• Title/Summary/Keyword: 대응행위

Search Result 502, Processing Time 0.035 seconds

A Methodology for Justification and Optimization of Countermeasures for Milk After a Nuclear Accident and Its Application (원자력 사고후 우유에 대한 비상대응의 정당화/최적화를 위한 방법론 및 적용연구)

  • Hwang, Won-Tae;Han, Moon-Hee;Kim, Eun-Han;Cho, Gyu-Seong
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.4
    • /
    • pp.243-249
    • /
    • 1998
  • The methodology for justification and optimization of the countermeasures related with contamination management of milk was designed based on the cost and benefit analysis. The application results were discussed for the deposition on August 15, when pasture is fully developed in Korean agricultural conditions. A dynamic food chain model DYNACON was used to estimate the time-dependent radioactivity of milk after the deposition. The considered countermeasures are (1) the ban of milk consumption (2) the substitution of clean fodder, which are effective in reducing the ingestion dose as well as simple and easy to carry out in the first year after the deposition. The total costs of the countermeasures were quantitatively estimated in terms of cost equivalent of doses and monetary costs. It is obvious that a fast reaction after the deposition is an important factor in cost effectiveness of the countermeasures. In most cases, the substitution of clean fodder was more effective countermeasure than the ban of consumption. A fast reaction after the deposition made longer justifiable/optimal duration of the countermeasure.

  • PDF

Application of Multi-Attribute Utility Analysis for the Decision Support of Countermeasures in Early Phase of a Nuclear Emergency (원자력 사고시 초기 비상대응 결정지원을 위한 다속성 효용 분석법의 적용)

  • Hwang, Won-Tae;Kim, Eun-Han;Suh, Kyung-Suk;Jeong, Hyo-Joon;Han, Moon-Hee;Lee, Chang-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.65-71
    • /
    • 2004
  • A multi-attribute utility analysis was investigated as a tool for the decision support of countermeasures in early phase of a nuclear accident. The utility function of attributes was assumed to be the second order polynomial expressions, and the weighting constant of attributes was determined using a swing weighting method. Because the main objective of this study focuses on the applicability of a multi-attribute utility analysis as a tool for the decision support of countermeasures in early phase of a nuclear accident, less quantifiable attributes were not included due to lack of information. In postulated accidental scenarios for the application of the designed methodology, the variation of the numerical values of total utility for the considered actions, e.g. sheltering, evacuation and no action, was investigated according to the variation of attributes. As a result, it was shown that the numerical values of total utility for the actions are distinctly different depending on the exposure dose and monetary value of dose. As increasing in both attributes, the rank of the numerical values of total utility increased for evacuation, which is more extreme action than for sheltering, while that of no action decreased. As expected probability of high dose is higher, the break-even values for the monetary value of dose, which are the monetary value of dose when the ranking of actions is changed, were lower. In audition, as aversion psychology for dose is higher, the break-even values for dose were lower.

Compatibilist Replies to Manipulation Arguments (자유의지에 대한 조작논증과 근원-양립가능주의의 대응)

  • Kim, Sungsu
    • Korean Journal of Logic
    • /
    • v.21 no.3
    • /
    • pp.373-393
    • /
    • 2018
  • Manipulation arguments purport to show that source freedom is incompatible with determinism. According to manipulation arguments, (1) intuitively, an agent manipulated in a certain manner to do A is not free, and (2) there is no significant difference between manipulation and determination. It follows that an agent determined to do A is not free. A compatibilist hard-line reply ('HR') denies (1), whereas a soft-line reply ('SR') denies (2). HR, which is arguably compatibilists' favorite, is assessed from the 'neutral stance.' HR turns out to fall short of adequately rejecting manipulation arguments. Recently Sartorio defends HR by claiming that (1) commits some sort of psychological fallacy. I argue that it does not work. I claim that SR is more promising. I examine the difference between intentional manipulation by design and ordinary determination. I argue that this difference suggests some determination scenario without intentional manipulation to which SR and manipulation arguments make different predictions, and that SR is better supported. Finally, incompatibilist objections are considered and replied.

Counter-Piracy Cooperation to Strengthen New Southern Policy's "Peace": An Analysis of ROK and ASEAN's Counter-Piracy Practices (신남방정책의 "평화"를 강화하기 위한 해적행위 대응 협력: 한국과 아세안의 해적행위 대응 관행 분석)

