• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.023 seconds

Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model (리비아 모델을 통한 북한의 핵 정책 평가와 전망)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2018
  • The issue of security on the Korean peninsula is facing the greatest upheaval in 2018 with the inter-Korean summit and the US-North Korea summit. North Korea has pursued the parallel policy developing military and economic at the same time. However, North Korea is changing its route to give up nuclear weapons and focus on the economy through summit talks. Since the change in North Korea is similar to that of Libya in the past, it is necessary to analyze why North Korea is trying to abandon its nuclear program and how the process is flowing compared to the case of Libya. The Libya model was constructed and analyzed in terms of international and domestic perpectives and recognition of the situation by leadership. North Korea's nuclear policy was evaluated based on the Libya model. The nuclear development of Libya and North Korea has caused diplomatic and economic pressures from the international community and ultimately led to instability of the regime. Two countries have tried to abandon nuclear program in order to solve the instability of the regime, also gain the economic reward insead. Libya took economic benefits and secured some of the stability of the regime, but the regime collapsed under the wave of democracy due to the influx of foreign capital and ideas. North Korea will seek diplomatic and economic gains with the example of Libya, but will try to limit as much as possible the culture of democracy and the full opening that can be incidental.

  • PDF

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Comparison of Failure Rates in Measuring Software Reliability (소프트웨어 신뢰도 측정에서 고장률 비교)

  • Jung, Hye Jung
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.15-20
    • /
    • 2022
  • This research studied the evaluation of reliability among the software quality characteristics: suitability, reliability, usability, portability, maintainability, performance efficiency, security, and compatibility. It proposes a quantitative evaluation of reliability in the measurement of software quality. This study introduces a method for measuring the failure rate included in maturity during reliability evaluation, which is one of the characteristics of software quality, and is a study with experimental data on how the failure rate changes depending on the form of failure data. Focusing on software testing, the failure rate was measured and compared according to the type of failure data by applying it to the software reliability growth model, focusing on the number of failures per day. The failure rate was measured around the failure time found through the 6-day test, and the failure rate was compared with the failure rate proposed by the international standard ISO/IEC 25023 using the measurement results, and the application was reviewed according to the data type.

An Evaluation of Multi-Reservoir Operation Weighting Coefficients Using Fuzzy DEA taking into account Inflow Variability (유입량의 변동성을 고려한 Fuzzy DEA 기반의 댐 군 연계운영 가중치 대안 평가)

  • Kim, Yong-Ki;Kim, Jae-Hee;Kim, Sheung-Kown
    • IE interfaces
    • /
    • v.24 no.3
    • /
    • pp.220-230
    • /
    • 2011
  • The multi-reservoir operation problem for efficient utilization of water resources involves conflicting objectives, and the problem can be solved by varying weight coefficient on objective functions. Accordingly, decision makers need to choose appropriate weight coefficients balancing the trade-offs among multiple objectives. Although the appropriateness of the weight coefficients may depend on the total amount of water inflow, reservoir operating policy may not be changed to a certain degree for different hydrological conditions on inflow. Therefore, we propose to use fuzzy Data Envelopment Analysis (DEA) to rank the weight coefficients in consideration of the inflow variation. In this approach, we generate a set of Paretooptimal solutions by applying different weight coefficients on Coordinated Multi-reservoir Operating Model. Then, we rank the Pareto-optimal solutions or the corresponding weight coefficients by using Fuzzy DEA model. With the proposed approach, we can suggest the best weight coefficients that can produce the appropriate Pareto-optimal solution considering the uncertainty of inflow, whereas the general DEA model cannot pinpoint the best weight coefficients.

Fundamental Function Design of Real-Time Unmanned Monitoring System Applying YOLOv5s on NVIDIA TX2TM AI Edge Computing Platform

  • LEE, SI HYUN
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.22-29
    • /
    • 2022
  • In this paper, for the purpose of designing an real-time unmanned monitoring system, the YOLOv5s (small) object detection model was applied on the NVIDIA TX2TM AI (Artificial Intelligence) edge computing platform in order to design the fundamental function of an unmanned monitoring system that can detect objects in real time. YOLOv5s was applied to the our real-time unmanned monitoring system based on the performance evaluation of object detection algorithms (for example, R-CNN, SSD, RetinaNet, and YOLOv5). In addition, the performance of the four YOLOv5 models (small, medium, large, and xlarge) was compared and evaluated. Furthermore, based on these results, the YOLOv5s model suitable for the design purpose of this paper was ported to the NVIDIA TX2TM AI edge computing system and it was confirmed that it operates normally. The real-time unmanned monitoring system designed as a result of the research can be applied to various application fields such as an security or monitoring system. Future research is to apply NMS (Non-Maximum Suppression) modification, model reconstruction, and parallel processing programming techniques using CUDA (Compute Unified Device Architecture) for the improvement of object detection speed and performance.

