• Title/Summary/Keyword: 방어진

Search Result 145, Processing Time 0.032 seconds

입체각 계수법을 이용한 라돈 절대 측정기 개발

  • Kim, Byeong-Cheol;Kim, Jeong-Ho;Kim, Hyeon-Mun;Park, Tae-Sun;Park, Hyeon-Seo;An, Jeong-Geun;O, Pil-Je;Lee, Gyeong-Beom;Lee, Min-Gi;Lee, Sang-Han;Lee, Jong-Man;Lee, Cheol-Yeong;Jeon, Guk-Jin;Choe, Gil-Ung;Ha, Seok-Ho
    • 대한방사선방어학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.68-69
    • /
    • 2009
  • PDF

네트워크 포렌식을 통한 분산서비스거부공격 비교분석

  • Kim, Hyuk-Joon;Lee, Sang-Jin
    • Review of KIISC
    • /
    • v.21 no.4
    • /
    • pp.69-74
    • /
    • 2011
  • 2011년 3월 4일 발생한 DDoS 공격은 악성코드 제작, 봇넷 구성 및 공격전개 방식에서 지난 2009년 발생한 7.7 DDoS 공격과 많은 유사점이 있다. 그러나 공격 전략과 공격 수행 방법 측면에서 좀 더 자세히 분석해보면 상호간의 유사점보다는 차이점이 더 많음을 알 수 있다. 7.7 DDoS 공격의 경우 공격자는 공격 전개를 위해 종 더 많은 시간을 투자하였으며 당시 국내 DDoS 방어수준에 대한 정확한 이해를 바탕으로 매우 효과적인 공격을 수행하였다. 그러나 3.4 DDoS 공격의 경우 공격자는 공격 망 구성을 위해 충분한 시간을 투자하지 않았으며, 비록 악성코드 전개에 있어 진일보한 모습을 보였으나 DDoS 방어수준에 대한 충분한 이해가 부족하였던 것으로 나다났다. 본 고에서는 2011년 3.4일 발생한 DDoS 공격을 네트워크 수준에서 양 공격의 유사점과 차이점을 분석 비교한다.

ARE10S : an Adaptive Real-Time Evaluation Tool for Intrusion Detection System (AREIDS : 적응적인 실시간 침입탐지시스템 평가도구)

  • 정유석;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.643-645
    • /
    • 2001
  • 최근 몇 년간에 이루어 진 네트웍 및 인터넷 시장의 발전과 더불어 성장한 시스템에 대한 침입 등은 이를 방어하기 위한 여러 도구의 개발을 가져왔단다. 이러한 도구들 중 침입탐지시스템은 시스템 방어에 핵심적인 역할을 하는데, 현재까지 이를 평가하기 위한 자동화된 온라인 평가도구는 없는 실정이다. 보안관련 학문 및 시장이 발달한 미국에서는 DARPA의 지원아래 관련된 연구가 진행되어 1998년과 1999년 대규모의 침입탐지시스템 평가가 이루어졌으나, 이때의 평가들은 당시의 침입 수준만을 고려한 것으로 새로운 침입 환경에 대한 확장은 용이하지 않기에, 급속도로 발전하는 침입 기술에 대응하기 위한 새로운 방법이 필요하다. 본 논문에서는 새로운 침입 환경에 적응적이며 실시간으로 다량의 침입에 대한 정량적 탐지성능을 측정하고 결과를 통계적으로 분석하여 출력할 수 있는 통계적인 침입탐지 평가도구를 개발한다.

  • PDF

Flow Analysis around the Bang-o-Jin Breakwater by Numerical Simulation (수치계산을 통한 방어진 방파제 주위의 유동장 해석)

  • Kwag, S.H.;Park, M.K.
    • Journal of Korean Port Research
    • /
    • v.10 no.1
    • /
    • pp.63-74
    • /
    • 1996
  • The flow analysis around the Bang-o-jin breakwater was carried out by the numerical simulation based on the package program NISA Ⅱ. The averaged Navier-Stokes equations are changed to a weak formulation, which is an application of finite element method. To get a better circulation of sea-water current, various types of breakwater modification were numerically tried for the purpose of comparisons. According to the numerical results, it proved to be very difficult to have the seawater circulate in every corner inside the breakwater. However, some cases give the promising feasibility provided that the waste water disposal plant should be additionally made.

