• Title/Summary/Keyword: 취약화

Search Result 1,456, Processing Time 0.025 seconds

Fragility Assessment of Agricultural Facilities Subjected to Volcanic Ash Fall Hazards (농업시설물에 대한 화산재 취약도 평가)

  • Ham, Hee Jung;Choi, Seung Hun;Lee, Sungsu;Kim, Ho-Jeong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.493-500
    • /
    • 2014
  • This paper presents findings from the assessment of the volcanic ash fragility for multi-hazard resisting vinyl greenhouse and livestock shed among the agricultural facilities. The volcanic ash fragility was evaluated by using a combination of the FOSM (first-order second-moment) method, available statistics of volcanic load, facility specifications, and building code. In this study, the evaluated volcanic ash fragilities represent the conditional probability of failure of the agricultural facilities over the full range of volcanic ash loads. For the evaluation, 6 types(ie., 2 single span, 2 tree crop, and 2 double span types) of multi-hazard resisting vinyl greenhouses and 3 types(ie., standard, coast, and mountain types) of livestock sheds are considered. All volcanic ash fragilities estimated in this study were fitted by using parameters of the GEV(generalized extreme value) distribution function, and the obtained parameters were complied into a database to be used in future. The volcanic ash fragilities obtained in this study are planning to be used to evaluate risk by volcanic ash when Mt. Baekdu erupts.

A Study on Analysis of Open Source Analysis Tools in Web Service (오픈소스기반의 웹서비스 취약점 진단도구에 관한 분석)

  • Yoo, Jeong-Seok;Hong, Ji-Hoon;Jung, Jun-Kwon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.475-478
    • /
    • 2014
  • 최근 인터넷이 발전함에 따라 월드와이드웹(World Wide Web) 기반의 웹 서비스가 급격한 발전을 이루었다. 또한 이 웹 서비스를 바탕으로 다양한 컨텐츠들과 이를 이용하는 사용자의 수도 함께 증가하였다. 그러나 이와 같은 웹 서비스의 보편화가 증대될수록 이를 악용하려는 사이버 범죄 또한 비례하여 증가하고 있다. 최근에는 공격자들이 스마트폰을 대상으로 악성코드를 전파하기 위한 방법으로 웹 서비스를 활용하기 시작하면서 웹 서비스의 보안에 대한 중요성이 더욱 강조되고 있다. 이러한 웹 서비스 보안의 필요성을 인지하고, 많은 사람들이 무료로 쉽게 웹 서비스 보안취약점을 진단 할 수 있도록 여러 오픈소스 기반의 보안 취약점 진단도구가 연구, 개발되고 있다. 하지만 웹 서비스의 보안약점을 진단하는 도구의 적합성 평가 및 기능 분류가 명확하지 않아서 진단도구를 선택하고 활용함에 있어 어려움이 따른다. 본 논문에서는 OWASP에서 위험도에 따라 선정한 웹 서비스의 보안 취약점 Top 10 항목과 소프트웨어 보안약점 진단가이드 등을 통해 웹 서비스 보안 취약점을 진단하는 도구에 대한 분석 기준을 제시한다. 이후 오픈소스로 공개된 테스트 기반 취약점 탐지도구와 소스 기반 취약점 진단도구들에 대해 제시한 기준을 이용하여 분석한다. 본 논문의 분석결과로 웹 서비스의 안전성을 평가하기 위해 활용할 수 있는 진단 도구에 대한 분석정보를 제공함으로써 보다 안전한 웹 서비스의 개발과 운영에 기여할 것으로 기대한다.

System-Level Seismic Fragility Evaluation of Bridge Considering Aging Effects (노후도를 고려한 교량의 시스템-수준 지진취약도 평가)

  • Kong, Sina;Moon, Jiho;Song, Jong-Keol
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.35 no.3
    • /
    • pp.149-158
    • /
    • 2022
  • As a bridge ages, its mechanical properties and structural performance deteriorate, degrading its seismic performance during a strong earthquake. In this study, the aging of piers and bridge bearings was quantified in several stages and reflected in the analysis model, enabling the evaluation of the member-level seismic fragility of these bearings. Moreover, by assuming that the failure mechanism of a bridge system is a series system, a method for evaluating the system-level seismic fragility based on the member-level seismic fragility analysis result is formulated and proposed. For piers with rubber and lead-rubber bearings (members vulnerable to aging effects), five quantitative degrees of aging (0, 5, 10, 25, and 40%) are assumed to evaluate the member-level seismic fragility. Then, based on the result, the system-level seismic fragility evaluation was implemented. The pier rather than the bridge bearing is observed to have a dominant effect on the system-level seismic fragility. This means that the seismic fragility of more vulnerable structural members has a dominant influence on the seismic fragility of the entire bridge system.