  • Boo, Yerin;Kim, Sujin;Yeo, Mathew Jie Sheng
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.141-185
    • /
    • 2021
  • The growing U.S.-China rivalry has placed the countries of Southeast Asia in exceedingly precarious positions. The Republic of Korea (ROK) likewise has been tasked with the challenge of "navigating the waters" between deepening geopolitical divides. It is in this context that the "New Southern Policy" (hereafter NSP) has become a key word in Korea's foreign policy circles. Through NSP, ROK aims to diversify its economic and security interests by strengthening ties with its southern partners, focusing on three key areas (termed as the "3 Ps"): People, Prosperity, and Peace. At the same time, the NSP seeks cooperation with other key diplomatic agendas such as the U.S.'s "Free and Open Indo-Pacific," rendering it crucial for the overall stability of the region. Considering such strategic significance, deeper analysis of the policy is more timely than ever. A brief assessment of the policy's outcome so far, however, reveals that relatively, the "Peace" pillar has been insufficient in achieving satisfactory outcomes. Here, this paper asks the question of: 1) How can the "Peace" pillar of South Korea's New Southern Policy be strengthened? Based on an analysis on the causes of the "Peace" pillar's weakness, this paper identifies counter-piracy cooperation as a solution. This paper then proceeds to answer the next question of: 2) How can ROK and ASEAN cooperate on counter-piracy, and how can these efforts be integrated into ROK's NSP? To answer the above question, this paper conducts in-depth case studies on ASEAN's and ROK's approaches to counter-piracy and identifies specific mechanisms of cooperation. In Chapter I, the paper begins with an overview of the NSP's strategic significance and an evaluation of its "Peace" pillar. Chapter II conducts a literature review on the causes of, and prescriptions for, the weakness of the "Peace" pillar. The paper then justifies why counter-piracy may be a solution. Chapter III examines ASEAN's and ROK's approaches to counter-piracy. By analyzing the general framework and each region's cases, the paper displays the strengths and weaknesses of each region's piracy responses. Based on this analysis, Chapter IV suggests ways to incorporate counter-piracy cooperation into the "Peace" pillar of the NSP. This research bears significance in that it identifies a specific area of cooperation (counter-piracy) to strengthen the "Peace" pillar of ROK's NSP. Such identification is based on a comprehensive study into the two parties' past and current experience in counter-piracy, making it contextual in nature. Furthermore, the study suggests practical mechanisms of cooperation, and considers ways of incorporation into the existing framework of NSP. This approach differs from existing literature that failed to generate case-specific, policy-oriented solutions. The COVID-19 pandemic has exacerbated piracy issues and deepened geopolitical divides. Turbulent seas such as these call for careful navigation. When it comes to promoting "peace," the key lies in combating the pirates that sail those very waters.

  • PDF

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

A Study on Resource Access Anomaly Detection Algorithm in Mobile Cloud (모바일 클라우드 자원 접근 이상행위 분석 알고리즘 연구)

  • Kim, Ji-Yeon;Choi, Ju-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Jeong-Wook;Jeong, Hyun-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.941-944
    • /
    • 2011
  • 모바일 클라우드 서비스는 사용자가 모바일 단말에 자원을 가지고 있지 않더라도 인터넷을 통해 외부의 다양한 IT 자원을 제공하는 서비스로서 모바일 단말이 가지는 성능적 한계를 극복시킬 수 있다는 장점과 함께 이용자 수가 증가하고 있다. 그러나 클라우드 컴퓨팅 환경에 존재하는 개인 및 기업의 정보 유출과 같은 문제들은 모바일 클라우드 컴퓨팅 환경에도 그대로 상속되기 때문에 이러한 문제에 대응하기 위해서는 모바일 클라우드 컴퓨팅 환경에서 정보유출을 탐지할 수 있는 이상행위 탐지 알고리즘이 마련되어야 한다. 여기서 이상행위란, 모바일 클라우드 자원에 접근하는 방법에 있어 기존에 인지하고 있던 정상적인 행위에서 벗어나는 행위를 의미하며 이상행위로 판단되는 상황이 발생되는 경우, 이를 정보유출이 발생할 수 있는 상황으로 인지함으로써 적절한 대응을 할 수 있게 된다. 따라서 본 논문에서는 모바일 클라우드 자원의 정보유출을 방지하기 위한 목적으로 자원 접근에 대한 이상행위 탐지 알고리즘 개발 모델을 제시한다. 이상행위 탐지 알고리즘을 개발하고 이를 검증하기 위해서는 이상행위를 일으키는 공격 모델 및 대응 모델이 개발되어야 한다. 따라서 본 논문에서는 인증 및 권한관리의 취약점을 이용하여 위협을 일으키는 공격 모델을 개발하는 방법을 제시하고, 사용자의 접속환경 및 클라우드 자원의 정보 흐름을 분석함으로써 이상행위를 탐지하는 알고리즘을 제시한다.

