• Title/Summary/Keyword: Scenario tree method

Search Result 26, Processing Time 0.026 seconds

A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability (네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구)

  • Eom, Jung Ho;Park, Seon Ho;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.49-57
    • /
    • 2010
  • We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

An Optimal Installation Strategy for Allocating Energy Storage Systems and Probabilistic-Based Distributed Generation in Active Distribution Networks

  • Sattarpour, Tohid;Tousi, Behrouz
    • Transactions on Electrical and Electronic Materials
    • /
    • v.18 no.6
    • /
    • pp.350-358
    • /
    • 2017
  • Recently, owing to increased interest in low-carbon energy supplies, renewable energy sources such as photovoltaics and wind turbines in distribution networks have received considerable attention for generating clean and unlimited energy. The presence of energy storage systems (ESSs) in the promising field of active distribution networks (ADNs) would have direct impact on power system problems such as encountered in probabilistic distributed generation (DG) model studies. Hence, the optimal procedure is offered herein, in which the simultaneous placement of an ESS, photovoltaic-based DG, and wind turbine-based DG in an ADN is taken into account. The main goal of this paper is to maximize the net present value of the loss reduction benefit by considering the price of electricity for each load state. The proposed framework consists of a scenario tree method for covering the existing uncertainties in the distribution network's load demand as well as DG. The collected results verify the considerable effect of concurrent installation of probabilistic DG models and an ESS in defining the optimum site of DG and the ESS and they demonstrate that the optimum operation of an ESS in the ADN is consequently related to the highest value of the loss reduction benefit in long-term planning as well. The results obtained are encouraging.

TREE FORM CLASSIFICATION OF OWNER PAYMENT BEHAVIOUR

  • Hanh Tran;David G. Carmichael;Maria C. A. Balatbat
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.526-533
    • /
    • 2011
  • Contracting is said to be a high-risk business, and a common cause of business failure is related to cash management. A contractor's financial viability depends heavily on how actual payments from an owner deviate from those defined in the contract. The paper presents a method for contractors to evaluate the punctuality and fullness of owner payments based on historical behaviour. It does this by classifying owners according to their late and incomplete payment practices. A payment profile of an owner, in the form of aging claims submitted by the contractor, is used as a basis for the method's development. Regression trees are constructed based on three predictor variables, namely, the average time to payment following a claim, the total amount ending up being paid within a certain period and the level of variability in claim response times. The Tree package in the publicly available R program is used for building the trees. The analysis is particularly useful for contractors at the pre-tendering stage, when contractors predict the likely payment scenario in an upcoming project. Based on the method, the contractor can decide whether to tender or not tender, or adjust its financial preparations accordingly. The paper is a contribution in risk management applied to claim and dispute resolution practice. It is argued that by contractors having a better understanding of owner payment behaviour, fewer disputes and contractor business failures will occur.

  • PDF

A Review of HAZID/Bowtie Methodology and its Improvement (해지드/보우타이 기법의 한계와 개선에 대하여)

  • Kim, Sung-Hoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.3
    • /
    • pp.164-172
    • /
    • 2022
  • A HAZID is a brainstorming workshop to identify hazards in an early phase of a project. It should be flexible to capture all probable accidents allowing experienced participants to exploit their expertise and experiences. A bowtie analysis is a graphical representation of major accident hazards elaborating safety measures i.e. barriers. The result of these workshops should be documented in an organized manner to share as good as possible details of the discussion through the lifetime of the project. Currently results are documented using a three-step representation of an accident; causes, top event and consequences, which cannot capture correctly sequence of events leading to various accidents and roles of barrier between two events. Another problem is that barriers would be shown repeatedly leading to a misunderstanding that there are an enough number of safety measures. A new bowtie analysis method is proposed to describe an accident in multiple steps showing relations among causes or consequences. With causes and consequences shown in a format of a tree, the frequencies of having the top event (Fault tree analysis) and various consequences (Event tree analysis) are evaluated automatically based on the frequency of initiating causes and the probabilities of failure of barriers. It will provide a good description of the accident scenario and help the risk to be assessed transparently.

Consequence Analysis of Gas Explosion in LPG Vessel Retail Store Which is Located around Apartment Complex (LPG 판매소에서 가스 폭발이 주위 아파트에 미치는 영향 평가)

  • Lee Su-Kyung;Bae Young-Bum;Oh Jeong-Gyu
    • Journal of the Korean Institute of Gas
    • /
    • v.10 no.3 s.32
    • /
    • pp.48-53
    • /
    • 2006
  • In case of fire and explosion which resulted from LP gas release of LPG vessel retail store, the populated area such as apartment complex is supposed to be damaged either partially or totally. To estimate the damage of LP gas explosion, we conducted quantitative risk analysis procedure as has been recommended by AIChE/CCPS. For incident scenario selection, event tree analysis was proposed. TNT equivalent method, SAFER Trace v.8.0 and probit model were also used for consequence analysis. The various methods and analyses which were performed in this study are presented with the effect zones in the layout.

