• Title/Summary/Keyword: Danger Information

Search Result 381, Processing Time 0.021 seconds

A Study on Generating a Coastal Flood Hazard Map Using GIS (GIS를 활용한 연안침수지도 제작에 관한 연구)

  • Won, Dea-Hee;Kim, Kye-Hyun;Park, Tae-Og;Choi, Hyun-Woo;Kwak, Tae-Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.12 no.1 s.28
    • /
    • pp.69-77
    • /
    • 2004
  • Since there are a lot of changes in climate on domestic and natural disasters owing to the disturbance-development of the land, damages of properties and human life frequently occur due to the coastal floodings. Accordingly, it is necessary to find the area where the danger of flooding coasts is relatively high and to inform resident the characteristics of the area As a part of preventive land management to minimize the flooding damages of the coastal area, this study suggested the generation of the coastal flood hazard map that provides detailed information such as refuge path, a place of refuge, and the location of medical supplies, food, and main rescue equipment, etc. This study selected the southern region of Daebu-do as an exemplary area, conducted a document study to establish GIS data, secured pre-structured data, and suggested the method of establishing GIS data fit to the study area. In particular, it emphasized the efficient construction of the geographical spatial data that were accurate, economic, objective, and realistic in supporting the modeling to predict the flooding zone. The specific type of established database was divided into flooding risk area, flooding warning area, and flooding-volume area. The prototype of coastal flood hazard map can be widely used for efficient disaster management. Furthermore, it is considered that the map could be applied for arousing residents' attentions to the flooding, prior education, and local governments' management actions against the danger of flooding.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Solution for Improvement in the Accumulation of Disaster Occurrence Data for Steep Slope Area (급경사지 재해발생이력자료 구축방안)

  • Kim, Sung-Wook;Choi, Eun-Kyeong;Lee, Oh;Park, Dug-Keun;Oh, Jeong-Rim
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.891-894
    • /
    • 2010
  • Steep slope disasters accompany economic loss along with casualties, so the evaluation and the systematic management on the regions with slope collapse danger are required. A lot of manpower, time, and economic cost are needed to accumulate disaster history of steep slope areas by the national and small-sized region. As the method for this, it construed location data about each area with disaster occurrence by maknd elocation data of collapsed steep areas through high-resolution satellite image and collectnd edata on the regions with disasters through media and literature data such as a disaster annual report and a disaster comprehensive report. The study selected three shortest routes includnd ethe area with disaster in Jeolla province on literature and the collapsed area found by the image data, and constructed the results of the field survey as database.

  • PDF

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

  • Choi, Sang-Yong;Kim, Daehyeok;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.422-435
    • /
    • 2016
  • Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today's cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribution. Researchers have proposed various methods for detecting a drive-by download attack effectively. However, existing methods have limitations against recent evasion techniques, including JavaScript obfuscation, hiding, and dynamic code evaluation. In this paper, we propose an emulation-based malicious webpage detection method. Based on our study on the limitations of the existing methods and the state-of-the-art evasion techniques, we will introduce four features that can detect malware distribution networks and we applied them to the proposed method. Our performance evaluation using a URL scan engine provided by VirusTotal shows that the proposed method detects malicious webpages more precisely than existing solutions.

A Survey on Children's Magazines in Korea (최근발간된 한국 어린이 잡지의 분석)

  • Kim Hyo-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.3
    • /
    • pp.103-123
    • /
    • 1973
  • The magazine in mordern society is a powerful mass-media. Children are generally interested in magazines, which are relatively in expensive, readily and reguarly, and easy to read. The research chose 5 children's magazines published in Korea in 1973 for close analysis. The Sonyon (Youth) was found to be closer to a pure literary reading for children; the Sae Sonyon (New youth) and Sonyonsegeh (World of the youth) were purposes oriented toward popular amusement purposes carrying a great number of catoons; the Sonyon Chungang (Chungang youth) carried too many advertisements; and the Okae Dong Mu (Rear group) was rather weak in contents in fine contrast with its colourful appearance. The following characteristics were generalized from analysis of the five children's magazines published in Korea: (1) The function of periodic information dissemination was very weak, feared in danger of being wiped out. : (2) The educative and guidance function was found rather weak. (3) Economic motives seemed stronger in spite of the expressed zeal for missions of magazine. (4) In terms of contents variety was lackey, with little individuality for each magazine. (5) Generally emphasis was given to pictoral contents rather than to reading articles.

