• Title/Summary/Keyword: Network Vulnerability

Search Result 419, Processing Time 0.029 seconds

Improvement of Handoff-state and QOS in Wireless Environment

  • Jeong, You-Sun;Choe, U-Gin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • In this paper, we propose for improving QoS in wireless micro cellular network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it bas its vulnerability in frequent handoff environment. On the other hand, Cellular IP combines the capability of cellular networks to provide high performance handoff and efficient location management of active and idle mobile users with the inherent flexibility, robustness and scalability found in IP networks. Also Cellular-IP/PRC use semi-soft handoff. During semi-soft hand off a mobile host may be in contact with either of the old and new base stations and receive packets from them. Packets intended to the mobile node are sent to both base stations and buffered, so when the mobile host eventually moves to the new location it can continue to receive packets without interruption. It should be suitable for realtime service such as multimedia traffic. But, much waste of resource will occur in this method, especially for non-real time services such as FTP and E-mail. Therefore, a new algorithm that performs different handoff according to characteristic of each traffic by use of reserved field in IP packet is proposed in this thesis. This hand off state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. Matlab simulation results are improving QoS, show call drop and call blocking provided to Paging Router Cache during handoff state machine in Cellular-IP/PRC.

Strategies of Building Disaster Resistant Communities -Focusing on Hebei Spirit Oil Spill Accident- (재난에 강한 지역공동체 형성 전략 -허베이 스피리트호 기름유출사고를 중심으로-)

  • Yang, Gi-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.249-256
    • /
    • 2009
  • The purpose of this study is to suggest the strategies of building disaster resistant communities to overcome communities destruction and vulnerability caused by the Hebei Spirit oil spill accident in Taean on December 7th, 2007. For accomplishing the purpose, we drew problems of approach based on context of community, governance strategy, and community-based approach. And based on the results of this analysis, suggestions were made as follows for building disaster resistant communities. First, when Hebei Spirit oil spill accident occurred we have been short of regional study and unreality of regional safety plan. For overcoming this points, we have need of activation of regional study and establishment of regional safety plan based on the bottom-up approach. Second, while the spill has brought a milestone activation of volunteer, we have not still efficient disaster management based on governance. So we have to establish network-governance to cooperate with government-business-private sector for efficient disaster management. Third, we argue that it is important to build social capital such as social networks, social contacts for community-based disaster resistant communities.

Calculation of Road Circuity Factors Considering Public Facilities and Road Condition in Rural Area (농촌지역의 공공시설 및 도로 상황을 반영한 도로 우회계수 산정)

  • Jeon, Jeongbae;Park, Meejeong;Yoon, Seongsoo;Suh, Kyo;Kim, Eunja
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.2
    • /
    • pp.55-65
    • /
    • 2017
  • This study is to estimate the circuity factors which can be used to assess for public facilities accessibility and analyze traffic in the area. We set the range of the administrative districts by Si Gun Gu unit and Eup Myeon Dong unit (more subdivided unit than Si Gun Gu unit). The average circuity factor in Si Gun Gu unit is 1.364 (maximum 2.953 and minimum 1.711). The region indicated the highest value of circuity factor is wando-gun in jeollanam-do, which area consists of 4 island and is connected to the bridges. Having to use the bridges for using public facilities hinders its accessibility. In the case of Eup Myeon Dong unit, the average circuity factor is 1.353 (maximum 2.950 and minimum 1.154). The region indicated the highest value of circuity factor is buksan-myeon in chuncheon-si, Gangwon-do. This region also has to use bridges for using public facilities because there is the largest lake, called Soyangho. This circuity factor is used to analyze the location of public facilities and assess vulnerability of accessibility. And also the factor can be applied to some policies, such as rural public service planning based on spatial big data.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

OTACUS: Parameter-Tampering Prevention Techniques using Clean URL (OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법)

  • Kim, Guiseok;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.55-64
    • /
    • 2014
  • In a Web application, you can pass without restrictions special network security devices such as IPS and F/W, URL parameter, which is an important element of communication between the client and the server, is forwarded to the Web server. Parameters are modulated by an attacker requests a URL, disclose confidential information or through e-commerce, can take financial gain. Vulnerability parameter manipulation thereof cannot be able to determine whether to operate in only determined logical application, blocked with Web Application Firewall. In this paper, I will present a technique OTACUS(One-Time Access Control URL System) to complement the shortcomings of the measures existing approaches. OTACUS can be effectively blocked the modulation of the POST or GET method parameters passed to the server by preventing the exposure of the URL to the attacker by using clean URL technique simplifies complex URL that contains the parameter. Performance test results of the actual implementation OTACUS proves that it is possible to show a stable operation of less than 3% increase in the load.

Estimation of Damage in Electric Power Networks due to High Power Electromagnetic Pulse (고출력 전자기파에 대한 전력망 피해 비용 산출)

  • Hyun, Se-Young;Du, Jin-Kyoung;Kim, Wooju;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.7
    • /
    • pp.757-766
    • /
    • 2014
  • In this paper, economic loss due to high power electromagnetic pulse is estimated and the methodology used for calculating its impacts is suggested using a macro approach. In order to investigate the most critical infrastructure for the high power electromagnetic pulse assault, the vulnerability assessment that provides information on the threats of concern is conducted. As a result, this study concentrates on the electric power networks. The presented assessment model is considered with gross domestic product (GDP) and energy consumption when the electric power networks are damaged due to high power electromagnetic pulse. In addition, economic losses are calculated by the extent of damages considering different types of the high power electromagnetic pulse assault generated by nuclear and man-made weapon. Through the estimation of these damages, the resulted economic loss will be compared with the protection cost. Consequently, protection of the vulnerable infrastructures can be prepared against electromagnetic pulse attack.

Scientific Basis of Environmental Health Contingency Planning for a Coastal Oil Spill (대규모 유류유출사고 대비 환경보건 대응계획 수립을 위한 기반연구)

  • Kim, Young-Min;Cheong, Hae-Kwan;Kim, Jong-Ho;Kim, Jong-Hun;Ko, Kum-Sook;Ha, Mi-Na
    • Journal of Preventive Medicine and Public Health
    • /
    • v.42 no.2
    • /
    • pp.73-81
    • /
    • 2009
  • Objectives : This study presents a scientific basis for the establishment of an environmental health contingency plan for dealing with accidental coastal oil spills and suggests some strategies for use in an environmental health emergency. Methods : We reviewed the existing literature, and analyzed the various fundamental factors involved in response strategies for oil spill. Our analysis included data derived from Hebei Spirit oil spill and used air dispersion modeling. Results : Spill amounts of more than 1,000 kl can affect the health of residents along the coast, especially those who belong to vulnerable groups. Almost 30% of South Korean population lives in the vicinity of the coast. The area that is at the highest risk for a spill and that has the greatest number of people at risk is the stretch of coastline from Busan to Tongyeong. The most prevalent types of oil spilt in Korean waters have been crude oil and bunker-C oil, both of which have relatively high specific gravity and contain volatile organic compounds, polycyclic aromatic hydrocarbons, and metals. In the case of a spill of more than 1,000 kl, it may be necessary to evacuate vulnerable and sensitive groups. Conclusions : The government should establish environmental health planning that considers the spill amount, the types of oil, and the distance between the spot of the accident and the coast, and should assemble a response team that includes environmental health specialists to prepare for the future oil spill.