• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.025 seconds

Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation (위험 전파 모형을 고려한 공급사슬의 구조적 취약성 평가 지표 설계)

  • Moon, Hyangki;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.125-140
    • /
    • 2015
  • It is general that the impact of supply chain risk spread out to the whole network along the connected structure. Due to the risk propagation the probability to exposure a certain risk is affected by not only the characteristics of each risk factor but also network structure. It means that the structural connectivity among vertices should be considered while designing supply chain network in order to minimize disruption cost. In this research, the betweenness centrality has been utilized to quantitatively assess the structural vulnerability. The betweenness centrality is interpreted as the index which can express both the probability of risk occurrence and propagation of risk impact. With the structural vulnerability index, it is possible to compare the stability of each alternative supply chain structure and choose the better one.

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

The effect investigation of the delirium by Bayesian network and radial graph (베이지안 네트워크와 방사형 그래프를 이용한 섬망의 효과 규명)

  • Lee, Jea-Young;Bae, Jae-Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.5
    • /
    • pp.911-919
    • /
    • 2011
  • In recent medical analysis, it becomes more important to looking for risk factors related to mental illness. If we find and identify their relevant characteristics of the risk factors, the disease can be prevented in advance. Moreover, the study can be helpful to medical development. These kinds of studies of risk factors for mental illness have mainly been discussed by using the logistic regression model. However in this paper, data mining techniques such as CART, C5.0, logistic, neural networks and Bayesian network were used to search for the risk factors. The Bayesian network of the above data mining methods was selected as most optimal model by applying delirium data. Then, Bayesian network analysis was used to find risk factors and the relationship between the risk factors are identified through a radial graph.

A Study on the results of Technical Risk Analysis based IDS Assessment Methodology (기술적 위험분석 결과를 활용한 IDS 평가방법에 관한 연구)

  • Shim, Mi-Na;Cho, Sang-Hyun;Lim, Jong-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.945-948
    • /
    • 2005
  • 현재 침입탐지시스템(IDS:Intrusion Detection System)은 다양한 평가요소들 - 탐지율, 오탐율, 새로운 공격탐지능력, 안정성 등을 기준으로 평가되고 있고, 이러한 결과는 제품의 보호수준을 결정하거나 한 조직의 정보보호장치로 적합한지를 평가하는 벤치마킹테스트의 방법으로 활용된다. 그러나, 이러한 평가의 결과는 조직의 침입탐지시스템을 구축하고자 하는 네트워크 환경하에서 각각의 침입탐지시스템이 갖는 특성에 따라 상대적인 평가는 가능하나 해당 조직의 네트워크 인프라와 위협요소, 취약점을 고려했을 때 보다 최적의 것이 무엇인지를 평가하는 방법으로는 한계가 있다. 그러므로, 본 연구논문에서는 이러한 한계를 극복하기 위한 방법으로서 조직의 정보보호 위험분석에서 도출된 해당 네트워크 환경의 자산, 위협, 취약성의 결과인 위험과 위험수준을 IDS 평가에 반영하여 조직의 환경하에 보다 적합한 침입탐지시스템 선정이 가능한 평가방법을 제안한다.

  • PDF

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

Developing the information security risk index using network gathering data (네트워크 수집정보를 이용한 정보보호 위험도 예측지수 개발)

  • Park, Jin Woo;Yun, Seokhoon;Kim, Jinheum;Jeong, Hyeong Chul
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.7
    • /
    • pp.1173-1183
    • /
    • 2016
  • In this paper, we proposed an information security risk index to diagnose users' malware infection situations (such as computer virus and adware) by gathering data from KT network systems. To develop the information security risk index, we used the analytic hierarchy process methodology and estimated the risk weights of malware code types using the judgments of experts. The control chart could be used effectively to forecast the information security risk for the proposed information security risk index data.

Sensitivity Analysis of Drought Impact Factors Using a Structural Equation Model and Bayesian Networks (구조방정식모형과 베이지안 네트워크를 활용한 가뭄 영향인자의 민감도 분석)

  • Kim, Ji Eun;Kim, Minji;Yoo, Jiyoung;Jung, Sungwon;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.11-21
    • /
    • 2022
  • Drought occurs extensively over a long period and causes great socio-economic damage. Since drought risk consists of social, environmental, physical, and economic factors along with meteorological and hydrological factors, it is important to quantitatively identify their impacts on drought risk. This study investigated the relationship among drought hazard, vulnerability, response capacity, and risk in Chungcheongbuk-do using a structural equation model and evaluated their impacts on drought risk using Bayesian networks. We also performed sensitivity analysis to investigate how the factors change drought risk. Overall results showed that Chungju-si had the highest risk of drought. The risk was calculated as the largest even when the hazard and response capacity were changed. However, when the vulnerability was changed, Eumseong-gun had the greatest risk. The sensitivity analysis showed that Jeungpyeong-gun had the highest sensitivity, and Jecheon-si, Eumseong-gun, and Okcheon-gun had highest individual sensitivities with hazard, vulnerability, and response capacity, respectively. This study concluded that it is possible to identify impact factors on drought risk using regional characteristics, and to prepare appropriate drought countermeasures considering regional drought risk.

