• 제목/요약/키워드: Security reinforcement

검색결과 168건 처리시간 0.026초

국회시설보안 향상방안 (An Improvement of Security for the National Assembly)

  • 정태황
    • 한국재난정보학회 논문집
    • /
    • 제9권3호
    • /
    • pp.290-299
    • /
    • 2013
  • 본 연구는 국회의사당의 시설을 이용하는 인원을 대상으로 설문조사를 실시하고, 그 결과를 분석하여 국회의사당의 시설보안 향상방안을 제시하였다. 국회의사당 시설을 이용하는 많은 대상자들은 본인의 보안의식수준이 보통이상인 것으로 인식하고 있고, 국회의사당이 국가중요시설 가급이라는 사실은 알고 있지만 국가중요시설 가급이 어떤 시설인지에 대해 모르는 경우가 많은 것으로 나타났다. 국회의사당의 시설보안설계가 부족하고 현재보다 더 강화된 출입통제 조치가 필요하다고 인식하고 있으며, 스피드게이트 설치 및 장애물 보강이 필요한 것으로 인식하고 있다. 출입통제강화 조치로 인한 불편함을 감수하겠다는 의견은 출입통제장치 설치에 긍정적으로 작용할 수 있을 것이다. 보안교육의 필요성에 대한 인식이 비교적 높지만 현재 적절한 보안교육이 이루어지지 않고 있어 현실적이고 적절한 보안교육방법을 찾고 이를 실행하는 것이 필요하며, 실질적인 교육을 위해 국회시설별 이용자의 보안인식을 고려하고, 교육여건을 감안하여 보안교육역량을 높이는 것이 필요하다.

강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구 (A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning)

  • 김정윤;박종열;오상호
    • 정보보호학회논문지
    • /
    • 제34권1호
    • /
    • pp.21-29
    • /
    • 2024
  • ICT와 network의 발달로 규모가 커진 IT 인프라의 보안 관리가 매우 어려워지고 있다. 많은 회사나 공공기관에서 시스템과 네트워크 보안 관리에 어려움을 겪고 있다. 또한 하드웨어와 소프트웨어의 복잡함이 커짐에 따라 사람이 모든 보안을 관리한다는 것은 불가능에 가까워지고 있다. 따라서 네트워크 보안 관리에 AI가 필수적이다. 하지만 실제 네트워크 환경에 공격 모델을 구동하는 것은 매우 위험하기에 실제와 유사한 네트워크 환경을 구현하여 강화학습을 통해 사이버 보안 시뮬레이션 연구를 진행하였다. 이를 위해 본 연구는 강화학습을 네트워크 환경에 적용하였고, 에이전트는 학습이 진행될수록 해당 네트워크의 취약점을 정확하게 찾아냈다. AI를 통해 네트워크의 취약점을 발견하면, 자동화된 맞춤 대응이 가능해진다.

보호동기이론에 기반한 조직구성원의 보안강화 : 보안정책에 대한 신뢰와 보안스트레스의 매개효과를 중심으로 (Security Enhancement of Public Organization Members Based on the Protection Motivation Theory)

  • 최희영;강주영
    • 한국IT서비스학회지
    • /
    • 제19권6호
    • /
    • pp.83-95
    • /
    • 2020
  • "I think security is only trying to make it uncomfortable." "10% of my work is entering IDs and passwords, such as boot passwords, mobile phone authentication numbers, etc." As reflected in the complaint above, stress caused by information security among organizations' members is increasing. In order to strengthen information security, practical solutions to reduce stress are needed because the motivation of the members is needed in order for organizations to function properly. Therefore, this study attempts to suggest key factors that can enhance security while reducing information security stress among members of organizations. To this end, based on the theory of protection motivation, trust and security stress from information security policies are set as mediating factors to explain changes in security reinforcement behavior. Furthermore, risk, efficacy, and reaction costs of cyberattacks are considered as prerequisites. Our study suggests a solution to the security reinforcement problem by analyzing the factors that influence the behavior of members of organizations. In turn, this can raise protection motivation among members.

네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구 (A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim))

  • 김범석;김정현;김민석
    • 반도체디스플레이기술학회지
    • /
    • 제22권3호
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET

  • Xu, Guoai;Liu, Boya;Xu, Guosheng;Zuo, Peiliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권9호
    • /
    • pp.3104-3123
    • /
    • 2022
  • The development of Vehicular Ad hoc Network (VANET) has greatly improved the efficiency and safety of social transportation, and the routing strategy for VANET has also received high attention from both academia and industry. However, studies on dynamic matching of routing policies with the message types of VANET are in short supply, which affects the operational efficiency and security of VANET to a certain extent. This paper studies the message types in VANET and fully considers the urgency and reliability requirements of message forwarding under various types. Based on the diversified types of messages to be transmitted, and taking the diversified message forwarding strategies suitable for VANET scenarios as behavioral candidates, an adaptive routing method for the VANET message types based on reinforcement learning (RL) is proposed. The key parameters of the method, such as state, action and reward, are reasonably designed. Simulation and analysis show that the proposed method could converge quickly, and the comprehensive performance of the proposed method is obviously better than the comparison methods in terms of timeliness and reliability.

