• Title/Summary/Keyword: Countermeasure System

Search Result 659, Processing Time 0.036 seconds

An Overload Alleviation Countermeasure using New Line Outage Distribution Factor (새로운 선로사고분배계수 알고리즘을 이용한 과부하 해소대책)

  • Park, Kyu-Hong;Chung, Jai-Kil;Kang, Dong-Gu;Kim, Jung-Ha
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.588-590
    • /
    • 1995
  • This paper presents a new algorithm for the countermeasure to alleviate the line overloads in a power system. This method utilizes network sensitivity factors which are establised from DC load flow solutions. The line outage distribution factors(LODF) are formulated using changes in network power generations to simulate the outaged line from the network. The proposed algorithm has been validated in tests on a 6-bus test system.

  • PDF

Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone (홈트레이딩 시스템의 취약점 분석과 휴대전화 인증을 이용한 대응방안 제시)

  • Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.19-32
    • /
    • 2013
  • As cyber stock trading grows rapidly, stock trading using Home Trading System have been brisk recently. Home Trading System is a heavy-weight in the stock market, and the system has shown 75% and 40% market shares for KOSPI and KOSDAQ, respectively. However, since Home Trading System focuses on the convenience and the availability, it has some security problems. In this paper, we found that the authentication information in memory remains during the stock trading and we proposed its countermeasure through two-channel authentication using a mobile device such as a cell phone.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

Simulation of 2-color Concentric Annular Ring Reticle Seeker and Counter-countermeasure using LMS Algorithm (2-color 동심원 레티클 탐색기의 시뮬레이션 및 LMS 방법을 이용한 반대응능력)

  • 홍현기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.1990-1999
    • /
    • 2001
  • This paper presents a dynamic simulation loop that gives tracking results of 2-color concentric annular ring (CAR) reticle seeker. Our simulation tool includes the target/flare model and a proportional navigation guidance (PNG) loop. The CAR reticle system performances and the flare effects are analyzed in various scenarios. When a flare is present in the field of view (FOV), the simulation results show that the reticle seeker cannot keep a precise target tracking. In this paper, we propose 2-color counter-countermeasure (CCM) using the least mean square (LMS) method to cope with a presence of IR flare. The proposed method makes a simultaneous process in two infrared (IR) wavelength bands: MWIR add SWIR. The simulation results have shown that our adaptive IRCCM algorithm can achieve an effective cancellation of the flare signal with a relatively high intensity.

  • PDF

Vibration Reducing Method for High Pressure Feedwater Heater Drain Piping System (고압급수가열기 배수계통 배관계 고진동 해소방안 연구)

  • Lee, Wook-Ryun;Lee, Jun-Shin;Kim, Sang-Bok;Hong, Soon-Bup;Shin, Yong-Woo
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.1290-1295
    • /
    • 2006
  • The 120 meters high pressure feedwater heater drain piping in nuclear power plant had been suffered by excessive vibration from the beginning of power generation. As time goes by, the piping vibration was beyond the allowable limit and an appropriate countermeasure was required to prevent the fatigue failure of the pipeline from the abnormal vibration. In this study, the vibrational characteristics of high pressure feedwater heater drain piping and the countermeasure for abnormal vibration were investigated. Among the several vibration reduction methods, the piping layout changed by making the smooth pipeline was applied to the high Pressure feedwater heater drain piping in nuclear Power plant. Applying the countermeasure, the vibration level was found to reduce over 54 percents and was satisfied under the allowable velocity at the full-power operation condition.