Assessment of Drought Vulnerability Using Bayesian Network Model (베이지안 네트워크 모델을 활용한 가뭄 취약성 평가)

  • Kim, Ji Eun;Shin, Ji Yae;Chung, Gunhui;Kim, Tae-Woong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.126-126
    • /
    • 2018
  • 최근 우리나라는 기후변화로 인한 이상기후 현상 중 가뭄에 대한 발생빈도가 증가하고 있다. 가뭄은 다른 자연재해에 비해 지속기간이 길고 규모가 광범위하여, 사회 경제적인 피해가 크게 발생한다. 이러한 가뭄에 대비하기 위해서는 지역적으로 적합한 가뭄 대책을 수립해야 하며, 이를 위해서는 가뭄 위험도 평가가 선행되어야 한다. 지역적 가뭄 위험도를 평가하기 위해서는 기상학적 요인뿐만 아니라 사회 경제적인 요인에 의한 영향을 고려하는 가뭄 취약성 평가가 수반되어야 한다. 본 연구에서는 지역별 가뭄 취약성 평가를 수행하기 위해, 지역별 용수 수요 및 공급관련 인자와 선행연구에서 정의된 가뭄 위험인자들 중 8개(생활 농업 공업 용수공급량, 인구밀도, 1인당 가용수자원량, 물 자급률, 취수율, 물 이용 공평성)를 선택하였다. 베이지안 네트워크(Bayesian Network) 기법을 통해 선정된 사회 경제적 요인들과 가뭄과의 상관관계를 분석하여 각 지역의 특성을 고려한 가뭄 위험요인별 확률을 산정하였다. 최종적으로 산정된 주요 가뭄 위험요인별 확률을 우선순위에 따른 가중치를 적용하여 지역별 가뭄 취약성지수(Drought Vulnerability Index, DVI)를 산정하였고, 이를 이용하여 우리나라의 행정구역별로 취약성 평가를 수행하고 지도로 표시하였다. 지역별 가뭄 취약성 평가를 수행한 결과 익산, 상주, 완주 순으로 높게 나타났으며, 계룡, 과천, 종로순으로 가장 낮게 산정되었다. 또한 광역자치단체의 평균 가뭄 취약성지수를 산정한 결과 전라북도 지역이 가장 높게 나타났으며, 대구 및 대전광역시가 가장 낮게 나타났다.

  • PDF

Design and Implementation of a ZigBee Nework-based Integrated AFCI (지그비 네트워크 기반 복합형 AFCI 설계 및 구현)

  • Chang, Ki-Heung;Kim, Kee-Min;Kim, Jae-O;Ahn, Hyun-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.41-48
    • /
    • 2010
  • In this paper, a new type of integrated AFCI is designed and implemented by combining individual circuit breaker characteristics, which can effectively detect arc fault signals in real-time. The proposed integrated AFCI satisfies the UL1699, the USA certification standard, and the Korean circuit breaker standards such as KS C4613 and KS C8321. Data signals are transferred to the management server via ZigBee network to analyze dangerous factors and to prevent unwanted trip. It is also shown by experiments that arc fault signals are detected and analyzed by using the integrated AFCI with ZigBee networks.

Development of a System to Detect the Risk Factors of Trade based on Network Search Technology (네트워크 탐색 기술을 기반으로 한 무역 거래 위험 요소 적발 시스템 개발)

  • Seo, Dongmin;Kim, Jaesoo;Song, Jeong a;Park, Moon il
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.11-12
    • /
    • 2018
  • 빅데이터 분석에 활용되는 원천 데이터는 네트워크 형태이며, 최근 소셜 네트워크 분석을 통한 효과적인 상품 광고, 핵심 유전자 발굴, 신약 재창출 등 다양한 영역에서 네트워크 분석 기술이 사회와 인류에게 가치 있는 정보를 제공할 수 있는 가능성을 제시하면서 네트워크 분석 기술의 중요성이 부각되고 있다. 또한, 세계화와 정보통신기술의 급격한 발전으로 빠르게 변화하는 무역 환경 속에서 신속하고 정확한 무역 거래에 대한 안전 관리의 요구가 점차 증가하고 있다. 그래서 본 논문에서는 네트워크 탐색 기술을 기반으로 한 무역 거래 위험 요소 적발 기술을 제시했다.

  • PDF