• 제목/요약/키워드: Network Vulnerability

검색결과 416건 처리시간 0.026초

송전 계통 감시 시스템을 위한 취약도 평가 방법 개발 (Vulnerability Evaluation for Monitoring Wide Area Outage in Transmission Systems)

  • 김진환;임일형;이승재;최면송;임성일;김상태;진보건
    • 전기학회논문지
    • /
    • 제59권3호
    • /
    • pp.506-514
    • /
    • 2010
  • Defense systems are needed to prevent catastrophic failures of a power grid due to cascaded events. Cascaded events can be occurred by power flow overload. Especially, it is the most dangerous problem that overload line is outage, because it can make the power system face danger of cascaded. In this paper, vulnerability evaluation for monitoring wide are outage is proposed using by configuration information of transmission systems. This method of vulnerability evaluation is considered direct effect and indirect effect of power flow, especially overload. What is more, it can be used when the configuration of power system changes, as simple fault occurs or maintenance of facility. In the case studies, the estimation and simulation network have been testified and analysed in PSSE and C programming.

사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구 (A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA)

  • 장영천;강경란;최봉완
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

위험 전파 모형을 고려한 공급사슬의 구조적 취약성 평가 지표 설계 (Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation)

  • 문향기;신광섭
    • 한국전자거래학회지
    • /
    • 제20권2호
    • /
    • pp.125-140
    • /
    • 2015
  • 공급사슬에서 발생한 위험의 영향력은 위험이 발생한 영역에만 국한되는 것이 아니라 연결구조를 따라 네트워크 전체에 퍼지게 된다. 이러한 위험의 전파 현상으로 인해 공급사슬은 네트워크 연결 구조에 의해 위험의 영향을 받게 될 가능성이 달라진다. 따라서 공급사슬 네트워크를 설계하는 시점에 구조적 연결성을 고려하여 내외부 위험의 발생에 따른 비용을 최소화할 수 있어야 한다. 일반적으로 매개 중심성은 위험의 발생가능성과 영향력의 확산을 설명하는 지표로 해석할 수 있다. 본 연구에서는 구조적 취약성 관점에서의 재해석과 수정을 통해 서로 다른 공급사슬의 취약성을 정량적으로 비교하고, 보다 안정적인 네트워크 구조를 선택할 수 있는 방안을 제시한다.

제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계 (A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test)

  • 이명훈;손성용
    • 전기학회논문지
    • /
    • 제61권8호
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구 (A study on the risk of taking out specific information by VoIP sniffing technique)

  • 이동건;최웅철
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

스마트폰에서 mVoIP 취약성 분석 및 대응 방안 (mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone)

  • 조식완;장원준;이형우
    • 한국융합학회논문지
    • /
    • 제3권3호
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP 서비스는 IP 네트워크를 이용하여 모바일 장비에서 음성 정보를 보다 효율적으로 전송할 수 있는 기술이다. mVoIP 서비스는 적은 통신 비용으로도 다양한 부가서비스를 제공할 수 있으며, IP 기반 네트워크를 이용하여 효율성과 가용성을 높일 수 있는 방식이다. 또한 일반 사용자는 시간과 장소에 상관없이 모바일 장비에서 음성대화 서비스를 이용할 수 있다는 장점이 있다. 하지만, 모바일 장비에서의 SIP 프로토콜은 도청, DoS 공격 및 오작동, 스? 공격 등과 같은 다양한 공격과 위협에 노출되어 있어 많은 문제점으로 대두되고 있다. 이에 본 연구에서는 기존 mVoIP 서비스에 대한 위협과 취약성에 대해 분석하여 다양한 형태의 공격 시나리오를 도출하였다. 공격 시나리오에 대한 보안 취약성을 분석하여 보다 안전한 SIP 메커니즘을 제시하였으며 모바일 환경에서의 취약성을 제거할 수 있는 대응 방안을 제시하였다.

