• Title/Summary/Keyword: damage information

Search Result 3,051, Processing Time 0.027 seconds

Analysis of extreme wind speed and precipitation using copula (코플라함수를 이용한 극단치 강풍과 강수 분석)

  • Kwon, Taeyong;Yoon, Sanghoo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.4
    • /
    • pp.797-810
    • /
    • 2017
  • The Korean peninsula is exposed to typhoons every year. Typhoons cause huge socioeconomic damage because tropical cyclones tend to occur with strong winds and heavy precipitation. In order to understand the complex dependence structure between strong winds and heavy precipitation, the copula links a set of univariate distributions to a multivariate distribution and has been actively studied in the field of hydrology. In this study, we carried out analysis using data of wind speed and precipitation collected from the weather stations in Busan and Jeju. Log-Normal, Gamma, and Weibull distributions were considered to explain marginal distributions of the copula. Kolmogorov-Smirnov, Cramer-von-Mises, and Anderson-Darling test statistics were employed for testing the goodness-of-fit of marginal distribution. Observed pseudo data were calculated through inverse transformation method for establishing the copula. Elliptical, archimedean, and extreme copula were considered to explain the dependence structure between strong winds and heavy precipitation. In selecting the best copula, we employed the Cramer-von-Mises test and cross-validation. In Busan, precipitation according to average wind speed followed t copula and precipitation just as maximum wind speed adopted Clayton copula. In Jeju, precipitation according to maximum wind speed complied Normal copula and average wind speed as stated in precipitation followed Frank copula and maximum wind speed according to precipitation observed Husler-Reiss copula.

A Research Study on Monitoring for Establishing Disaster Safety Villages in Rural Areas -Based on Disaster Prevention Experience Village in Garisan-ri, Inje-gun- (농촌지역 재난안전마을 구축을 위한 모니터링 조사 연구 -인제군 가리산리 방재체험마을 중심으로-)

  • Koo, Wonhoi;Baek, Minho
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.3
    • /
    • pp.398-404
    • /
    • 2017
  • In this study, the field investigation was carried out in an area damaged by flood, which recently occurred in Chungcheong region, in order to establish a disaster safety village in a rural area. In addition, the history and characteristics of a village in Garisan-ri, Inje-gun, Gangwon-do that experienced loss of life and property caused by flood in 2006 were analyzed through monitoring. The village was restored and has been operated as a disaster prevention experience village for the purpose of disaster prevention, and its structural and non-structural status was monitored during the analysis. Based on the results, application measures for establishing a disaster safety village in a rural area in future were examined. At the time of restoring food damage, the residents' participation was actively reflected in the process of establishing the disaster prevention experience village in Garisan-ri. The village has been currently operated until now as an example of disaster safety village in rural regions, and various activities including training and educational programs are carried out in order to reinforce the disaster prevention capability of residents. The findings of this study can be used for establishing a disaster safety village in a rural area based on such characteristics.

A Study of the Situation Based Disaster Response Model from the Damage of Storm and Flood Field Manual (풍수해 현장조치 행동매뉴얼 분석을 통한 상황 기반 재난 대응 모델 연구)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Twehwan;Lee, Hyeon Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.617-625
    • /
    • 2019
  • Purpose: The fields manuals which is managed by the each disaster types are the integrated guideline. When the disaster occurred, all kinds of SOPs which are described in the manual does not need. Therefore, the person in charge is confused which SOP is executed. In this study, we propose the disaster response process model based on the specific disaster situation case. Method: Firstly, we define the disaster situation cases which is mentioned in the field manual, and then, we develop the disaster response process model including indispensible SOPs for the specific disaster situation case. As a verification and feedback process, we apply the model to Safety Korea Exercise scenario. Result: We developed SOP model and disaster response process model reflecting the concept of the disaster situation case. Conclusion: Safety Kore Exercise scenario reflecting the developed model may continuously upgrade the field manual.

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Mobile Presentation using Transcoding Method of Region of Interest (관심 영역의 트랜스코딩 기법을 이용한 모바일 프리젠테이션)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.197-204
    • /
    • 2010
  • An effective integration of web-based learning environment and mobile device technology is considered as a new challenge to the developers. The screen size, however, of the mobile device is too small, and its performance is too inferior. Due to the foregoing limit of mobile technology, displaying bulk data on the mobile screen, such as a cyber lecture accompanied with real-time image transmission on the web, raises a lot of problems. Users have difficulty in recognizing learning contents exactly by means of a mobile device, and continuous transmission of video stream with bulky information to the mobile device arouses a lot of load for the mobile system. Thus, an application which is developed to be applied in PC is improper to be used for the mobile device as it is, a player which is fitting for the mobile device should be developed. Accordingly, this paper suggests mobile presentation using transcoding techniques of the field concerned. To display continuous video frames of learning image, such as a cyber lecture or remote lecture, by means of a mobile device, the performance difference between high-resolution digital image and mobile device should be surmounted. As the transcoding techniques to settle the performance difference causes damage of image quality, high-quality image may be guaranteed by application of trial and error between transcoding and selected learning resources.

A Study on Inundation Analysis Considering Inland and River Flood (내수 및 외수영향을 고려한 침수해석에 관한 연구)

  • Cho, Wan-Hee;Han, Kun-Yeun;Kim, Hyeon-Sik;Kim, Jin-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.1
    • /
    • pp.74-89
    • /
    • 2015
  • The objective of this study is to present countermeasures for mitigation of flood damage with inundation analysis considering the effect of inland and river flood and prediction of flood inundation area, depth and time against emergencies caused by abnormal flood and local torrential rainfall. In this study, 2-D inundation analysis was fulfilled on the basis of river flood analysis applying to HEC-HMS and FLDWAV model and inundation analysis applying to SWMM model for the area of Shineum-dong, Gimcheon-si. Also expected inundation depth and area about probable rainfall of 100 and 200 years frequency were suggested. If expected inundation depth and flooding area is presented on the basis of this inundation analysis considering the effect of inland and river flood, it would be an important preliminary data to establish structural and nonstructural countermeasures for flood prevention. Also if flood risk map is prepared based on the result of inundation analysis, it would be useful to evacuate residents in high-risk area and regulate road and vehicle.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.