenarios of Near Surface Disposal Facility for Low and Very Low Level Radioactive Waste)

  • 홍성욱;박상호;박진백
    • 방사성폐기물학회지
    • /
    • 제14권1호
    • /
    • pp.79-90
    • /
    • 2016
  • The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

An Application of Clonal Selection Process of an Artificial Immune System to Implementing Intruder Detection System

  • Kim, Jung-Won;Kim, Jung-Won;Kim, Hwa-Soo
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.298-309
    • /
    • 2001
  • This research aims to unravel the significant features of the human immune system, which would be successfully employed for a novel network intrusion detection model. Several salient features of the human immune system, which detects intruding pathogens, are carefully studied and the possibility and the advantages of adopting these features for network intrusion detection are reviewed and assessed.

  • PDF

An Application of Negative Selection Process to Building An Intruder Detection System

  • Kim, Jung W.;Park, Jong-Uk
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.147-152
    • /
    • 2001
  • This research aims to unravel the significant features of the human immune system, which would be successfully employed for a novel network intrusion detection model. Several salient features of the human immune system, which detects intruding pathogens, are carefully studied and the possibility and the advantages of adopting these features for network intrusion detection are reviewed and assessed.

  • PDF

Comparison of the Mercury Intrusion Porosimerty, Capillary Flow Porometry and Gas Permeability of Eleven Species of Korean Wood

  • Jang, Eun-Suk;Kang, Chun-Won;Jang, Sang-Sik
    • Journal of the Korean Wood Science and Technology
    • /
    • 제46권6호
    • /
    • pp.681-691
    • /
    • 2018
  • The typical methods of mercury intrusion porosimetry (MIP) and capillary flow porometry (CFP) were used to evaluate the pore size of cross-section of wood and the effect of the pore structure on the permeability of wood was analyzed in this study. The results of this study were as followings: The pore size of wood measured by CFP was larger than that measured by MIP except for Lime tree, Korean red pine and Paulownia. Among the three pore types of porous materials defined by IUPAC (through pores, blind pores, and closed pores), only through pores are related to permit fluid flow. MIP measures the pore size of both through pores and blind pores, while CFP measures the pore size of only constricted through pores. Therefore, pore size measured by MIP was not related to gas permeability, however pore size measured by CFP had a proportional relationship with gas permeability.

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

  • Lee, Jeong Kyu;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제12권3호
    • /
    • pp.489-501
    • /
    • 2016
  • As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.

중·저준위 방사성폐기물 처분시설의 우물 이용 시나리오를 적용한 안전평가 연구에 대한 고찰 (Study on the Well Scenario of the LILW Disposal Facility in Korea)

  • 정미선;정재열;박진백
    • 방사성폐기물학회지
    • /
    • 제13권1호
    • /
    • pp.63-72
    • /
    • 2015
  • 우리나라의 중·저준위 방사성폐기물은 월성환경관리센터를 이용하여 처분된다. 처분시설의 안전성을 확인하기 위하여 자연현상에 의한 시나리오뿐만 아니라 인간침입에 의한 시나리오도 고려하여 평가한다. 인간침입 시나리오는 제도적관리기간 이후 처분시설의 존재를 모르는 인간에 의해 시추 등과 같은 행위로 인해 일어나는 시나리오로서, 우물이용 시나리오는 처분부지 내 우물의 시추확률이 수십 년 생애기간에 시나리오에 의한 피폭을 한번이라도 경험할 수 있는 가능성이 낮음을 보여 인간침입 사건범주로 구분하였으며, 보수적인 가정을 사용하여 평가하였다. 이를 위하여 우물의 위치 및 처분시설로부터 누출된 오염물질의 우물 유입비율을 지하수 유동 모델링을 통하여 계산되었으며, 이에 대한 방법론을 소개하였다. 또한, 이 방법론을 핵종이동 모델링에 적용하여 처분시설에 미치는 영향을 평가하여, 평가된 시나리오는 성능목표치를 만족하고 있음을 보였다.