  • PDF

Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network

  • Majidha Fathima K. M.;M. Suganthi;N. Santhiyakumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2188-2208
    • /
    • 2023
  • Quality of Service (QoS) is a critical feature of Wireless Sensor Networks (WSNs) with routing algorithms. Data packets are moved between cluster heads with QoS using a number of energy-efficient routing techniques. However, sustaining high scalability while increasing the life of a WSN's networks scenario remains a challenging task. Thus, this research aims to develop an energy-balancing component that ensures equal energy consumption for all network sensors while offering flexible routing without congestion, even at peak hours. This research work proposes a Gravitational Blackhole Search Optimised splay tree routing framework. Based on the splay tree topology, the routing procedure is carried out by the suggested method using three distinct steps. Initially, the proposed GBSO decides the optimal route at initiation phases by choosing the root node with optimum energy in the splay tree. In the selection stage, the steps for energy update and trust update are completed by evaluating a novel reliance function utilising the Parent Reliance (PR) and Grand Parent Reliance (GPR). Finally, in the routing phase, using the fitness measure and the minimal distance, the GBSO algorithm determines the best route for data broadcast. The model results demonstrated the efficacy of the suggested technique with 99.52% packet delivery ratio, a minimum delay of 0.19 s, and a network lifetime of 1750 rounds with 200 nodes. Also, the comparative analysis ensured that the suggested algorithm surpasses the effectiveness of the existing algorithm in all aspects and guaranteed end-to-end delivery of packets.

HSE System Safety Management Using Wearable Based on Accident Scenario of High Place Work (고소작업 사고 시나리오 기반 웨어러블 응용 HSE 시스템 안전관리 방안)

  • Cho, Yun-Jeong;Im, Ki-Chang;Lim, Dong-Sun;Park, Jeong-Ho;Kim, Jong-Myon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.417-425
    • /
    • 2018
  • This paper proposes a safety management method that extracts ETA (event tree analysis) based scenario and combines ICT technology to reduce serious disasters occurring workplace for shipbuilding and offshore plant. The statistics of Safety and Health Agency and (previous)Ministry of Public Safety and Security show that the most frequent accident among the serious disasters related to shipbuilding and offshore plant is falling. The main cause of accidents is absence of a safety belt and safety belt ring. To solve these problems, we create ETA based scenarios to derive results based on safety considerations. Based on these results, we propose a solution by applying ICT technology for accident prevention. Deriving ETA based scenarios and ICT technology, the proposed solutions include a system for detecting the wearing of safety belts and safety helmets, a system for detecting whether or not the safety belts are connected, and a hook system for measuring safety distances. These safety related systems can reduce the probability of death of workers. By preventing accidents using the proposed method, we can reduce serious disasters in shipbuilding and offshore plant and establish systematic safety management.

Development of the Spatial Indexing Method for the Effective Visualization of BIM data based on GIS (GIS 기반 BIM 데이터의 효과적 가시화를 위한 공간인덱싱 기법 개발)

  • Kim, Ji-Eun;Kang, Tae-Wook;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5333-5341
    • /
    • 2014
  • Recently, with the increasing interest in facility management based on indoor spatial information, various studies have been attempted to manage facility conversion between BIM and GIS. Visualization of the geometry data for a large-scale is one of the major issues to the maintenance system. Therefore, this study designed the spatial indexing algorithm through an IFC schema-based scenario for the effective visualization of BIM data based on GIS. A part of the algorithm was developed implementing the OcTree structure and this research has a test for the developed output with IFC sample data. Ultimately, we propose the spatial indexing method for the effective visualization of BIM data based on GIS.

Fuzzy event tree analysis for quantified risk assessment due to oil and gas leakage in offshore installations

  • Cheliyan, A.S.;Bhattacharyya, S.K.
    • Ocean Systems Engineering
    • /
    • v.8 no.1
    • /
    • pp.41-55
    • /
    • 2018
  • Accidental oil and gas leak is a critical concern for the offshore industry because it can lead to severe consequences and as a result, it is imperative to evaluate the probabilities of occurrence of the consequences of the leakage in order to assess the risk. Event Tree Analysis (ETA) is a technique to identify the consequences that can result from the occurrence of a hazardous event. The probability of occurrence of the consequences is evaluated by the ETA, based on the failure probabilities of the sequential events. Conventional ETA deals with events with crisp failure probabilities. In offshore applications, it is often difficult to arrive at a single probability measure due to lack of data or imprecision in data. In such a scenario, fuzzy set theory can be applied to handle imprecision and data uncertainty. This paper presents fuzzy ETA (FETA) methodology to compute the probability of the outcomes initiated due to oil/gas leak in an actual offshore-onshore installation. Post FETA, sensitivity analysis by Fuzzy Weighted Index (FWI) method is performed to find the event that has the maximum contribution to the severe sequences. It is found that events of 'ignition', spreading of fire to 'equipment' and 'other areas' are the highest contributors to the severe consequences, followed by failure of 'leak detection' and 'fire detection' and 'fire water not being effective'. It is also found that the frequency of severe consequences that are catastrophic in nature obtained by ETA is one order less than that obtained by FETA, thereby implying that in ETA, the uncertainty does not propagate through the event tree. The ranking of severe sequences based on their probability, however, are identical in both ETA and FETA.