• 제목/요약/키워드: Nuclear security

검색결과 391건 처리시간 0.026초

발전 제어시스템의 융합보안 연구 (A Study on Convergence Security of Power Generation Control System)

  • 이대성
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.93-98
    • /
    • 2018
  • 한국수력원자력, 한국전력공사, 한국남동발전 등의 발전 제어시스템은 전력을 공급하는 국가의 주요 인프라 시설로 악의적인 해킹 공격이 진행될 경우 그 피해는 상상을 초월한다. 실제로 한국수력원자력은 해킹 공격을 당하여 내부정보가 유출되는 등 사회적인 큰 문제를 야기하였다. 본 연구에서는 최근 이슈가 되고 있는 융합보안 연구에 대해 전력회사 중심의 발전 제어시스템을 대상으로 그 환경을 분석하고, 현황을 분석하여 다양한 발전 제어시스템의 안정화를 위한 전략체계 수립과 대응책을 제시하고자 한다. 다양한 물리적 보안시스템(시설), IT 보안시스템, 출입통제시스템 등에서 나오는 데이터 형태를 정규화하고 통합하여 융합인증을 통해 전체 시스템을 통제하고, 융합관제를 통해 위험을 탐지하는 방법을 제안한다.

  • PDF

원전 적용을 위한 네트워크 기반 취약점 스캐너의 비교 분석 (Comparative Analysis of Network-based Vulnerability Scanner for application in Nuclear Power Plants)

  • 임수창;김도연
    • 한국정보통신학회논문지
    • /
    • 제22권10호
    • /
    • pp.1392-1397
    • /
    • 2018
  • 원자력 발전소는 주요 국가에서 관리하는 핵심 시설로 보호되고 있으며, 원자력 발전소의 설비들에 일반적인 IT 기술을 적용하여 기존에 설치된 아날로그 방식의 운용자원을 제외한 나머지 자산에 대해 디지털화된 자원을 활용하는 비중이 높아지고 있다. 네트워크를 사용하여 원전의 IT자산을 제어하는 것은 상당한 이점을 제공할 수 있지만 기존 IT자원이 지닌 잠정적인 보안 취약점(Vulnerability)으로 인해 원자력 시설 전반을 위협하는 중대한 사이버 보안 침해사고를 야기할 수 있다. 이에 본 논문에서는 원전 사이버 보안 취약점 규제 요건과 기존 취약점 스캐너의 특징 및 이들이 지닌 요건들을 분석하였고, 상용 및 무료 취약점 스캐너를 조사 하였다. 제안된 적용 방안을 바탕으로 취약점 스캐너를 원전에 적용할 시 원전의 네트워크 보안 취약점 점검 효율성을 향상시킬 수 있을 것으로 판단된다.

Measurement of missing video frames in NPP control room monitoring system using Kalman filter

  • Mrityunjay Chaubey;Lalit Kumar Singh;Manjari Gupta
    • Nuclear Engineering and Technology
    • /
    • 제55권1호
    • /
    • pp.37-44
    • /
    • 2023
  • Using the Kalman filtering technique, we propose a novel method for estimating the missing video frames to monitor the activities inside the control room of a nuclear power plant (NPP). The purpose of this study is to reinforce the existing security and safety procedures in the control room of an NPP. The NPP control room serves as the nervous system of the plant, with instrumentation and control systems used to monitor and control critical plant parameters. Because the safety and security of the NPP control room are critical, it must be monitored closely by security cameras in order to assess and reduce the onset of any incidents and accidents that could adversely impact the safety of the NPP. However, for a variety of technical and administrative reasons, continuous monitoring may be interrupted. Because of the interruption, one or more frames of the video may be distorted or missing, making it difficult to identify the activity during this time period. This could endanger overall safety. The demonstrated Kalman filter model estimates the value of the missing frame pixel-by-pixel using information from the frame that occurred in the video sequence before it and the frame that will occur in the video sequence after it. The results of the experiment provide evidence of the effectiveness of the algorithm.