항공통신망에서의 보안 요구사항에 관한 연구 (The Study on the Security Requirement at Aeronautical Telecommunication Network)

  • 김도우;이성현;이덕규;한종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.628-631
    • /
    • 2008
  • 항공기가 비행을 위한 준비단계에서 목적지에 도착할 때까지 항공기를 안전하고 보다 경제적이고 효율적으로 운항하기 위해 항공기와 지상시설 사이, 지상시설과 지상시설 사이의 정보전달과 교환이 필요하다. 현재는 AFTN이라는 폐쇄망을 이용하여 통신이 이루어지고 있지만, 첨단 통신기술을 적용하여 차세대 항공통신망이 구축되어 운영될 예정이다. 이로 인하여 외부네트워크에 연결된 지상시설은 공격에 의한 보안 취약성을 가진다. 따라서 항공통신망에서의 안전한 운용환경 구축을 위한 취약성 분석 및 보안 요구사항 연구가 필요하다.

  • PDF

Groundwater pollution risk mapping using modified DRASTIC model in parts of Hail region of Saudi Arabia

  • Ahmed, Izrar;Nazzal, Yousef;Zaidi, Faisal
    • Environmental Engineering Research
    • /
    • 제23권1호
    • /
    • pp.84-91
    • /
    • 2018
  • The present study deals with the management of groundwater resources of an important agriculture track of north-western part of Saudi Arabia. Due to strategic importance of the area efforts have been made to estimate aquifer proneness to attenuate contamination. This includes determining hydrodynamic behavior of the groundwater system. The important parameters of any vulnerability model are geological formations in the region, depth to water levels, soil, rainfall, topography, vadose zone, the drainage network and hydraulic conductivity, land use, hydrochemical data, water discharge, etc. All these parameters have greater control and helps determining response of groundwater system to a possible contaminant threat. A widely used DRASTIC model helps integrate these data layers to estimate vulnerability indices using GIS environment. DRASTIC parameters were assigned appropriate ratings depending upon existing data range and a constant weight factor. Further, land-use pattern map of study area was integrated with vulnerability map to produce pollution risk map. A comparison of DRASTIC model was done with GOD and AVI vulnerability models. Model validation was done with $NO_3$, $SO_4$ and Cl concentrations. These maps help to assess the zones of potential risk of contamination to the groundwater resources.

중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로 (Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems)

  • 정재훈;김태성
    • 한국IT서비스학회지
    • /
    • 제21권5호
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

밭관개 시설물의 용수공급에 대한 취약성 평가 - 당진시, 예산군, 청양군을 대상으로 - (Vulnerability Evaluation for Water Supply of Irrigation Facilities: Focusing on Dangjin-si, Yesan-gun, Cheongyang-gun, South Korea)

  • 신형진;권형중;이재영;이진형;박찬기
    • 한국농공학회논문집
    • /
    • 제60권6호
    • /
    • pp.33-42
    • /
    • 2018
  • This study evaluated the vulnerability of irrigation water supplied to the crops. The target areas were selected as Dangjin-si, Yesan-gun, and Cheongyang-gun. The survey items of the climate exposure were annual precipitation and rainless days. The sensitivity survey items were cultivation area, groundwater level, evapotranspiration and groundwater consumption. The survey items of the adaptability were Number of groundwater well and Water supply ratio. The survey methods for these items were investigated in a variety of ways, including "National Climate Data Service System", "Korean Statistical Information Service", "National ground water monitoring network in korea annual report" and "Chungcheongnam-do Statistical Yearbook", "HOMWRS". Vulnerability assessment results were rated within the range of 0~100 points. The first grade was rated 0-25, the second grade 26-50, the third grade 51-75, and the fourth grade 76-100. And the lower the score, the lower the vulnerability. As a result, Cheongyang-gun showed a high vulnerability of over 50 points, Dangjin-si showed a low vulnerability rating of 31.20 points and a Yesan-gun of 36.00 points.