Developing a Model for Crime Prevention Hardware Performance Test and Certification System (방범하드웨어의 침입범죄 저항성능 시험·인증 체계에 관한 모형 연구)

  • Park, Hyeon-ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.255-292
    • /
    • 2013
  • Burglary (also called breaking and entering and sometimes housebreaking) is a crime, the essence of which is illegal entry into a building for the purposes of committing an offence. It is one of the most common types of crime and also a serious issue for every society. A house that is left insecure is an accessible and attractive target for burglars and therefore burglary resistance test & certification system for doors and windows has been developed in many countries. This paper explores several advanced foreign burglary resistance test/certifcation cases (the British SBD, the Dutch KOMO SKH/SKG, the Japanese CP mark, the Australian Standard Certification) for security products and domestic test/certification systems for fire safety products as a comparative study so that any improvement points can be gained for South Korea in the field of security product performance. The comparative analysis results show that South Korea is far behind the security product certification system and needs a lot of improvement in the system by benchmarking foreign cases. The domestic test/certification systems for fire safety products also give some insights for burglary-related security products' performance certification system in Korea. Overall, the need for relevant rules and regulations, the establishment of standards regarding testing and certification, including certified security +hardware product in building security certification system, performance testing as well as production testing (i.e. quality management system evaluation), the basic competency of testers, incentive system for certified/high quality security products were suggested in order to make an optimal model for the security production performance testing and certification system in Korea.

  • PDF

Web Resources Based Collection Development for Digital Libraries (디지털 도서관의 웹자원 기반 장서개발)

  • Lee, Jee-Yeon;Kim, Sung-Un
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.111-127
    • /
    • 2003
  • Web-based information resources should be managed and used methodically in the same manner as the paper-based resources are managed and used. It is necessitated by the prevalence of web-based delivery of a variety of information. To develop a web-based digital collection, it is critical to establish a set of standardized evaluation criteria for web-resources. The evaluation criteria needs to include authority, trustworthy, reliability, functionality, relatedness, accessibility, structure, design, user support, and security related matters. However, it is also necessary to have certain flexibility to either emphasize or include particular evaluation criteria to reflect varying characteristics of the web resources especially for the purpose of developing an effective digital collection. In addition, it is essential to review the evaluation criteria with respect to value, demand, duplication prevention, and intellectual property, which are relevant to the web-based digital collection development. Finally, various strategies were suggested as means to develop more effective web-based digital resource collection. These strategies include organizing a selection committee to ensure the objectivity and consistency in web-resource evaluation; developing a model for web-based digital resource collection; sharing new standards, protocols, markups, and metadata with other digital libraries; and developing user-centered digital resource collection.

Damage Evaluation of Adjacent Structures for Detonation of Hydrogen Storage Facilities (수소저장시설의 폭발에 대한 인접 구조물의 손상도 평가)

  • Jinwon Shin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.61-70
    • /
    • 2023
  • This study presents an analytical study of investigating the effect of shock waves generated by the hydrogen detonation and damage to structures for the safety evaluation of hydrogen storage facilities against detonation. Blast scenarios were established considering the volume of the hydrogen storage facility of 10 L to 50,000 L, states of charge (SOC) of 50% and 100%, and initial pressures of 50 MPa and 100 MPa. The equivalent TNT weight for hydrgen detonation was determined considering the mechanical and chemical energies of hydrogen. A hydrogen detonation model for the converted equivalent TNT weight was made using design equations that improved the Kingery-Bulmash design chart of UFC 3-340-02. The hydrogen detonation model was validated for overpressure and impulse in comparison to the past experimental results associated with the detonation of hydrogen tank. A parametric study based on the blast scenarios was performed using the validated hydrogen detonation model, and design charts for overpressure and impulse according to the standoff distance from the center of charge was provided. Further, design charts of the three-stage structural damage and standoff distance of adjacent structures according to the level of overpressure and impact were proposed using the overpressure and impulse charts and pressure-impulse diagrams.

Estimating The Economic Value of Information Security Management System (ISMS) Certification by CVM (조건부가치측정법(CVM)을 이용한 정보보호 관리체계(ISMS) 인증의 경제적 가치 추정 연구)

  • Jang, Sang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5783-5789
    • /
    • 2014
  • Since 2002, many domestic companies have been certified for ISMS. On the other hand, certification, such as the need for ost-effectiveness evaluation, is not specifically enforced. Therefore, for more than 10 years, the ISMS implementation and certification system has been used for performance and cost effective business management. In this study, a model for analyzing the effect of certification organizations, ISMS development, and an analysis of the effect of a standardized system for the study was prepared. To this end, the existing maintenance organizations ISMS certification survey was conducted through an analysis of the economic effects. ISMS certification continues to expand or maintain the policy for improvement. The survey data collected by the analysis mechanism for the economic effects of CVM was analyzed.

A Study on performance improvement of network security system applying fuzzy logic (퍼지로직을 적용한 네트워크 보안 시스템의 성능향상에 관한 연구)

  • Seo, Hee-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Unlike conventional researches, we are able to i) compare the fuzzy logic based BBA with non-fuzzy BBA for verifying the effective performance of the proposed fuzzy logic application ii) dynamically respond to the intrusion using BBA whereas the previous IDS was responding statically and iii) expect that this would be a cornerstone for more practical application researches (analyzing vulnerability and examining countermeasures, etc.) of security simulation. Several simulation tests performed on the targer network will illustrate our techniques. And this paper applies fuzzy logic to reduce the false negative that is one of the main problems of IDS. Intrusion detection is complicated decision-making process, which generally involves enormous factors about the monitored system. Fuzzy evaluation component model, which is a decision agent in the distributed IDS, can consider various factors based on fuzzy logic when an intrusion behavior is detected. The performance obtained from the coordination of intrusion detection agent with fuzzy logic is compared against the corresponding non fuzzy type intrusion detection agent. The results of these comparisons allow us to evaluate a relevant improvement on the fuzzy logic based BBA.

  • PDF