• Title/Summary/Keyword: 위협요소

Search Result 754, Processing Time 0.025 seconds

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

Calcualtion of flood quantile considering climate change (기후변화를 고려한 청미천 유역의 미래 홍수량 산정)

  • Kim, Sang Ug
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.452-452
    • /
    • 2017
  • 지속가능한 물관리는 필요한 용수(생활 공업 농업 유지)를 안정적으로 공급하기 위한 이수측면과 홍수피해를 최소화하기 위한 치수측면을 포함한 수량관리와 맑은 물 공급, 친수환경 조성, 생태계 보존을 위한 수질환경관리로 구분된다. 지속가능한 물관리를 실현하기 위해서 필수적으로 분석되어야 할 과학적 요소는 물순환과 관련된 각종 인자들의 변동성이며, 물순환은 크게 인간의 할동으로 인한 변화요소와 기후적인 변화요소에 의해 급진적으로 또는 점진적으로 변화된다. 본 연구에서는 청미천 유역을 대상으로 하여 홍수에 관한 잠재적 위협요인의 분석을 위한 RCP 4.5 및 8.5 시나리오 극한강우 사상의 통계적 특성 분석, 기후변화 시나리오에 대한 가뭄예측을 위한 수문순환 모형을 구축 및 수문학적 가뭄의 분석, 미래 수질을 모델링을 위한 기초자료 수집 및 매개변수 보정과 같은 연구를 수행하였다. 특히 본 연구에서는 극한강우사상을 이용하여 청미천 유역에서 발생될 수 있는 확률홍수량을 정상성 및 비정상성 빈도분석을 이용하여 파악하였으며, 이를 활용하여 기후변화 시나리오가 고려된 청미천 유역에서의 홍수량을 분석하여 그 결과를 비교 분석하였다.

  • PDF

Decision tree based obesity and metabolic syndrome data classification and feature importance analysis (의사결정나무 기반 비만과 대사증후군 데이터 분류와 특징 중요도 분석)

  • Lee, Jongwook;Kim, Youngho;Baek, Byunghyun;Hwang, Doosung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.880-883
    • /
    • 2021
  • 비만은 다양한 합병증을 일으키는 위험요소로 현대인의 건강을 위협한다. 비만에 영향을 주는 요소들은 유전적 영향, 식습관, 신체활동 등이 연관된다. 비만 인구의 증가로 대사증후군의 발병률이 높아졌다. 대사증후군은 비만, 고지혈증과 고혈압 등의 여러 가지 성인병을 동반한다. 비만과 대사증후군 판별 요소 검출을 위한 개인의 신체 정보와 생활 정보 분석이 필요하다. 본 논문에서는 의사결정나무를 이용하여 비만과 대사증후군을 분류하고 분류 시 사용된 특징의 중요도 분석을 수행한다. 비만 분석 결과는 체중과 신장이 높은 특징 중요도를 나타냈으며 대사증후군은 HDL, 허리둘레, 혈압과 나이 등이 높은 특징 중요도를 보였다.

A Study on The Effects of Maritime Autonomous Surface Ships on the VTS Environment (자율운항선박이 VTS환경에 미치는 영향에 관한 연구)

  • Chul Son;Jihyun Oh;Jong-ik Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.25-25
    • /
    • 2023
  • 빅데이터, AI, 인공지능 등 기술이 발전함에 있어서 자율운항도입에 따른 VTS 체계변화에 대한 인식이 필요한 실정이다. 이 연구에서는 자율운항선박이 상용화함에 따라 요구되는 적합성을 제고하기 위해 영향을 미치는 내외적인 환경요인들을 전문가집단의 브레인스토밍, 설문조사, 인터뷰 등 다방면으로 조사하고, 해당 요소를 기반으로 TOWS분석을 통해 강점(Strength), 약점(Weakness), 기회(Opportunities), 위협(Threats)의 각 요소를 상호 결합해 전략주제 도출 및 새로운 관제절차와 관련 기술, 자율운항 교육프로그램, 사이버 보안조치, 자율운항 관련 알고리즘 구성 요소 등 구체적 실행계획을 제시함으로써 예측되는 변화 대응에 기여하고자 한다.