Data Anonymity Decision (데이터 익명화 결정 기법)

  • Jung, Min-Kyoung;Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.173-180
    • /
    • 2010
  • The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before being opened in terms of the improvement of data utilization as well as the privacy protection. It is also important to check to which attack the table is vulnerable and which of anonymity methods should be applied in the table. This paper describe two possible privacy attacks based upon related references. Also, we suggest the technique to check whether data table is vulnerable to any attack of them and describe what kind of anonymity methods should be done in the table. The technique we suggest in this paper can also be applied for checking the safety of anonymity tables in which insert or delete operations occurred as well from privacy attacks.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

Review of Soil Vulnerability Assessment Tools in Korea and other developed countries (국내외 토양 취약성 평가 연구 동향)

  • Ki, Seo Jin;Kim, Kyoung-Ho;Lee, Hyeon Gyu;Shin, Kyung Hee
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.39 no.12
    • /
    • pp.741-749
    • /
    • 2017
  • This study aims to provide the technical considerations and implications for the development of soil vulnerability assesment tool based on the review of existing tools and case studies applied both domestically and internationally. For this study, we specifically investigated the basic theories and major features implemented in the screening models abroad. In contrast, one case study of prioritizing the vulnerable districts was presented to identify the research trends in Korea. Our literature review suggested that the characteristic of target areas and contaminants needed to be properly incorporated into soil vulnerability assessment because the current tools in Korea neglected these properties which prevented this tool from being used as a correct measure of soil management and prevention. We also reached the conclusion that in terms of technical aspect, the soil vulnerability assessment tool should be developed based on the physical theory and environmental data that were varied over space and time so that the end-users were able to readily and effectively screen soil vulnerability over large areas. In parallel with technical improvement, great effort needed to be devoted to develop an integrated environmental information system that increased the availability of data and shared various types of environmental data through enhanced multi-agency collaboration.

Financial Intermediation and the Post-Crisis Financial System with Implications for Korea (위기 이후 금융중개와 금융제도 변천 및 한국에 대한 시사점)

  • Shin, Hyun Song
    • KDI Journal of Economic Policy
    • /
    • v.32 no.1
    • /
    • pp.1-26
    • /
    • 2010
  • Securitization was meant to disperse credit risk to those who were better able to bear it. In practice, securitization appears to have concentrated the risks in the financial intermediary sector itself. This paper outlines an accounting framework for the financial system for assessing the impact of securitization on financial stability. If securitization leads to the lengthening of intermediation chains, then risks become concentrated in the intermediary sector with damaging consequences for financial stability. Covered bonds are one form of securitization that do not fall foul of this principle. I discuss the role of countercyclial capital requirements and the Spanish-style statistical provisioning in mitigating the harmful effects of lengthening intermediation chains. For Korea, the stability of funding emerges as a key consideration. Covered bonds may play a role in stabilizing the funding arrangement for banks.

  • PDF

Structural Analysis and Derivation of Vulnerability for BlockChain based System (블록체인 기반 시스템의 구조적 분석과 취약점 도출)

  • Kim, Jang-Hwan
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.115-121
    • /
    • 2019
  • I analyzed the structure of a block-chain system and a block-chain-based service system. It is a decentralized book encryption system software technology that does not require a third party to secure trust between the two parties. Block chains are structured in a linked list structure. The block chain manage transaction information by blocking the transaction information, in conjunction with other blocks. As a result, I have discovered structural weaknesses in current block-chain systems and block-chain-based service systems. Once these possible structural problems are resolved, I expect that the block-chain-based service system will make various industrial contributions.

Effect of Velocity-Pulse-Like Ground Motions on Seismic Fragility of Bridges (교량의 지진취약도에 대한 속도 펄스를 가진 지반운동의 영향)

  • Yeeun Kim;Sina Kong;Sinith Kung;Jiho Moon;Jong-Keol Song
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.2
    • /
    • pp.119-131
    • /
    • 2024
  • Pulse-like ground motion can cause greater damage to structures than nonpulse-like ground motion. Currently, much research is being conducted to determine the presence or absence of velocity pulses and to quantify them from seismic-acceleration records. Existing ground motion is divided into far-field (FF) and near-fault ground motion, based on the distance of the measurement point from the fault. Near-fault ground motion is further classified into near-fault pulse-like (NFP) and near-fault nonpulse-like (NFNP) ground motion by quantifying the presence or absence of velocity pulses. For each ground motion group, 40 FF, 40 NFP, and 40 NFNP ground motions are selected; thus, 120 ground motions are used in the seismic analysis to assess the seismic fragility of sample bridges. Probabilistic seismic demand models (PSDMs) are created by evaluating the seismic responses of two types of sample bridges with lead-rubber and elastomeric rubber bearings using three groups of ground motions. Seismic fragility analysis is performed using the PSDM, and from these results, the effect of the presence or absence of seismic velocity pulses on the seismic fragility is evaluated. From the comparison results of the seismic fragility curve, the seismic fragility of NFP ground motion appears to be approximately three to five times greater than that of NFNP ground motion, according to the presence or absence of a velocity pulse of seismic waves. This means that the damage to the bridge is greater in the case of NFP ground motion than that in the case of NFNP ground motion.

Implementation of Location Tracking System of Wireless Access Point based PDA (PDA기반 무선 AP의 위치 탐색 시스템 구현)

  • Park, Ju-Pyung;Hong, Jin-Keun;Han, Kun-Hee;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.952-957
    • /
    • 2008
  • In this paper, explain about collect that Access Point signal and Implementation of Location Tracking System of Wireless Access Point based PDA. Collect Access point signal in PDA then Signal transmits by computer so Computer is analyze collected signal and is seen on picture. we show the Present problem of wireless LAN and position feeler algorithm through this writing paper.