• 제목/요약/키워드: human Intrusion

Search Result 63, Processing Time 0.022 seconds

Development of a reference framework to assess stylized human intrusion scenarios using GENII Version 2 considering design features of planned near-surface disposal facility in Korea

  • Kwon, Ki Nam;Cheong, Jae Hak
    • Nuclear Engineering and Technology
    • /
    • v.51 no.6
    • /
    • pp.1561-1574
    • /
    • 2019
  • A standard form of six stylized human intrusion scenarios for a near-surface disposal facility (e.g. the planned Korean repository, Gyeongju Phase II) is proposed through re-categorization of totally thirty-one past cases reported in public literature. A reference assessment framework for inadvertent human intrusion is newly developed using GENII Version 2 conforming to the ICRP Publication 60 and thereafter. Calculated dose from the assessment framework is verified by comparing with hand calculation results for simplified model equations independently derived. Results from GENII Version 2 and 1.485 show inevitable differences, which is mainly attributed to the difference in the external dose assessment model. If intake dose coefficients in GENII Version 1.485 are modified, the difference can be reduced but still exist to an extent. Through deterministic and probabilistic sensitivity analysis, most affecting four parameters are derived and uncertainties of the parameters are quantified. It is expected that the reference assessment framework together with representative stylized scenarios can be used to do a human intrusion impact assessment for a specific repository using site-specific information. Especially, the past practice of human intrusion impact assessment using GENII Version 1.485 with or without modification may be replaced with the new assessment framework developed in this study.

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a novel network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

Review on Assessment Methodology for Human Intrusion Into a Repository for Radioactive Waste (방사성폐기물 처분장 인간침입 평가 방법론에 관한 고찰)

  • Cho, Dong-Keun;Kim, Jung-Woo;Jeong, Jong-Tae;Baik, Min-Hoon
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.3
    • /
    • pp.297-305
    • /
    • 2016
  • An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

Safety Assessment on the Human Intrusion Scenarios of Near Surface Disposal Facility for Low and Very Low Level Radioactive Waste (저준위 및 극저준위 방사성폐기물 표층처분시설의 인간침입 시나리오 안전평가에 대한 고찰)

  • Hong, Sung-Wook;Park, Sangho;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.1
    • /
    • pp.79-90
    • /
    • 2016
  • The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

An Application of Clonal Selection Process of an Artificial Immune System to Implementing Intruder Detection System

  • Kim, Jung-Won;Kim, Jung-Won;Kim, Hwa-Soo
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.298-309
    • /
    • 2001
  • This research aims to unravel the significant features of the human immune system, which would be successfully employed for a novel network intrusion detection model. Several salient features of the human immune system, which detects intruding pathogens, are carefully studied and the possibility and the advantages of adopting these features for network intrusion detection are reviewed and assessed.

  • PDF

An Application of Negative Selection Process to Building An Intruder Detection System

  • Kim, Jung W.;Park, Jong-Uk
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.147-152
    • /
    • 2001
  • This research aims to unravel the significant features of the human immune system, which would be successfully employed for a novel network intrusion detection model. Several salient features of the human immune system, which detects intruding pathogens, are carefully studied and the possibility and the advantages of adopting these features for network intrusion detection are reviewed and assessed.

  • PDF

Comparison of the Mercury Intrusion Porosimerty, Capillary Flow Porometry and Gas Permeability of Eleven Species of Korean Wood

  • Jang, Eun-Suk;Kang, Chun-Won;Jang, Sang-Sik
    • Journal of the Korean Wood Science and Technology
    • /
    • v.46 no.6
    • /
    • pp.681-691
    • /
    • 2018
  • The typical methods of mercury intrusion porosimetry (MIP) and capillary flow porometry (CFP) were used to evaluate the pore size of cross-section of wood and the effect of the pore structure on the permeability of wood was analyzed in this study. The results of this study were as followings: The pore size of wood measured by CFP was larger than that measured by MIP except for Lime tree, Korean red pine and Paulownia. Among the three pore types of porous materials defined by IUPAC (through pores, blind pores, and closed pores), only through pores are related to permit fluid flow. MIP measures the pore size of both through pores and blind pores, while CFP measures the pore size of only constricted through pores. Therefore, pore size measured by MIP was not related to gas permeability, however pore size measured by CFP had a proportional relationship with gas permeability.

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

  • Lee, Jeong Kyu;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.489-501
    • /
    • 2016
  • As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.

Study on the Well Scenario of the LILW Disposal Facility in Korea (중·저준위 방사성폐기물 처분시설의 우물 이용 시나리오를 적용한 안전평가 연구에 대한 고찰)

  • Jeong, Mi-Seon;Cheong, Jae-Yeol;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • The low and intermediate-level radioactive waste generated in Korea is disposed of at Wolsong Disposal Facility. For the safety of a disposal facility, it must be assessed by considering some abnormal scenarios including human intrusion as well as those by natural phenomena. The human intrusion scenario is a scenario that an incognizant man of the disposal facility will be occurred by the drilling. In this paper, the well usage scenario was classified into the human intrusion event as the probability of the well drilling is very low during the man's lifecycle and then was assessed by using conservative assumptions. This scenario was assessed using the dilution factor of contaminants released from a disposal facility and then it was introduced the applied methodology in this study. The assessed scenario using this methodology is satisfied the regulatory limits.