  • PDF

The Development of Vulnerable Elements and Assessment of Vulnerability of Maeul-soop Ecosystem in Korea (한국 마을숲 생태계 취약요소 발굴 및 취약성 평가)

  • Lim, Jeong-Cheol;Ryu, Tae-Bok;Ahn, Kyeong-Hwan;Choi, Byoung-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.4
    • /
    • pp.57-65
    • /
    • 2016
  • Maeul-soop(Village forest) is a key element of Korean traditional village landscape historically and culturally. However, a number of Maeul-soops have been lost or declined due to various influences since the modern age. For this Maeul-soop that has a variety of conservation values including historical, cultural and ecological ones, attention and efforts for a systematic conservation and restoration of Maeul-soop are needed. The purpose of the present study is to provide information on ecological restoration and sustainable use and management of Maeul-soops based on component plant species, habitat and location characteristics of 499 Maeul-soops spread throughout Korea. Major six categories of threat factors to Maeul-soop ecosystem were identified and the influence of each factor was evaluated. For the evaluation of weight by threat factors for the influence on the vulnerability of Maeul-soop ecosystem, more three-dimensional analysis was conducted using Analytic Hierarchy Process (AHP) analysis method. In the results of evaluation using AHP analysis method, reduction of area, among six categories, was spotted as the biggest threat to existence of Maeul-soops. Next, changes in topography and soil environment were considered as a threat factor of qualitative changes in Maeul-soop ecosystem. Influence of vegetation structure and its qualitative changes on the loss or decline of Masul-soop was evaluated to be lower than that of changes in habitat. Based on weight of each factor, the figures were converted with 100 points being the highest score and the evaluation of vulnerability of Maeul-soop was conducted with the converted figures. In the result of evaluation of vulnerability of Maeul-soops, grade III showed the highest frequency and a normal distribution was formed from low grade to high grade. 38 Maeul-soops were evaluated as grade I which showed high naturality and 10 Maeul-soops were evaluated as grade V as their maintenance was threatened. Also in the results of evaluation of vulnerability of each Maeul-soop, restoration of Maeul-soop's own area was found as top priority to guarantee the sustainability of Maeul-soops. It was confirmed that there was a need to prepare a national level ecological response strategy for each vulnerability factor of Maeul-soop, which was important national ecological resources.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Study on Material Fracture and Debris Dispersion Behavior via High Velocity Impact (고속충돌에 따른 재료 파괴 및 파편의 분산거동 연구)

  • Sakong, Jae;Woo, Sung-Choong;Kim, Jin-Young;Kim, Tae-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.11
    • /
    • pp.1065-1075
    • /
    • 2017
  • In this study, high velocity impact tests along with modeling of material behavior and numerical analyses were conducted to predict the dispersion behavior of the debris resulting from a high velocity impact fracture. For the impact tests, two different materials were employed for both the projectile and the target plate - the first setup employed aluminum alloy while the second employed steel. The projectile impacts the target plate with a velocity of approximately 1 km/s were enforced to generate the impact damages in the aluminum witness plate through the fracture debris. It was confirmed that, depending on the material employed, the debris dispersion behavior as well as the dispersion radii on the witness plate varied. A numerical analysis was conducted for the same impact test conditions. The smoothed particle hydrodynamics (SPH)-finite element (FE) coupled technique was then applied to model the fracture and damage upon the debris. The experimental and numerical results for the diameters of the perforation holes in the target plate and the debris dispersion radii on the witness plate were in agreement within a 5% error. In addition, the impact test using steel was found to be more threatening as proven by the larger debris dispersion radius.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

Comparison of Factors Influencing to Mobilization of Police to Crowd Gathering Occasion (다중운집행사 경찰동원에 영향을 미치는 요인 비교)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.643-649
    • /
    • 2017
  • This research is to compare factors which influence to mobilize police force necessary for crowd gathering occasions, and the purpose of this research is to prepare scientific basis for mobilization of police force by understanding order of priority of obstructive factors to mobilize police force for progressing safe crowd gathering occasions. Crowd gathering occasion has a characteristic that minor cause can lead to huge damage because many people concentrically gather at a specific place. In order to control these risks, it is necessary to analyze criteria on order of priority which can arouse risk to mobilize police force. In this research, I classified the factors influencing safety of crowd gathering occasion as internal risk factor, external risk factor and traffic safety threatening and set up the level of private security manpower and participants mobilized to crowd gathering occasion as independent variable and set up mobilized police force from 2013 to 2014 as dependent variable and analyzed it hierarchical analysis. From the result of analysis, the biggest influence to mobilization of police force for crown gathering occasion was the number of participants, and next self order-keeping agents and reason of mobilizing police force. Based on the result of analysis that the biggest factor to mobilize police force to crowd gathering occasion is the number of participants, it can be resulted that the number of participants influence to the risk of crowd gathering occasion.