• Title/Summary/Keyword: 초기 대응행위

Search Result 15, Processing Time 0.033 seconds

Application of Multi-Attribute Utility Analysis for the Decision Support of Countermeasures in Early Phase of a Nuclear Emergency (원자력 사고시 초기 비상대응 결정지원을 위한 다속성 효용 분석법의 적용)

  • Hwang, Won-Tae;Kim, Eun-Han;Suh, Kyung-Suk;Jeong, Hyo-Joon;Han, Moon-Hee;Lee, Chang-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.65-71
    • /
    • 2004
  • A multi-attribute utility analysis was investigated as a tool for the decision support of countermeasures in early phase of a nuclear accident. The utility function of attributes was assumed to be the second order polynomial expressions, and the weighting constant of attributes was determined using a swing weighting method. Because the main objective of this study focuses on the applicability of a multi-attribute utility analysis as a tool for the decision support of countermeasures in early phase of a nuclear accident, less quantifiable attributes were not included due to lack of information. In postulated accidental scenarios for the application of the designed methodology, the variation of the numerical values of total utility for the considered actions, e.g. sheltering, evacuation and no action, was investigated according to the variation of attributes. As a result, it was shown that the numerical values of total utility for the actions are distinctly different depending on the exposure dose and monetary value of dose. As increasing in both attributes, the rank of the numerical values of total utility increased for evacuation, which is more extreme action than for sheltering, while that of no action decreased. As expected probability of high dose is higher, the break-even values for the monetary value of dose, which are the monetary value of dose when the ranking of actions is changed, were lower. In audition, as aversion psychology for dose is higher, the break-even values for dose were lower.

Case of Implementation of Automatic Planning for SAF (SAF를 위한 자동계획기법 구현 사례)

  • Kim, Jungyoon;Choi, Daehoe;Lee, Sangjin;Jeong, Sunghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.171-180
    • /
    • 2014
  • Our Automatic Replanning enables simulation entities to execute goal oriented behavior planning by dynamic behavior linking. Existing methods especially in Semi-Automated Forces (SAF) are mainly executing strict plans which are given at initial stage, thus they are not effective to cope with contingencies especially in a human in the loop simulation where humans interrupt. Moreover, those usually suffer from explosion of behavior combination in attempt to describe all possible countermeasures, and such combinations may be prone to being inconsistent to the situations. Our method generates behavior sequence in which behavior are linked from the goal in the manner of back-propagation. Each behavior has tags of pre/post-conditions. The tags are linked dynamically according to a certain contingency. The method is being applied to a national defense research project to show feasibility.

A Study on the Formal Analysis of Safety Property of Security Models (보안모델의 안전성 분석에 관한 연구)

  • Kang, Mi-Young;Kim, Il-Gon;Choi, Jin-Young;Kang, In-Hye;Kang, Pil-Yong;Yi, Wan S.;Zegzhda, Dmitry P.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1233-1236
    • /
    • 2004
  • 보안 시스템에서 접근 통제 모델을 사용하는 가장 중요한 목적은 시스템 및 사용자에 대한 안정성을 보장하기 위해서이다. 본 논문에서 다루고 있는, SPR은 보안 시스템의 행위를 유한 상태 기계(FSM) 기반의 보안모델로 표현한 후, 보안 모델에 대한 초기 상태의 안전성을 검사하고 초기 상태에서 다음 상태로 전이가 존재할 경우에 그 상태들에 대응하는 모든 상태들에 대해서 보안기준을 만족하는지 검증하는 도구이다. 본 논문에서는 SPR를 사용하여 현재 많은 사람들이 이용하는 Windows 운영 체제의 NTFS에 기반을 둔 보안모델의 안전성을 검증하는 방법을 소개한다

  • PDF

Service Design for Using the Drones in the Early Stages Fires of Dense Residential Areas (주택가 밀집지역 화재발생 초기 드론 활용 서비스디자인 연구)

  • Youn, Gyo-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.111-121
    • /
    • 2019
  • Recently, through the services that use drones at fire sites to deliver on-site and road conditions into the situation room and life-saving activities or the deliveries of first aid outfits at the accident scenes that are inaccessible to humans, there are more and more cases of dealing with emergency situations. Therefore, by studying the service design using drones in the initial stage of response to fires in dense residential areas, this study was intended to reify the service design area of the response stage, including the dispatch of fire sites and the fire suppression. To do this, through literature researches, research directions were explored by examining the concept and process review of service design, and by analyzing the application cases using service design. In order examine the validity of this study, a one-on-one interview was conducted to identify the use and problems of drones among incumbent firefighters, and identified the applicability of drones to fire sites by targeting drone experts. Field research was conducted to identify the location and distance of road conditions, site conditions, and 119 safety centers, by making Yongsan-gu, the most vulnerable area to fire in Seoul, as a research sample. And, among the methodologies of service design, Persona and Customer Journey Map were prepared and Insight was derived, by using virtual scenarios for the experience values and behavior analyses of the interested parties. Through these processes, this researcher intended to present the fire-response service design and help establish the direction of service design in the initial stages of fire in Korea.