Application of peak based-Bayesian statistical method for isotope identification and categorization of depleted, natural and low enriched uranium measured by LaBr3:Ce scintillation detector

  • Haluk Yucel;Selin Saatci Tuzuner;Charles Massey
    • Nuclear Engineering and Technology
    • /
    • 제55권10호
    • /
    • pp.3913-3923
    • /
    • 2023
  • Todays, medium energy resolution detectors are preferably used in radioisotope identification devices(RID) in nuclear and radioactive material categorization. However, there is still a need to develop or enhance « automated identifiers » for the useful RID algorithms. To decide whether any material is SNM or NORM, a key parameter is the better energy resolution of the detector. Although masking, shielding and gain shift/stabilization and other affecting parameters on site are also important for successful operations, the suitability of the RID algorithm is also a critical point to enhance the identification reliability while extracting the features from the spectral analysis. In this study, a RID algorithm based on Bayesian statistical method has been modified for medium energy resolution detectors and applied to the uranium gamma-ray spectra taken by a LaBr3:Ce detector. The present Bayesian RID algorithm covers up to 2000 keV energy range. It uses the peak centroids, the peak areas from the measured gamma-ray spectra. The extraction features are derived from the peak-based Bayesian classifiers to estimate a posterior probability for each isotope in the ANSI library. The program operations were tested under a MATLAB platform. The present peak based Bayesian RID algorithm was validated by using single isotopes(241Am, 57Co, 137Cs, 54Mn, 60Co), and then applied to five standard nuclear materials(0.32-4.51% at.235U), as well as natural U- and Th-ores. The ID performance of the RID algorithm was quantified in terms of F-score for each isotope. The posterior probability is calculated to be 54.5-74.4% for 238U and 4.7-10.5% for 235U in EC-NRM171 uranium materials. For the case of the more complex gamma-ray spectra from CRMs, the total scoring (ST) method was preferred for its ID performance evaluation. It was shown that the present peak based Bayesian RID algorithm can be applied to identify 235U and 238U isotopes in LEU or natural U-Th samples if a medium energy resolution detector is was in the measurements.

기계경비시스템의 변화와 시장전망 (The Trends of Electronic Security System and Prospects of Security Market)

  • 정태황
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

중국의 다극화 전략이 한반도 안보에 미치는 영향 (The influence of Chinese multi-polarization strategy on the security of Korean peninsula)

  • 최경식
    • 안보군사학연구
    • /
    • 통권4호
    • /
    • pp.241-287
    • /
    • 2006
  • 16th CPC National Party Congress established multi-polarization strategy as an external strategy, and 'The Great Reinvigoration of Chinese Nation' as the aim of The Great Strategy of China. It is required to maintain stabilized and peaceful surrounding circumstance in order to make it possible. The ideal surrounding circumstance that China is aiming for is to achieve multi-polarization of international society while maintaining strategic deterrence. Multi-polarization now in 'One super Multi powers' is that 'Multi powers' deter 'One super' to prevent predominance of USA and to decentralize the power. China wishes to realign international order as it accomplishes multi-polarization. China who wants 'Peace and Stabilization' emphasizes autonomy, peace and unification of Korean peninsula. Autonomy means the restraint intervention of foreign power, that is, American influence in Korean peninsula. Multi-polarization strategy of China will be used in Korean peninsula to solve nuclear issue of North Korea, to support neutral unification and to keep balance of power with USA, Japan and Russia as it renders economic advantages to South Korea and security engagement to North Korea, based on special geographical, cultural and historical relationship with two Koreas. The nuclear issue of North Korea will be a stage to test multi-polarization of China. When it deduces positive solution of nuclear issue due to successful six-party talks, and advances to security talks of Northeast Asia, it will contribute a lot to power and elevation of national stature of China in international society. Thus, the Chinese strategy will be an accommodative condition for the security of South Korea, and it requires wise decision of South Korea to make hay while the sun shine.

  • PDF

해외 동향 - 원전의 빅 데이터(Big Data) 활용

  • 한국원자력산업회의
    • 원자력산업
    • /
    • 제35권4호
    • /
    • pp.63-64
    • /
    • 2015
  • 국제원자력안전연구소(WINS : World Institute for Nuclear Security)가 내놓은 최신 보고서는 원전 분야에서도 빅 데이터 기반의 통합적 데이터 관리와 분석의 도입을 진지하게 고려할 것을 권고하고 있다.

  • PDF