A Study on a Security Threats Responding through User Behavior Analysis (사용자 행위분석을 통한 보안 위협요소 대응 연구)

  • Cha, hui-seung;Kim, Jeong-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.329-330
    • /
    • 2019
  • 인터넷 기술 및 통신 기술의 급격한 발전과 사물 인터넷을 기반으로 산업 구조가 재편됨에 따라 점차 지능화, 다변화 있는 보안 위협들에 대하여 기존 시스템 보안 중심의 취약성 분석 및 데이터 암호화를 통해 구성된 보안 시스템은 한계를 보이고 있다. 특히 외부 침입 방지를 위해 별도의 사설망을 구축하여 물리적으로 분리된 보안망에 대한 악성코드 유입 등의 보안 위협 발생도 꾸준히 증가하고 있으며 보안 침해 상황 발생 시 빠른 대응도 점차 어려워지고 있다. 이에 본 연구에서는 새로운 유형의 보안 취약성 탐지를 위해 기존 보안 시스템을 구성하는 리엑티브(reactive) 기법 및 휴리스틱(heuristic) 탐지 기법이 아닌 네트워크 패킷 수집 및 분석과 대상 시스템의 비지니스 모델 매칭을 통한 사용자 행위 패턴을 해석하였다. 그리고 실시간 행위 분석을 수행하여 사용자 행위 중심의 이상 징후 감시 기준을 설립함으로써 보안 위협에 대한 행위 유형 판단 기준 및 이상 감지 판단 방법에 대해 제안한다.

  • PDF

Adopting Reinforcement Learning for Efficient Fire Disaster Response in City Fire Simulation (도시 화재 시뮬레이션에서의 효과적인 화재 대응을 위한 강화학습 적용 솔루션의 설계 및 구현)

  • Yeo, Sangho;Oh, Sangyoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.104-106
    • /
    • 2021
  • 도시의 인구 밀집도가 증가함에 따라 도시의 단위 면적당 건물 밀집도 역시 증가하고 있으며, 이에 도시 화재는 대규모 화재로 발전할 가능성이 높다. 도시 내 대규모 화재로 인한 인명 및 경제적인 피해를 최소화하기 위해 시뮬레이션 기반의 화재 대응 방안들이 널리 연구되고 있으며, 최근에는 시뮬레이션에서 효과적인 화재 대응 방안을 탐색하기 위해 강화학습 기술을 활용하는 연구들이 소개되고 있다. 그러나, 시뮬레이션의 규모가 커지는 경우, 상태 정보 및 화재 대응을 위한 행위 공간의 크기가 증가함으로 인해 강화학습의 복잡도가 증가하며, 이에 따라 학습 확장성이 저하되는 문제가 발생한다. 본 논문에서는 시뮬레이션 규모 증가 시 강화학습의 학습 확장성을 유지하기 위해, 화재 상황 정보와 재난 대응을 위한 행위 공간을 변환하는 기법을 제안한다. 실험 결과를 통해 기존에 강화학습 모델의 학습이 어려웠던 대규모 도시 재난시뮬레이션에서 본 기법을 적용한 강화학습 모델은 학습 수행이 가능하였으며, 화재 피해가 없는 상황의 적합도를 100%로 하고, 이것 대비 99.2%의 화재 대응 적합도를 달성했다.

Application of the Fuzzy Set Theory to Uncertain Parameters in a Countermeasure Model (비상대응모델의 불확실한 변수에 대한 퍼지이론의 적용)

  • Han, Moon-Hee;Kim, Byung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.2
    • /
    • pp.109-120
    • /
    • 1994
  • A method for estimating the effectiveness of each protective action against a nuclear accident has been proposed using the fuzzy set theory. In most of the existing countermeasure models in actions under radiological emergencies, the large variety of possible features is simplified by a number of rough assumptions. During this simplification procedure, a lot of information is lost which results in much uncertainty concerning the output of the countermeasure model. Furthermore, different assumptions should be used for different sites to consider the site specific conditions. Tn this study, the diversity of each variable related to protective action has been modelled by the linguistic variable. The effectiveness of sheltering and evacuation has been estimated using the proposed method. The potential advantage of the proposed method is in reducing the loss of information by incorporating the opinions of experts and by introducing the linguistic variables which represent the site specific conditions.

  • PDF

A Portscan Attack Detection Mechanism based on Fuzzy Logic for Abnormal Traffic Control Framework (비정상 트래픽 제어 프레임워크를 위한 퍼지 로직 기반의 포트스캔 공격 탐지 기법)

  • Kim, Jae-Gwang;Lee, Ji-Hyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.357-361
    • /
    • 2007
  • 비정상 트래픽 제어 프레임워크에 적용된 비정상 트래픽 제어 기술은 침입, 분산서비스거부 공격, 포트스캔 공격과 같은 비정상 행위의 트래픽을 제어하는 공격 대응 방법이다. 이 대응 방법은 비정상 행위에 대한 true-false 방식의 공격 대응 방법이 가지는 높은 오탐율(false-positive rate)을 낮출 수 있다는 장점이 있지만, 공격 지속시간에만 의존하여 비정상 트래픽을 판단하기 때문에, 공격에 대한 신속한 대응을 하지 못한다는 한계를 가지고 있다. 이에 본 논문에서는 비정상 트래픽 제어 프레임워크에 퍼지 로직을 적용하여 신속한 공격 대응이 가능한 포트스캔 공격 탐지 기법을 제안한다.

  • PDF