  • PDF

Actual Conditions of Cyberbullying and the Countermeasure (사이버 괴롭힘의 실태와 대응방안)

  • Lim, Woon-sik;Choi, Hyun-sick
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • The purpose of this study is to find the exact state of cyberbullying and the countermeasure for it. cyberbullying is characterized by having the wideness, the anonymity and the intellectualization unlike the harassment of off-line. The result of this study, the cyberbullying is increased through the e-mail, cellular phone, and website around the teenagers. In particular, the cyberbullying has appeared mainly among the same age friends, it is proved that injurers inflict the harassment mainly at their own place and the ratio of the harassment by one self is higher than many. In addition, it is quite probable that the injurer-student who inflicts the harassment in off-line also can do it in on-line and to attack the cyberbullying is easy to find by the student who is indulged himself in internet use. Therefore, it is presented that the countermeasure in educational side and systematic side on this study. First on the educational side, there are presented the practice of the preventive education against the cyberbullying, expansion of the preventive schools for the cyber ethics and cyber crime and strengthening of the guideline for students in cyberspace. Second on the systematic side, there are presented the appointment of various committee, to strengthen the protection of damaged students, preparation of laws for cyberbullying, expansion of information office for internet addiction, improvement of the system for the school custodian and to extend the operating for cyber clearness school.

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

A Study on the Real Features of Harmonic Obstacle (고조파 장해의 진상에 관한 연구)

  • 이해기
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.162-171
    • /
    • 1998
  • This paper presents the harmonics obstacle analysis and countermeasure of electrical consumption a place. Harmonics that can be cosidered as a environmental pollution of the power systems become the cause of the accidents and damages. The responsibility of eliminating the harmonics firstly lies on the generating side. But the original characteristics of the system sush as the harmonic transfer characteristics and the impedance of the system affect each other in the process of the generation and transmission of the harmonic. Therefore it is very difficult to specify clearly the harmonic controlling responsibility, because electric machinery generating harmonics are various in the industrial fields. The output of a inverter has a high harmonic content. There are several ways of minimizing the output harmonic content. One way is to use pulse width modulation techniques within inverter. An alternative method is to combine a number of square-wave inverters. In this research, we measure the harmonic of the countermeasure of electrical consumption a place. The paper present the problem of new harmonic elimination method of PWM inverter fed induction motor system using W-FT series. In the future, the proposed PWM pattern by W-FT series is effective not only to the induction motor but also to the electromagnetic machine such as voltage reglator, UPS.

  • PDF

Analysis and Countermeasure of Lighting Fault on 765kV Transmission Lines (765kV 송전선로 낙뢰고장 분석 및 대책)

  • Min, Byeong-Wook;Lee, Sung-Hak;Kim, Ho-Ki;Kang, Yeon-Woog;Bang, Hang-Kwon;Park, Jae-Ung
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.337-338
    • /
    • 2008
  • KEPCO has built, for the first time in the world, 765㎸ double circuit transmission lines which use vertically arranged phase conductor, while 765㎸ transmission lines in other countries are single circuit lines and use horizontally arranged phase conductor. System operating voltage, switching overvoltage, and lightning overvoltage were considered in determining the air gap. Recently, however, lightning outage rate of some 765㎸ transmission lines in KOREA shows that it is more than what is expected. Lightning fault of 765㎸ transmission lines is mostly single phase grounding fault which can be reclosed. But it still needs to be carefully managed, for the bulk system like 765㎸ transmission lines have huge effects on whole power system. This paper introduces analysis and countermeasure of KEPCO's 765㎸ transmission line lightning outage.

  • PDF

A Study on Noise Control and Verification of High Pressure Steam System Using Experimental Method (실험적 방법을 이용한 고압증기 시스템의 방음설계 및 검증에 관한 연구)

  • Seok, H.I.;Lee, D.K.;Jeong, T.S.;Heo, J.H.
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2011.09a
    • /
    • pp.112-116
    • /
    • 2011
  • The noise analysis is usually carried out in the early structure design stage for the main areas in a vessel such as an accommodation, an engine room, HVAC System and etc. If the analysis results are higher than the noise limits based on guideline, appropriate countermeasures are established to reduce noise levels and applied to the vessel. But excessive noise induced the main or auxiliary equipment and high pressure steam system is very difficult to check in the initial design stage, and local noise problems frequently appear in actual vessels. This paper deals with excessive noise of the engine control room on LNG carrier. It includes the cause analysis of excessive noise, the countermeasure, and verification. Also, it proves suitability of the countermeasure through the on-board test.

  • PDF