  • PDF

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

A Study on Effectiveness Analysis of K2 system with Weapon's unit cost (무기체계 단위비용을 고려한 K2 체계의 효과분석 방법 연구)

  • Jung, Byungki
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.31-39
    • /
    • 2017
  • This paper analyses the effectiveness of Kill Chain (KC) and Korea Air and Missile Defense (KAMD), also known as the K2 systems, using monte carlo simulation. It is assumed that the K2 systems are consisted with unitary KC and multi-layered (upper-tier and lower-tier) KAMD. And each system has two or three arbitrary weapon systems and its combination makes 12 scenarios. Measures of effectiveness (MOE) of the K2 systems were defined as ratio of eliminated ballistic missiles from total threats. And total cost was calculated by number of weapon launched and its unit cost. MOE and total cost of the K2 systems were estimated using monte carlo simulation with a thousand iteration for each scenario. Cost-effectiveness analysis was performed and the best candidate was selected using fixed effectiveness approach. As a result, the performances of KC are prime factor that affects both effectiveness and total cost of the K2 systems. It is also, acquired proper level of lower-tier KAMD to achieve desired defense effectiveness. For future work, it needs to be performed cost-effectiveness analysis based on practical specification and life cycle cost of weapon systems.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Feasibility of Present Soil Remediation Technologies in KOREA for the Control of Contaminated Marine Sediment: Heavy Metals (우리나라 현존 토양정화 기술의 해양오염퇴적물 정화사업 적용 가능성 검토: 중금속)

  • Kim, Kyoung-Rean;Choi, Ki-Young;Kim, Suk-Hyun;Hong, Gi-Hoon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.32 no.12
    • /
    • pp.1076-1086
    • /
    • 2010
  • Soil remediation technologies were experimented to evaluate whether the technologies could be used to apply remediation of contaminated marine sediment. In this research, marine sediments were sampled at "Ulsan" and "Jinhae" where remediation projects are considered, and then the possibility of heavy metal removal was evaluated throughout the technologies. Heavy metal concentration of silt and clay fraction was higher than that of sand fraction at "Ulsan". Heavy metal removal of the silt and clay fraction was arsenic (As) 81.5%, mercury (Hg) 93.8% by particle separation, cadmium (Cd) 72.2%, mercury (Hg) 93.8% by soil washing technology, cadmium (Cd) 70.8%, lead (Pb) 65.6% by another soil washing technology. Based on experimental results, tested particle separation and soil washing technologies could be used to remove heavy metals of sand fraction and silt and clay fraction. Heavy metal removal by soil washing technology which was composed of separation, washing and physical or chemical reaction by additives such as acid, organic solvents was more effective comparing to that of particle separation. Since heavy metal concentration of all treated samples was suitable for national soil standards, all the tested technologies were could be used not only to remove heavy metals of marine contaminated sediment but also to reuse treated samples in land.

'90 영국 육군 장비 전시회(BAEE '90)

  • Min, Ga-Jin
    • Defense and Technology
    • /
    • no.12 s.142
    • /
    • pp.22-33
    • /
    • 1990
  • 금년 6월 3일부터 8일까지 영국 알더숏(Aldershot)에서 3백60여개의 영국 방산업체들의 열띤 참가속에 개최된 영국 육군 장비 전시회(BAEE '90)는 전 세계 84개국의 2만5천명을 상회하는 참관객들로 성황을 이루었다. 이번 전시회에서는 챌린저 1 주전차의 개량과 105미리 개량포, AS 90 자주포 등이 관심의 대상이었으며, 능동적 차량방어시스템과 기동장비들의 여러 개선사항들이 주목을 끌었다. 또한 영국 전자산업의 발전 동향도 알아볼수 있는 좋은 기회였다

  • PDF