  • PDF

Countermeasure of Mobile App tamper attack (모바일 앱 위·변조 공격 및 대응방안)

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Recently range of use also being increase along with smart phone users growing. And keep pace with hacking technician is increasing inter alia tamper technician has issued. This technician infringe integrity on three element of security of data. In this case reliability has deteriorated, the app itself has increased danger, and it's value has reduced. This can affect like take information even though don't have any authority to information or hemorrhage at large in this country. In other words, I has been arranged tamper's definition to.

  • PDF

Perspective on Bioterrorism in the United States (미국의 생물테러대책에 관한 고찰)

  • Kang, Young-gil;Kwon, Jeong- hoon
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.10-27
    • /
    • 2009
  • The fear briefly became reality in the U.S. after 9/11, as man-made anthrax spores were found in letters and in east coast post offices on a number of occasions. Anthrax attacks must be related to the terrorist attacks of September 11. These two accidents changed the situation completely. Characteristics are summarized as belows. First, it is necessary for all countries to create each own appropriate countermeasures against bioterrorism. In addition, it is urgent to consider countermeasures focusing on bioterror characteristics that terrorists may use biological agents because they can be extremely difficult to detect and do not cause illness for several hours to several days. Otherwise, those attacks will also show the panic and very real danger posed by the release of such toxins on an unsuspecting public. Second, it is crucial to manage the result thoroughly. A biological weapon is useful to a terrorist group mainly as a method of creating mass panic and disruption to a society. Because it is not easy to predict and collect information about how terrorists utilize pathogenic microbe as well as terror measures in their activities, more realistic approach should be taken to reduce damage. Third, to expand investment in research and development is necessary. Considering advances in microbiology and genetic engineering lately, it is likely that new pathogenic microbe would be created by the enemy. For that matter, it is imperative that medical countermeasures should be devised.

  • PDF

A study and design of monitoring module for schoolzone safety (스쿨존 안전관리를 위한 감시모듈 연구 및 설계)

  • Park, Sang-Joon;Lee, Jong-Chan;Jang, Dea-Sic;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1940-1946
    • /
    • 2011
  • In this paper, we propose a method of schoolzone safety to the protection and management of accident and crime of school circumstance that it is increased recently. Hence, sensor network based intelligent monitoring module must be considered for schoolzone safety. It is not simple CCTV monitoring, but it means that the ability extension is proposed to monitor the dangerous situation for the risk management. Hence, this paper proposes the design of monitoring module considering various danger situations that can be occurred around the school.

A Study on the Revitalization Ubiquitous Information Technology for the Disaster Management (재난관리를 위한 유비쿼터스 정보기술 활성화 방안)

  • Chae, Jin;Song, Yong-Sun
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.24-31
    • /
    • 2009
  • The Environment of disaster has more complicated, diversified and unpredicted sides, which causes extensive damage to humankind. Above all, presently the climatic change causes worldwide disaster of nature like cataclysm, intense heat, drought, earthquake and hard winter. After 9.11, most of countries continuously try to protect their own compatriots' life and property which forms the social safety net as well. This research investigates the current system used by the firerenation which is the national disaster response agency.ict also suggests the unation whiih is the nasystem unationdisaster mthe nasys accundihg to tionld el of disaster like the constructe naof DB, disaster cycld repunt, analysis of danger, facilities ih is ation system, disaster media system, location search system, disaster damage collection system.

A Case study f i-PIN Service for Information Security (보안성 강화를 위한 i-PIN 서비스 적용 사례 연구)

  • Kim, Hyunjoo;Lee, Soojong
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Personal registration number has been used as a means of personal identification on existing internet. However, its use on internet sites has become a major factor increasing danger of leaking of personal information. Presently, the government recommends i-PIN to minimize the collection of personal registration numbers and leaking of personal information on internet. Original purpose of i-PIN is to recognize persons by its virtual number of 13 digits instead of using personal registration number on internet websites. These days, i-PIN continues to be used increasingly as a form of certification. This study seeks to explore software service methodology of using i-PIN as a form of certification on internet websites and examples in which its other forms of self certification are used than existing i-PIN services.

  • PDF