압성토 및 억지말뚝으로 보강된 도로의 확장공사로 인한 추가 보강사례 연구 (A Case Study of Extra Reinforcement by Road Extension work on Existing Cut Slope Reinforced with Counterweight Fill and Stabilizing Piles)

  • 박정용;김우성;김제경;양태선;나경준
    • 한국재난관리표준학회지
    • /
    • 제1권2호
    • /
    • pp.67-72
    • /
    • 2008
  • 본 논문에서는 도로확장공사 현장의 절토사면 안정검토를 위해서 몇가지 조사 및 분석을 수행하였다. 압성토 및 억지말뚝으로 보강된 절토사면의 추가 보강사례를 그 연구대상으로 하며, 절토사면에 보강된 안정화파일의 효과를 분석하기위한 시험장비 또한 설계 및 설치하였다. 결론적으로, 추가보강방법으로써 억지말뚝공법과 Earth Anchor공법을 검토한 결과, 억지말뚝공법과 Earth Anchor공법 모두 안정성은 확보하였으나 기존 보강공법의 연계성과 경제성을 고려하여 억지말뚝공법을 추가보강공법으로 선정하였다.

  • PDF

Deep Deterministic Policy Gradient 알고리즘을 응용한 자전거의 자율 주행 제어 (Autonomous control of bicycle using Deep Deterministic Policy Gradient Algorithm)

  • 최승윤;레 팜 투옌;정태충
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.3-9
    • /
    • 2018
  • DDPG(Deep Deterministic Policy Gradient)알고리즘은 인공신경망과 강화학습을 사용하여 학습하는 알고리즘이다. 최근 많은 연구가 이루어지고 있는 강화학습과 관련된 연구 중에서도 DDPG 알고리즘은 오프폴리시로 학습하기 때문에 잘못된 행동이 누적되어 학습에 영향을 미치는 경우를 방지하는 장점이 있다. 본 연구에서는 DDPG 알고리즘을 응용하여 자전거를 자율주행 하도록 제어하는 실험을 진행하였다. 다양한 환경을 설정하여 시뮬레이션을 진행하였고 실험을 통해서 사용된 방법이 시뮬레이션 상에서 안정적으로 동작함을 보였다.

  • PDF

A Study on Countermeasures Against Cyber Infringement Considering CPTED

  • Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • 제9권2호
    • /
    • pp.106-117
    • /
    • 2021
  • The aim is to find cyber measures in consideration of physical CPTED in order to prepare countermeasures for cybercrime prevention. For this, the six applied principles of CPTED were used as the standard. A new control item was created in connection with the control items of ISO27001. A survey was conducted on former and current investigators and security experts. As a result of the reliability analysis, the Kronbar alpha coefficient value was 0.947, indicating the reliability of the statistical value. As a result of factor analysis, it was reduced to six factors. The following are six factors and countermeasures. Nature monitoring blocks opportunities and strengthens business continuity. Access control is based on management system compliance, personnel security. Reinforcement of territoriality is reinforcement of each wife and ethics. Establishment of security policy to enhance readability, security system maintenance. Increasing usability is seeking ways to utilize, periodic incentives. For maintenance, security education is strength and security-related collective cooperation is conducted. The differentiation of this study was to find countermeasures against cybercrime in the psychological part of the past. However, they approached to find in cyber measures. The limitation of the study is to bring the concept of physical CPTED to the cyber concept.

Experimental and numerical studies on seismic performance of hollow RC bridge columns

  • Han, Qiang;Zhou, Yulong;Du, Xiuli;Huang, Chao;Lee, George C.
    • Earthquakes and Structures
    • /
    • 제7권3호
    • /
    • pp.251-269
    • /
    • 2014
  • To investigate the seismic performance and to obtain quantitative parameters for the requirement of performance-based bridge seismic design approach, 12 reinforced concrete (RC) hollow rectangular bridge column specimens were tested under constant axial load and cyclic bending. Parametric study is carried out on axial load ratio, aspect ratio, longitudinal reinforcement ratio and transverse reinforcement ratio. The damage states of these column specimens were related to engineering limit states to determine the quantitative criteria of performance-based bridge seismic design. The hysteretic behavior of bridge column specimens was simulated based on the fiber model in OpenSees program and the results of the force-displacement hysteretic curves were well agreed with the experimental results. The damage states of residual cracking, cover spalling, and core crushing could be well related to engineering limit states, such as longitudinal tensile strains of reinforcement or compressive strains of concrete, etc. using cumulative probability curves. The ductility coefficient varying from 3.71 to 8.29, and the equivalent viscous damping ratio varying from 0.19 to 0.31 could meet the requirements of seismic design.