무인이동체 드론의 취약점분석 및 대응기술 연구 동향

  • Kim, Myoungsu;You, Ilsun;Yim, Kangbin
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.49-57
    • /
    • 2020
  • 군사 등의 특수 목적으로만 사용되었던 무인비행체 드론이 최근 상용 수준의 간결한 구조와 저가화가 가능해지면서 여러 제조업체를 통하여 민간분야의 다양한 응용에 활용 가능함을 증명하고 있다. 그러나 제조업체들 간의 시장 우위 선점을 위한 과열 경쟁으로 인하여 보안 안전성 검증 단계를 거치지 않은 드론과 이에 수반되는 애플리케이션이 시장에 바로 출시되면서 이들이 우리 사회를 향한 공격도구로 활용될 수 있다는 새로운 잠재적 위협이 우려되고 있다, 이와 관련하여 현재 드론과 애플리케이션과의 연결 및 데이터 통신 과정에서 완성도가 낮은 접근제어 기술이나 암호화되지 않은 통신방식을 비롯하여 드론 내부 소프트웨어의 코딩 상의 문제점 등에 의하여 다양한 취약점이 노출되고 있는 상태이다. 이러한 취약점들로 인하여 드론의 인증 해제 및 하이재킹을 통한 불법 영상촬영이나 개인정보의 유출 등을 비롯하여 특정 목표물을 향한 드론의 고의적 추락 등이 발생할 경우 재산 피해뿐만 아니라 인명 피해까지 발생할 수 있다. 특히, 현재의 드론 응용은 초기단계여서 향후 다양한 응용과 유관 기술들이 폭넓게 전개되어야 하는 시점에서 이러한 사고 가능성은 매우 심각하게 인식되어야 할 것이다. 더구나 제4차 산업혁명 시대의 드론은 비상시를 위한 다이나믹 모바일 게이트웨이 역할까지도 수행하여야 하는 환경에서 악의적인 행위는 전체 사회로 확산될 우려도 있으므로 미래 사회의 드론을 위한 안전문제는 매우 시급하고 중대하다고 할 수 있다. 이에 본 고에서는 현재까지 발표된 드론에 대한 다양한 보안위협을 조사하고 이러한 보안 위협을 요소별로 분류하여 정리하였다. 본 기고가 간단하게나마 정리한 내용을 통하여 다양한 보안위협에 대한 대응기술을 준비하기 위한 시발점이 되었으면 한다.

An Intrusion Alert Reduction Method for an Integrated Security Management System using Protected Domain Information (보호 도메인 정보를 이용한 통합 보안 관리 시스템의 침입경보 감소 기법)

  • Park, Yong-Cheol;Lee, Seong-Ho;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1835-1838
    • /
    • 2003
  • 주요 정보통신기반 시설에 대한 분산화되고 지능화되는 침해 행위 및 위협이 급속도록 증가하고 있다. 따라서 여러 보안 제품을 연동하여 해커의 침입 탐지, 차단, 대응 및 역 추적을 위한 통합 보안 관리의 필요성이 대두되고 있다. 그러나 통합 보안 관리의 특성상 다양한 보안 제품에서 전송된 이벤트와 침입 경보의 양이 많아 분석이 어려워 서버에 부담이 되고 있다. 본 연구에서는 이러한 문제를 해결하고자 보호 도메인 정보를 초기에 에이전트에 설정하여 침입경보 중복 발생을 감소시켰다. 도메인 정보를 이용한 침입경보 감소 기법은 개발중인 통합 보안 관리 시스템과 침입경보 연관성 연구를 위해 사용된다.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack (전투기 데이터 변조 공격행위에 대한 탐지모듈 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.5-16
    • /
    • 2019
  • Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.

A Study on the need of the Implementation for Criminal Penalty of Stalking (스토킹 처벌규정 도입의 필요성에 대한 고찰)

  • Jang, Jeongbeom;Lee, Sangcheol
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.220-228
    • /
    • 2014
  • A stalking is becoming more diverse and the methods are developing over time as the society has changed over time due to the advancement of information technology but an initial countermeasure seems to be difficult as there is no sufficient legislations against such crimes as stalking. Our country passed laws regulating such stalking at 1999 and four more additional bills were proposed until the 18th National Assembly but they failed to become legalized. Two more additional bills were proposed during 19th National Assembly which are still pending. Crimes such as stalking violates and invades physical and psychological freedom of the victims and the crimes are severely inveterate and intentional. Advanced countries such as the United States, the Great Britain, Germany, and Japan enacted legislations that strictly regulates stalking and also appropriate responses. As these exemplary cases show, it is essential that our country also requires an effective legislations against crime of stalking and protecting a victim of the crime.